Sec+ ACRONYMS

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/209

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

210 Terms

1
New cards

802.1x

A port-based authentication protocol. Wireless connections such as WPA2 can use this. Enterprise mode requires this and PEAP and EAP-TTLS requires a certificate on this server.

2
New cards

3DES

A symmetric algorithm used to encrypt data and provide confidentiality. It is a block cipher that encrypts data in 64-bit blocks.

3
New cards

AAA

Protocols are used in remote access systems. For example, TACACS+ is a type of this protocol that uses multiple challenges and responses during a session.

4
New cards

ACE

Identifies a user or group that is granted permission to a resource. Contained within a DACL in NTFS.

5
New cards

ACK

A packet in a TCP handshake. In a SYN flood attack, attackers send the SYN packet, but don't complete the handshake after receiving the SYN or this packet.

6
New cards

ACL

Routers and packet-filtering firewalls perform basic filtering using an this to control traffic based on networks, subnets, IP addresses, ports, and some protocols.

7
New cards

AES

A symmetric algorithm used to encrypt data and provide confidentiality. Is a block cipher and it encrypts data in 128-bit blocks. It is quick, highly secure, and used in a wide assortment of cryptography schemes. Includes key sizes of 128-bit, 192-bit or 256 bit.

8
New cards

AES-256

Sometimes includes the number of bits used in the encryption key. This is advanced encryption standard 256 bit. Blowfish is faster than this.

9
New cards

AH

IPsec includes both this and ESP. Provides authentication and integrity using HMAC. Identified with protocol ID number 51.

10
New cards

ALE

This identifies the expected annual loss and is used to measure risk with ARO and SLE in a quantitative risk assessment. The calculation is SLE * ARO.

11
New cards

AP

Short for wireless access point. Provide access to a wired network to wireless clients.

12
New cards

API

A software module or component that identifies inputs and outputs for applications.

13
New cards

APT

A group that has both the capability and intent to launch sophisticated and targeted attacks.

14
New cards

ARO

Identifies how many times a loss is expected to occur in a year and it is used to measure risk with ALE and SLE in a quantitative risk assessment.

15
New cards

ARP

Resolver IPv4 addresses to MAC addresses. When this poisoning attacks are used it can redirect traffic through an attacker's system by sending false MAC address updates.

16
New cards

ASCII

Code used to display characters.

17
New cards

ASP

Provides an application as a service over a network.

18
New cards

AUP

This defines proper system usage. It will often describe the purpose of computer systems and networks, how users can access them, and the responsibilities of users when accessing the systems.

19
New cards

BAC

An application that shows availability and performance of applications used or provided by a business.

20
New cards

BCP

A plan that helps an organization predict and plan for potential outages of critical services or functions. It includes disaster recovery elements that provide the steps used to return critical functions to operation after an outages. BIA is a part of this and drives decisions to create redundancies.

21
New cards

BIA

This identifies systems and components that are essential to the organization's success. It identifies various scenarios that can impact these systems and components, maximum downtime limits, and potential losses from an incident. Helps identify RTOs and RPOs.

22
New cards

BIND

This is DNS software that runs on Linux or Unix servers. Most internet-based DNS servers use this.

23
New cards

BIOS

A computer's firmware used to manipulate different settings such as the date and time, boot drive, and access password.

24
New cards

BPA

A written agreement that details the relationship between business partners, including their obligations toward the partnership.

25
New cards

BYOD

A policy allowing employess to connect personally owned devices, such as tablets or phones, to a company network.

26
New cards

CA

An organization that manages, issues, and signs certificates and is part of a PKI. Certificates are important part of asymmetric encryption.

27
New cards

CAC

A specialized type of smart card used by the US DoD. It includes photo identification and provides confidentiality, integrity, authentication, and non-repudiation for the users.

28
New cards

CAN

A standard that allows microcontrollers and devices to communicate with each other without a host computer.

29
New cards

CAPTCHA

Technique used to prevent automated tools from interacting with a web site.

30
New cards

CAR

A report used to document actions taken to correct an event, incident, or outage.

31
New cards

CCMP

An encryption protocol based on AES and used with WPA2 for wireless security. It is more secure than TKIP.

32
New cards

CCTV

This is a detective control that provides video surveillance. Provides reliable proof of a person's activity and location.

33
New cards

CERT

A group of experts who respond to security incidents. Includes SIRT, CIRT, or IRT

34
New cards

CHAP

Authentication mechanism where a server challenges a client. More secure than PAP and uses PPP. MS-CHAPv2 is an improvement over this and uses mutual authentication.

35
New cards

CIA

These three form the security triad.

36
New cards

CIO

A "C" level executive position in some organizations. Focuses on using methods within the organization to answer relevant questions and solve problems.

37
New cards

COOP

These planning sites provide alternate location for operations after a critical outage. Includes hot, cold, warm, and mobile sites.

