Security+ Terms

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/165

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

166 Terms

1
New cards

AAA (Authentication, Authorization, and Accounting)

a security framework that ensures only authorized individuals are able to access resources.

2
New cards

ABAC (Attribute Based Access Control)

evaluates attributes to determine the access.

3
New cards

ACL (Access Control List)

list of rules that specifies which users or systems are granted or denied access to a particular object or system resource.

4
New cards

AES (Advanced Encryption Standard)

a specification for the encryption of electronic data established by the U.S National Institute of Standards and Technology (NIST) in 2001.

5
New cards

AIS (Automated Indicator Sharing)

service provided by CISA that enables real-time exchange of machine-readable cyber threat indicators and defensive measures between public and private sector organizations.

6
New cards

APT (Advanced Persistent Threat)

a type of cyber attack in which an unauthorized user gains access to a system or network and remains undetected for an extended period of time.

7
New cards

ARP (Address Resolution Protocol)

a protocol used to map an IP address to a physical MAC address.

8
New cards

ASLR (Address Space Layout Randomization)

a technique used to prevent attackers from exploiting vulnerabilities in software by randomizing the location of key data areas in memory.

9
New cards

BCP (Business Continuity Planning)

detailed strategy and set of systems for ensuring an organization's ability to prevent or rapidly recover from a significant disruption to its operations.

10
New cards

BDPU Guard (Bridge Protocol Data Units)

BDPU guard is a feature that defends the layer 2 STP topology against BDPU-related threats.

11
New cards

BIA (Business Impact Analysis)

the BIA should identify the operational and financial impacts resulting from the disruption of business functions and processes.

12
New cards

BIOS (Basic Input/Output System)

BIOS, or Basic Input/Output System, is software stored on a small memory chip, also known as firmware.

13
New cards

BLOB (Binary Large Object Storage)

used by cloud providers as a database for large amounts of text or binary data.

14
New cards

BPA (Business Partnership Agreement)

agreement between 2 companies that are doing business together in which it is confirmed how much each company should contribute as well as their responsibility and how the profit will be split.

15
New cards

BYOD (Bring Your Own Device)

a policy that allows employees to use their personal devices, such as smartphones or laptops, to access company resources.

16
New cards

CA (Certificate Authority)

trusted entity that issues digital certificates used to verify the identities of individuals, organizations, websites or devices.

17
New cards

CAC (Common Access Card)

smart card about the size of a credit card. It is the standard identification for Active Duty United States Defense personnel.

18
New cards

CASB (Cloud Access Security Broker)

software/hardware that sits between users and their cloud service to enforce security policies.

19
New cards

CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart)

a challenge-response test used to distinguish between human and automated users.

20
New cards

CBC (Cipher Block Chaining)

a mode of operation for a block cipher -- one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block.

21
New cards

CER (Certificate)

security files provided and generated by an Certificate Authority. These files help a browser to verify if a website is secure and save to enter, verifying its authenticity. These CER security certificates are usually installed on a web server.

22
New cards

CER (Crossover Error Rate)

point where FAR and FRR are equal.

23
New cards

CHAP (Challenge Handshake Authentication Protocol)

challenge-response identity authentication protocol. It depends on a combination of CHAP security credentials and a "shared secret" between the requestor (client) and the authenticator (server), and it does not expose a password.

24
New cards

CIA (Confidentiality, Integrity, and Availability)

the three core principles of information security.

25
New cards

CIRT (Computer Incident Response Team)

a team responsible for responding to and mitigating cyber security incidents.

26
New cards

COPE (Corporate-Owned, Personally-Enabled)

a policy that allows employees to use company-owned devices for personal use.

27
New cards

CRC (Cyclic Redundancy Check)

a mathematical algorithm used to detect errors in data transmission.

28
New cards

CRL (Certificate Revocation List)

first phase of checking if certificate is valid.

29
New cards

CSA (Cloud Security Alliance)

non-profit organization that provides different resources to help Cloud Security Providers (CSPs).

30
New cards

CSRF (Cross-Site Request Forgery)

is a web security vulnerability that allows an attacker to induce users to perform actions that they do not intend to perform.

31
New cards

CSO (Chief Security Officer)

a senior-level executive responsible for overseeing an organization's security program.

32
New cards

CSP (cloud service provider)

is a third-party company that provides scalable computing resources that businesses can access on demand over a network, including cloud-based compute, storage, platform, and application services.

33
New cards

CSR (Certificate Signing Request)

a request made by a user or device to a certificate authority for a digital certificate.

