Comptia sec+ SY0-701 Acronyms

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/323

flashcard set

Earn XP

Description and Tags

with def and examples

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

324 Terms

1
New cards

3DES

  • Utilizes three 56-bit keys

  • Encrypts data with the first key, decrypts with the second key, and encrypts again with the third key

  • Provides 112-bit key strength but is slower than DES

2
New cards

AAA

Authentication, authorization, and accounting

3
New cards

ACL

(access control list)-

Rule sets on network devices (firewalls, routers) to permit or deny traffic- Primarily used for network security to control data flow into and out of networks, Most specific rules at top and deny all at end 

4
New cards

AES 

Advanced Encryption Standard (AES): - A symmetric encryption standard that replaced DES and 3DES as the US government's encryption standard. - Supports key lengths and block sizes of 128128-bit, 192192-bit, or 256256-bit. - Widely adopted and considered the encryption standard for sensitive data.

5
New cards

AH

authentication header

6
New cards

AI

Artificial intelligence

7
New cards

AIS

Automated indicator sharing

8
New cards

ALE

(Annualized loss expectancy) Expected annual loss from a risk

ALE=SLE x ARO

9
New cards

AP

Access point

10
New cards

API

Application programming interface

11
New cards

APT

(Advanced persistent threat)

term that used to be used synonymously with a nation-state actor because of their long-term persistence and stealth

A prolonged and targeted cyberattack in which an intruder gains unauthorized access to a network and remains undetected for an extended period while trying to steal data or monitor network activities rather than cause immediate damage

12
New cards

ARO

(annualized rate occurrence)

Estimated frequency of threat occurrence within a year Provides a yearly probability

13
New cards

ARP

Addressed resolution protocol

14
New cards

ASLR

■ Address Space Layout Randomization (ASLR)

Mitigations against Buffer Overflow Attack

● Helps prevent attackers from guessing return pointer addresses

● Randomizes memory addresses used by well-known programs, making it

harder to predict the location of the attacker's code

15
New cards

ATT&CK 

Adversarial Tactics techniques and common knowledge 

16
New cards

AUP

(acceptable use policy) 

Document that outlines the do's and don'ts for users when interacting with an organization's IT systems and resources

  • Defines appropriate and prohibited use of IT systems/resources

  • Aims to protect organizations from legal issues and security threats

17
New cards

AV

antivirus, operates at layer 7, application layer

18
New cards

BASH

Bourne again shell

19
New cards

BCP

(business continuity plan )

  • Ensures operations continue during and after disruptions

  • Focuses on critical operation continuation and quick recovery

  • Includes strategies for power outages, hardware failures, and disasters

20
New cards

BGP

Border Gateway Protocol

21
New cards

BIA

(business impact analysis)  Evaluates disruption effects

  • Identifies/prioritizes critical functions

  • Assesses risks & recovery needs

Key Metrics:

  • RTO: Max downtime allowed; target recovery time

  • RPO: Max data loss allowed (time); restore point

  • MTTR: Avg repair time; shows downtime speed

  • MTBF: Avg time between failures; reliability measure

22
New cards

BIOS

Basic input/output system

23
New cards

BPA

(business practice agreement)

●  Goes beyond basic contracts when two entities collaborate

  • ●  Outlines partnership nature, profit-sharing, decision-making, and exit

    strategies

  • ●  Defines ownership of intellectual property and revenue distribution

24
New cards

BPDU

Bridge protocol data unit

25
New cards

BYOD

(Bring Your Own Device)

  • ●  Employees use personal devices for work

  • ●  Cost-effective for employers

  • ●  Drawbacks include reduced control over security and device management

26
New cards

CA

Certificate authority

  • ●  Trusted third party that issues digital certificates

  • ●  Certificates contain Certificate authority information and digital signature

  • ●  Validates and manages certificates

27
New cards

CAPTCHA

Helps you tell humans apart from computers

28
New cards

CAR

Corrective action report

29
New cards

CASB

Cloud access security broker

30
New cards

CBC

Cipher Block Chaining (CBC):

Uses AES (Advanced Encryption Standard) with CCMP (Counter Mode with CBC-MAC) for stronger encryption and authentication.

31
New cards

CCMP

Counter Mode with CBC-MAC

Uses AES (Advanced Encryption Standard) with CCMP (Counter Mode with CBC-MAC) for stronger encryption and authentication.

