Sec+ Acronyms + Definitions

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/133

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

134 Terms

1
New cards

AAA

Authentication, Authorization, and Accounting – A security framework that controls access to resources, verifies identity, and logs activity.

2
New cards

ACL

Access Control List – A list of rules that define permissions for accessing network resources.

3
New cards

AES

Advanced Encryption Standard – A symmetric encryption algorithm widely used for secure data encryption.

4
New cards

AH

Authentication Header – A component of IPSec that ensures integrity and authenticity of packets.

5
New cards

APT

Advanced Persistent Threat – A prolonged cyberattack where an attacker gains undetected access to a network.

6
New cards

ARP

Address Resolution Protocol – A protocol that maps IP addresses to MAC addresses.

7
New cards

ASLR

Address Space Layout Randomization – A security technique that randomizes memory addresses to prevent exploitation.

8
New cards

BCP

Business Continuity Planning – A strategy for maintaining operations during disruptions.

9
New cards

BIA

Business Impact Analysis – Identifies critical business functions and potential impacts of disruptions.

10
New cards

BIOS

Basic Input/Output System – Firmware that initializes hardware before the OS loads.

11
New cards

BYOD

Bring Your Own Device – A policy allowing employees to use personal devices at work.

12
New cards

CAC

Common Access Card – A smart card used for authentication in government networks.

13
New cards

CAPTCHA

Completely Automated Public Turing Test to Tell Computers and Humans Apart – A test to differentiate humans from bots.

14
New cards

CBC

Cipher Block Chaining – A mode of encryption that uses the previous ciphertext block for encryption.

15
New cards

CCMP

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol – A security protocol used in WPA2 for wireless encryption.

16
New cards

CCTV

Closed-Circuit Television – A video surveillance system used for security monitoring.

17
New cards

CHAP

Challenge Handshake Authentication Protocol – A protocol that verifies user identity through challenge-response authentication.

18
New cards

CIA

Confidentiality, Integrity, Availability – The core principles of cybersecurity.

19
New cards

CIRT

Computer Incident Response Team – A team that responds to security incidents.

20
New cards

CISO

Chief Information Security Officer – An executive responsible for an organization’s security strategy.

21
New cards

CSRF

Cross-Site Request Forgery – A web attack where an attacker tricks a user into making unauthorized requests.

22
New cards

CSP

Cloud Service Provider – A company that offers cloud-based services like storage, computing, and networking.

23
New cards

CSR

Certificate Signing Request – A request sent to a certificate authority to obtain a digital certificate.

24
New cards

CTF

Capture The Flag – A cybersecurity competition that challenges participants to solve security-related tasks.

25
New cards

CVSS

Common Vulnerability Scoring System – A standardized system for assessing the severity of security vulnerabilities.

26
New cards

DAC

Discretionary Access Control – A security model where owners set access permissions.

27
New cards

DDoS

Distributed Denial of Service – An attack that overwhelms a system with traffic.

28
New cards

DEP

Data Execution Prevention – A security feature that prevents code execution in certain memory areas.

29
New cards

DES

Data Encryption Standard – An outdated encryption algorithm replaced by AES.

30
New cards

DHCP

Dynamic Host Configuration Protocol – Assigns IP addresses to devices on a network.

31
New cards

DLP

Data Loss Prevention – A strategy to prevent unauthorized data transfers.

32
New cards

DMZ

Demilitarized Zone – A network segment that isolates public-facing services from an internal network.

33
New cards

DNS

Domain Name System – Translates domain names into IP addresses.

34
New cards

DoS

Denial of Service – An attack that disrupts system availability.

35
New cards

DRP

Disaster Recovery Plan – A plan to restore IT systems after a disaster.

36
New cards

DSA

Digital Signature Algorithm – A cryptographic algorithm used for digital signatures.

37
New cards

DSS

Digital Signature Standard – A federal standard for digital signatures.

38
New cards

EAP

Extensible Authentication Protocol – A framework that supports various authentication methods like passwords, biometrics, and certificates.

39
New cards

EDR

Endpoint Detection and Response – A security solution focused on detecting and responding to threats on devices like computers and smartphones.

40
New cards

EFS

Encrypting File System – A Windows feature for encrypting files on a computer.

41
New cards

EMS

Enterprise Mobility Suite – A suite of tools for managing mobile devices, apps, and data in an enterprise environment.

42
New cards

ERP

Enterprise Resource Planning – Software used to manage and automate core business processes.

43
New cards

FAR

False Acceptance Rate – The rate at which unauthorized users are incorrectly granted access in biometric systems.

44
New cards

FDE

Full Disk Encryption – The process of encrypting an entire disk to protect data at rest.

45
New cards

FIM

File Integrity Monitoring – A security process that checks for unauthorized changes to files.

46
New cards

FTP

File Transfer Protocol – A protocol for transferring files over a network.

47
New cards

GPO

Group Policy Object – A feature in Windows that defines user and computer configurations.

48
New cards

GPS

Global Positioning System – A satellite-based navigation system.

49
New cards

GRC

Governance, Risk, and Compliance – A framework for managing governance, risk, and compliance requirements in an organization.

50
New cards

HIDS

Host-Based Intrusion Detection System – A security system that monitors and analyzes the activity of a single host to detect suspicious behavior.

51
New cards

HMAC

Hash-Based Message Authentication Code – A mechanism for ensuring the integrity and authenticity of a message using a cryptographic hash function.

52
New cards

HOTP

HMAC-based One-Time Password – A one-time password algorithm based on HMAC.

53
New cards

HTTPS

Hypertext Transfer Protocol Secure – A secure version of HTTP that uses encryption (SSL/TLS) to protect data exchanged between a web server and client.