34
New cards

CSV (Comma Separated Values)

a file format used to store data in a table-like format, with each row separated by a comma.

35
New cards

CVE (Common Vulnerabilities and Exposure)

list of vulnerabilities created by MITRE.

36
New cards

CVSS (Common Vulnerabilities Scoring System)

ranking of vulnerabilities and their severity.

37
New cards

CYOD (Choose Your Own Device)

company has set of devices that employees can choose to use for work.

38
New cards

DAC (Discretionary Access Control)

restricting access to objects based on the identity of subject.

39
New cards

DDoS (Distributed Denial of Service)

a type of cyber attack in which multiple systems are used to flood a target server or network with traffic, causing it to become unavailable.

40
New cards

DES (Data Encryption Standard)

is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST) that was widely used in the past but is now considered insecure.

41
New cards

DHCP (Dynamic Host Configuration Protocol)

a protocol used to automatically assign IP addresses and other network settings to devices on a network.

42
New cards

DMZ (Demilitarized Zone)

a network segment that is isolated from the internal network and is used to provide public-facing services, such as web servers or email servers.

43
New cards

DNS (Domain Name System)

a system that translates domain names into IP addresses.

44
New cards

DoS (Denial of Service)

a type of cyber attack in which a server or network is overwhelmed with traffic, causing it to become unavailable.

45
New cards

DPO (Data Protection Officer)

DPO makes sure that the organization is correctly protecting individuals personal data according to current legislation.

46
New cards

DRP (Disaster Recovery Plan)

preparing for any type of disaster that could occur.

47
New cards

EAP (Extensible Authentication Protocol)

architectural framework that provides extensibility for authentication methods for commonly used protected network access technologies such as IEEE 802.1X-based wireless access, IEEE 802.1X-based wired access and Point-to-Point Protocol (PPP).

48
New cards

EFS (Encrypting File System)

a feature in Windows that allows files and folders to be encrypted using a user's public key.

49
New cards

EMI (Electromagnetic Interference)

interference caused by electromagnetic waves, which can disrupt the functioning of electronic devices.

50
New cards

EMP (Electromagnetic Pulse)

a burst of electromagnetic radiation that can cause damage to electronic devices.

51
New cards

ESP (Encapsulating Security Payload)

is security payload is an individual protocol in IPSec. ESP is responsible for the CIA triad of security (Confidentiality, Integrity, Availability), which is considered significant only when encryption is carried along with them.

52
New cards

FAR (False Acceptance Rate)

metric used to measure the likelihood of granting access to an unauthorized user.

53
New cards

FDE (Full Disk Encryption)

security technique that encrypts all data stored on a disk or storage device, including the operating system, applications, and user data.

54
New cards

FISMA (Federal Information Security Management Act)

FISMA requires federal agencies to develop, document, and implement an agency-wide program to provide information security for the information and systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source.

55
New cards

FRR (False Rejection Rate)

metric used to measure the likelihood of denying access to an authorized user.

56
New cards

FTP (File Transfer Protocol)

a protocol used to transfer files between computers over a network. Port 21.

57
New cards

GDPR (General Data Protection Regulation)

regulation in European Union (EU) law on data protection and privacy for individuals within the EU and the European Economic Area (EEA). It came into effect on May 25, 2018 and is enforced by the EU Data Protection Authorities.

58
New cards

GPS (Global Positioning System)

a system of satellites used to determine the location of a device.

59
New cards

GRE (Generic Routing Encapsulation)

a protocol used to encapsulate one type of packet within another.

60
New cards

GBAC (Group Based Access Control)

gives access to a group of individuals to the resources that they need.

61
New cards

HMAC (Hash-based Message Authentication Code)

is a cryptographic authentication technique that uses a hash function and a secret key.

62
New cards

HIDS (Host Intrusion Detection System)

HIDS stands for host-based intrusion detection system and represents an application that is monitoring a computer or network for suspicious activities.

63
New cards

HIPAA (Health Insurance Portability And Accountability Act)

federal law that was enacted in 1996 to protect the privacy and security of patients' personal health information (PHI).

64
New cards

HOTP (HMAC-based One-Time Password)

algorithm used to generate one-time passwords that are used for authentication purposes.

65
New cards

HSM (Hardware Security Module)

type of specialized hardware device designed to securely store and manage digital keys and perform cryptographic operations.

66
New cards

HSTS (HTTP Strict Transport Security)

web security policy mechanism used to protect against protocol downgrade attacks and cookie hijacking.

67
New cards

HTML (Hypertext Markup Language)

is the standard markup language for creating Web pages.