32
New cards

CCTV

Cameras, physical security type

  • ●  Best places to have cameras

    • ○  Data center

    • ○  Telecommunications closets

    • ○  Entrance or exit areas

  • ●  Cameras should be configured to record what they’re observing

33
New cards

CERT

Computer emergency response team

  • Group that handles computer security incidents

  • Provides incident response, analysis, and coordination during cyberattacks

34
New cards

CFB

Cipher Feedback

35
New cards

CHAP

Challenge handshake authentication protocol

  • Used for remote access authentication

  • More secure than PAP (doesn’t send passwords in cleartext)

  • Uses a challenge-response mechanism with hashing

36
New cards

CIA

Confidentiality integrity availability

Confidentiality- encryption 

Integrity- Hashing, Digital signatures

Availability- redundancy 

37
New cards

CIO

Chief Information officer 

38
New cards

CIRT

Computer incident response team

39
New cards

CMS

Content management system

40
New cards

COOP

Continuity of operation planning

  • Ensures an organization's ability to recover from disruptive events or disasters

  • Requires detailed planning and forethought

41
New cards

COPE

Corporate owned personally enabled

  • ●  The company provides devices for employees

  • ●  Greater control over security and standards

  • ●  Higher initial investment

  • ●  Employees may have privacy concerns or need to carry two devices

42
New cards

CP

Contingency planning

43
New cards

CRC

Cyclical redundancy check

44
New cards

CRL

Certificate revocation list

  • ●  Maintained by CAs

  • ●  List of all digital certificates that the certificate authority has already revoked
    ● Checked before validating a certificate

45
New cards

CSO

Chief security officer

  • Senior executive responsible for an organization’s security

  • Covers physical security + cybersecurity

  • Focus: protecting people, assets, data, and infrastructure

46
New cards

CSP

Cloud service provider

47
New cards

CSR

Certificate signing request

  • ●  A block of encoded text with information about the entity requesting the

    certificate

  • ●  Includes the public key

  • ●  Submitted to CA for certificate issuance

  • ●  Private key remains secure with the requester

48
New cards

CSRF

cross-site request forgery

● Triggers actions on different websites without user consent

49
New cards

CSU

Channel service Unit

50
New cards

CTM

Counter mode

51
New cards

CTO

Chief technology officer

52
New cards

CVE

  • (Common Vulnerabilities and Exposures)

    • ●  System that provides a standardized way to uniquely identify and

      reference known vulnerabilities in software and hardware

    • ●  Provides solutions and mitigation strategies

    • ●  Help assess security and prioritize vulnerability fixes

53
New cards

CVSS

Common Vulnerability Scoring System

  • Used to provide a numerical score reflecting the severity of a vulnerability (0 to 10)

  • Scores are used to categorize vulnerabilities as none, low, medium, high, or critical

  • Scores assist in prioritizing remediation efforts but do not account for existing mitigations

54
New cards

CYOD

  • (Choose Your Own Device)

    • ●  Employees select devices from a company-approved list

    • ●  Balance between employee choice and organizational control

    • ●  Similar drawbacks to COPE in terms of initial cost and potential privacy

      concerns

55
New cards

DAC

  • Discretionary Access Control

    • ●  Resource owners specify which users can access their resources

    • ●  Access control based on user identity, profile, or role

    • ●  Allows resource owners to grant access to specific users

56
New cards

DBA

Database administrator

57
New cards

DDOS

Distributed Denial of Service Attacks

● Attempting to overwhelm the victim's systems or networks so that they cannot be accessed by the organization's legitimate users

different IPs going all to the same secs apart IP to overwhelm server

58
New cards

DEP

Data execution prevention 

59
New cards

DES

  • Data Encryption Standard)

  • Symmetric encryption 

    • Uses a 64-bit key (56 effective bits due to parity)

    • Encrypts data in 64-bit blocks through 16 rounds of transposition and

      substitution

    • Widely used from the 1970s to the early 2000s

60
New cards

DHCP

Dynamic Host Configuration Protocol

  • Automatically assigns IP addresses, subnet masks, default gateways, and DNS info to devices on a network

  • Runs on UDP ports 67 (server) and 68 (client)

61
New cards

DHE

Diffie-Hellman 

Symmetric Encryption 

  • ●  Used for key exchange and secure key distribution

  • ●  Vulnerable to man-in-the-middle attacks, requires authentication

  • ●  Commonly used in VPN tunnel establishment (IPSec)

62
New cards

DKIM

  • DomainKeys Identified Mail

    • ●  Allows the receiver to verify the source and integrity of an email by adding a digital signature to the email headers