54
New cards

IAM

Identity and Access Management – A framework for managing digital identities and controlling access to resources.

55
New cards

ICMP

Internet Control Message Protocol – A protocol used for sending control messages, such as error reports and diagnostics, over an IP network.

56
New cards

IDS

Intrusion Detection System – A system that monitors network traffic for signs of malicious activity.

57
New cards

IEC

International Electrotechnical Commission – An international organization that develops standards for electrical, electronic, and related technologies.

58
New cards

IKE

Internet Key Exchange – A protocol used to set up a security association (SA) in the IPSec protocol suite.

59
New cards

IoT

Internet of Things – A network of physical devices that communicate and exchange data with each other over the internet.

60
New cards

IPSec

Internet Protocol Security – A suite of protocols used to secure network traffic through encryption and authentication.

61
New cards

IPv4

Internet Protocol version 4 – The fourth version of IP, widely used for assigning IP addresses.

62
New cards

IPv6

Internet Protocol version 6 – The latest version of IP that uses a larger address space than IPv4.

63
New cards

JIT

Just In Time – A software development and manufacturing approach that minimizes inventory and delays by producing items only when they are needed.

64
New cards

JWT

JSON Web Token – A compact, URL-safe token used to securely transmit information between parties as a JSON object.

65
New cards

KDC

Key Distribution Center – A server that manages keys for secure communication in Kerberos authentication.

66
New cards

KPI

Key Performance Indicator – A measurable value used to assess the success of an organization or project.

67
New cards

LAN

Local Area Network – A network that connects devices within a limited area, such as a home or office.

68
New cards

LDAP

Lightweight Directory Access Protocol – A protocol used to access and manage directory services, such as contact information in an organization.

69
New cards

LFI

Local File Inclusion – A vulnerability that allows attackers to include files from the local server on a website, leading to potential code execution.

70
New cards

LKM

Loadable Kernel Module – A piece of code that can be loaded into the kernel to add functionality to an operating system.

71
New cards

LOLBINs

Living Off the Land Binaries – Legitimate tools or software used maliciously for an attack.

72
New cards

MAC

Media Access Control / Mandatory Access Control – Media Access Control: A unique identifier for network interfaces. Mandatory Access Control: A security model that restricts access to resources based on predefined policies.

73
New cards

MD5

Message Digest 5 – A widely used cryptographic hash function, though considered insecure due to vulnerability to collisions.

74
New cards

MITM

Man In The Middle – An attack where an attacker intercepts and potentially alters communications between two parties.

75
New cards

MSSP

Managed Security Services Provider – A company that provides outsourced monitoring and management of security systems.

76
New cards

MFA

Multi-Factor Authentication – A security process where users provide two or more verification factors to gain access to a resource.

77
New cards

MPLS

Multi-Protocol Label Switching – A method for routing data in high-performance networks using labels instead of traditional IP routing.

78
New cards

NAC

Network Access Control – A security approach that regulates access to a network based on predefined policies.

79
New cards

NAT

Network Address Translation – A method used to modify IP address information in packet headers for routing purposes.

80
New cards

NIDS

Network Intrusion Detection System – A system that monitors network traffic for signs of malicious activity.

81
New cards

NIST

National Institute of Standards and Technology – A federal agency that develops standards and guidelines for cybersecurity.

82
New cards

NTFS

New Technology File System – A file system used by Windows operating systems to manage files on a disk.

83
New cards

OAuth

Open Authorization – An open standard for access delegation that allows users to grant third-party applications access to their resources without sharing passwords.

84
New cards

OCSP

Online Certificate Status Protocol – A protocol used to check the revocation status of an X.509 digital certificate in real-time.

85
New cards

OSINT

Open Source Intelligence – Intelligence gathered from publicly available sources, such as websites, social media, and public records.

86
New cards

OTP

One-Time Password – A password that is valid for only one login session or transaction, used for secure authentication.

87
New cards

P2P

Peer-to-Peer – A decentralized network model where each participant (peer) acts as both a client and server.

88
New cards

PBKDF2

Password-Based Key Derivation Function 2 – A cryptographic algorithm used to derive secure keys from a password, commonly used for password hashing.

89
New cards

PCI-DSS

Payment Card Industry Data Security Standard – A set of security standards designed to ensure that organizations handling card payments protect cardholder data.

90
New cards

PEAP

Protected Extensible Authentication Protocol – A secure method of authenticating wireless clients that encapsulates EAP within a TLS tunnel.

91
New cards

PKI

Public Key Infrastructure – A framework for managing digital keys and certificates for secure communications.

92
New cards

PIV

Personal Identity Verification – A federal government ID card used for identity verification and access control.

93
New cards

PoLP

Principle of Least Privilege – A security concept that ensures users and systems are only granted the minimum permissions necessary for their tasks.

94
New cards

PT

Penetration Testing – The practice of testing a system's security by simulating attacks to identify vulnerabilities.

95
New cards

PSA

Public Service Announcement – A message issued to inform the public about important matters.

96
New cards

PTA

Privacy Threshold Assessment – A process used to determine whether a system or project collects or uses personal data that requires protection.

97
New cards

QoS

Quality of Service – A set of techniques used to manage network resources and prioritize traffic to ensure high-quality service.

98
New cards

RADIUS

Remote Authentication Dial-In User Service – A protocol for authentication, authorization, and accounting for remote network access.

99
New cards

RAID

Redundant Array of Independent Disks – A technology used to combine multiple disk drives into a single unit for redundancy, performance, or both.

100
New cards

RBAC

Role-Based Access Control – A model for restricting access to resources based on users' roles within an organization.