68
New cards

HTTP (Hypertext Transfer Protocol)

HTTP is the foundation of the World Wide Web, and is used to load webpages using hypertext links.

69
New cards

HTTPS

a secure version of HTTP that uses encryption to protect data in transit. HTTPS uses port 443.

70
New cards

IaaS

a cloud computing model in which infrastructure resources, such as servers and storage, are provided by a third-party provider.

71
New cards

IAM

a cybersecurity practice that enables IT administrators to restrict access to organizational resources so that only the people who need access have access.

72
New cards

ICMP

a network layer protocol used by network devices to diagnose network communication issues. ICMP is mainly used to determine whether or not data is reaching its intended destination in a timely manner.

73
New cards

IDS

a monitoring system that detects suspicious activities and generates alerts when they are detected. Based upon these alerts, a security operations center (SOC) analyst or incident responder can investigate the issue and take the appropriate actions to remediate the threat.

74
New cards

IPS

a network security technology that goes beyond the capabilities of an IDS (Intrusion Detection System) by actively preventing identified threats from being carried out. An IPS monitors network traffic, just like an IDS, but it can also take action to prevent attacks.

75
New cards

IEEE

The IEEE describes itself as the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.

76
New cards

IKE

a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN).

77
New cards

IMAP

an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. IMAP uses port 143.

78
New cards

IoT

physical devices that are connected to the internet and that can exchange data with each other.

79
New cards

IP

a protocol, or set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination.

80
New cards

IPv4

an IPv4 address is a 32-bit address that is usually represented in dotted decimal notation, with a decimal value representing each of the four octets (bytes) that make up the address.

81
New cards

IPv6

a network protocol that serves as the successor to IPv4. The purpose of IPv6 is to provide a larger address space for the internet as the number of connected devices continues to grow. One of the main differences between IPv6 and IPv4 is the size of the address space. IPv4 uses 32-bit addresses, allowing for approximately 4.3 billion unique addresses. In contrast, IPv6 uses 128-bit addresses, which allows for an almost unlimited number of unique addresses.

82
New cards

ISA

a document that regulates security-relevant aspects of an intended connection between an agency and an external system. It regulates the security interface between any two systems operating under two different distinct authorities.

83
New cards

ISO

an international standard-setting organization.

84
New cards

ISP

a company that provides Internet access to customers.

85
New cards

JSON

a lightweight data interchange format.

86
New cards

LDAP

is a software protocol for enabling anyone to locate data about organizations, individuals and other resources such as files and devices in a network -- whether on the public internet or a corporate intranet. LDAP is a "lightweight" version of Directory Access Protocol (DAP), which is part of X.500, a standard for directory services in a network. LDAP is considered lightweight because it uses a smaller amount of code than other protocols.

87
New cards

MAC (Media Access Control)

a unique identifier assigned to a network interface controller (NIC).

88
New cards

MAC (Mandatory Access Control)

limiting access to resources based on the sensitivity of information.

89
New cards

MCSP (Managed Cloud Service Provider)

provides managed cloud services to customers. Managed cloud services are a type of cloud computing service in which a third-party provider manages and delivers cloud computing resources and services to customers over the internet.

90
New cards

MFA (Multi-Factor Authentication)

a security feature that requires multiple forms of authentication to access a resource.

91
New cards

MITB (Man In The Browser)

an MITB attack injects malicious software (malware) into a victim's web browser. The malware typically exploits vulnerabilities in the browser or its plugins to intercept and manipulate data exchanged between the browser and the websites the user visits.

92
New cards

MITM (Man-in-the-Middle)

a type of cyber attack in which an attacker intercepts communications between two parties in order to either steal or change the data in transit.

93
New cards

MSSP (Managed Security Service Provider)

provides managed security services to customers, typically on a subscription basis.

94
New cards

MTBF (Mean Time Between Failures)

average amount of time between system failure which shows how reliable a system is.

95
New cards

MTTD (Mean Time To Detect)

average time it takes for an organization to detect a security incident or breach after it occurs.

96
New cards

MTTR (Mean Time To Repair)

average time that it takes to fix a system.

97
New cards

NAC (Network Access Control)

a system used to control access to a network based on the identity of the user or device.

98
New cards

NAT (Network Address Translation)

a technique used to map private IP addresses to public IP addresses.

99
New cards

NDA (Non Disclosure Agreement)

contract that prevents any side of the business to give away the secrets to others.

100
New cards

NFC (Near Field Communication)

short-range wireless communication technology that enables data exchange between devices that are within close proximity to each other, typically within a few centimeters.