    • ●  Benefits

      • ○  Email authentication

      • ○  Protection against email spoofing

      • ○  Improved email deliverability

      • ○  Enhanced reputation score

63
New cards

DLL

Dynamic link library

64
New cards

DLP

Data Loss Prevention
■ Strategy to prevent sensitive information from leaving an organization

65
New cards

DMARC

(Domain-based Message Authentication, Reporting and Conformance)

  • ●  DMARC detects and prevents email spoofing by setting policies for email

    sending and handling failures

66
New cards

DNAT

destination network address translation

67
New cards

DNS

Domain name server

68
New cards

DOS

denial of service

Used to describe an attack that attempts to make a computer or server’s resources unavailable

Same IP to Same IP only first part of the three way handshake 

69
New cards

DPO

Data privacy officer 

70
New cards

DRP

disaster recovery plan

  • ●  Focuses on plans and processes for disaster response

  • ●  Subset of the BC Plan

  • ●  Focuses on faster recovery after disasters

  • ●  Addresses specific events like hurricanes, fires, or floods

71
New cards

DSA

Digital signature algorithm

72
New cards

DSL

Digital subscriber line

73
New cards

EAP

  • (Extensible Authentication Protocol)

    • ●  Authentication framework supporting multiple methods

74
New cards

EAP-TTLS 

(Extensible Authentication Protocol-Tunneled Transport Layer Security)

  • ●  Extends TLS support across platforms

  • ●  Requires server-side certificates for security

75
New cards

EAP-FAST 

(Extensible Authentication Protocol-Flexible Authentication via SecureTunneling)

● Developed by Cisco Systems for secure re-authentication

● Uses a Protected Access Credential and TLS tunnel

76
New cards

ECB

Electronic code book

77
New cards

ECC

Elliptic Curve Cryptography

Asymmetric encryption 

  • ●  Efficient and secure, uses algebraic structure of elliptical curves

  • ●  Commonly used in mobile devices and low-power computing

  • ●  Six times more efficient than RSA for equivalent security

  • ●  Variants include

  • ○  ECDH (Elliptic Curve Diffie-Hellman)

  • ○  ECDHE (Elliptic Curve Diffie-Hellman Ephemeral)

  • ○  ECDSA (Elliptic Curve Digital Signature Algorithm)

78
New cards

EDR

Endpoint detection response

  • ●  Continuous monitoring of endpoint devices

  • ●  Identifying, investigating, and preventing cyber threats

79
New cards

EFS

encrypted file system

80
New cards

ERP

enterprise resource planning

81
New cards

ESN

Electronic serial number

82
New cards

ESP

Encapsulated security payload

83
New cards

FACL

File system access control

84
New cards

FDE

Full disk encryption

Encrypts the entire hard drive

85
New cards

FIM

File integrity management 

  • Validates the integrity of operating system and application software files by

    comparing their current state with a known, good baseline

  • Identifies changes to

    • ●  Binary files

    • ●  System and Application Files

    • ●  Configuration and Parameter Files

  • Monitors critical system files for changes using agents and hash digests, triggering alerts when unauthorized changes occur

86
New cards

FPGA

Field Programmable Gate Array

87
New cards

FRR

False rejection rate

○ Denies access to an authorized user.

Increasing sensitivity can increase FRR

88
New cards

FTP

FTP (File Transfer Protocol) - TCP

port 21

89
New cards

FTPS

  • File Transfer Protocol Secure

  • Extension of FTP that adds encryption via SSL/TLS

  • Secures authentication and data transfers

90
New cards

GCM

Galois counter mode

An encryption mode for block ciphers (like AES)

91
New cards

GDPR

general data protection regulation

  • Protects EU citizens' data within EU and EEA borders

  • Compliance required regardless of data location

  • Non-compliance leads to significant fines

92
New cards

GPG

Gnu privacy guard

93
New cards

GPO

Group policy object

Used to harden the operating system and establish secure baselines

94
New cards

GPS

Used to find location

95
New cards

GPU

Specialized processor for handling graphics and parallel computations

96
New cards

GRE

Generic routing encapsulation

97
New cards

HA

High availability

●  Achieved through load balancing, clustering, redundancy, and multi-cloud

strategies

98
New cards

HDD

Hard Disk drive

99
New cards

HIDS

Host based intrusion Detection system

Looks at suspicious network traffic going to or from a single or endpoint

100
New cards

HIPS

Host based intrusion prevention system