38
New cards

CP

Plans for contingencies in the event of a disaster to keep an organization operation.

39
New cards

CRC

An error detection code used to detect accidental changes that can affect the integrity of data.

40
New cards

CRL

A list of corticates that a CA has revoked. Certificates are commonly revoked if they are compromised, or issued to an employee who has left the organization.

41
New cards

CSR

A method of requesting a certificate from a CA. It starts by creating RSA-based private/public key pair and then including the public key in the CSR.

42
New cards

CSR

A register in a processor used for temporary storage of data.

43
New cards

CSU

A line bridging device used with T1 and similar lines. It typically connects with a DSU.

44
New cards

CTO

A "C" level executive position in some organizations. They focus on technology and evaluate new technologies.

45
New cards

CVE

A dictionary of publicly known security vulnerabilities and exposures.

46
New cards

DAC

An access control model where all objects have owners and owners can modify permissions for the objects.

47
New cards

DACL

List of access control entries in Microsoft NFTS. Each ACE includes a security identifier and permission.

48
New cards

DBA

Administers databases on database servers.

49
New cards

dBd

Identifies the gain of an antenna compared with a type of dipole antenna. Higher of this indicate the antenna can transmit and receive over greater distances.

50
New cards

DDos

An attack on a system launched from multiple sources intended to make a computer's resources or services unavailable to users.

51
New cards

DEP

A security feature in some operating systems. It helps prevent an application or service from executing code from a nonexecutable memory region.

52
New cards

DES

An older symmetric encryption standard used to provide confidentiality. Is a block cipher and it encrypts data in 64 bit blocks. Uses 56 bit keys.

53
New cards

DHCP

A service used to dynamically assign TCP/IP configuration information to clients.

54
New cards

DHE

Instead of using keys that stay the same over a long period, uses ephemeral keys, which changes for each new session.

55
New cards

DLP

A network-based these systems can examine and analyze network traffic. It can detect if confidential company data or any PII data is included in email and reduce the risk of internal users emailing sensitive data outside the organization. End-Point DLP systems can prevent users from copying or printing sensitive data.

56
New cards

DMZ

A buffer zone between the internet and the internal network. It allows access to services while segmenting access to the internal network.

57
New cards

DNAT

A form of NAT that changes the destination IP address for incoming traffic. It is used for port forwarding.

58
New cards

DNAT

A form of NAT that uses multiple public IP addresses.

59
New cards

DNS

Used to resolve host names to IP addresses.

60
New cards

DNSSEC

A suite of specifications used to protect the integrity of DNS records and prevent DNS poisoning attacks.

61
New cards

DoS

An attack from a single source that attempts to disrupt the services provided by the attacked system.

62
New cards

DRP

A document designed to help a company respond to disasters, such as hurricanes, floods, and fires. It includes a hierarchical list of critical systems and often prioritizes services to restore after an outage. Testing validates this.

63
New cards

DSA

A digital signature is an encrypted hash of a message. The sender's private key encrypts the hash of the message to create the digital signature. The recipient decrypts the hash with the sender's public key.

64
New cards

DSL

Improvement over traditional dial-up to access the Internet.

65
New cards

DSU

An interface used to connect equipment to a T1 and similar lines. It typically connects with CSU as a CSU/DSU.

66
New cards

EAP

An authentication framework that provides general guidance for authentication methods.

67
New cards

EAP-TLS

An extension of EAP sometimes used with 802.1x. This is one of the most secure EAP standards and is widely implemented. Requires certificates on the 802.1x server and the wireless clients.

68
New cards

EAP-TTLS

An extension of EAP sometimes used with 802.1x. It allows systems to use some older authentications method such as PAP within a TLS tunnel.

69
New cards

ECC

An asymmetric encryption algorithm commonly used with small wireless devices. It uses small key sizes and requires less processing power than many other encryption methods.

70
New cards

ECDHE

A version of Diffie-Hellman that uses ECC to generate encryption keys. Ephemeral keys are re-created for each session.

71
New cards

EFS

A feature with NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.

72
New cards

EMI

Interference caused by motors, power lines, and fluorescent lights. This shielding prevents outside interferences from corrupting data and prevents data from emanating outside the cable.

73
New cards

ESD

Release of static electricity. Can damage equipment and low humidity causes a higher incidence of this.

74
New cards

ESP

IPsec includes both AH and this. This provides confidentiality, integrity, and authentication using HMAC and AES or 3DES. Is identified with protocol ID number 50.

75
New cards

FACL

An ACL used for file systems.

76
New cards

FCoE

A lower-cost alternative to traditional SANs. It supports sending Fibre Channel commands over an IP network.

77
New cards

FDE

Method to encrypt an entire disk.

78
New cards

FTP

Used to upload and download files to an server. Uses TCP ports 20 and 21.

79
New cards

FTPS

An extension of FTP that uses SSL to encrypt FTP traffic. Some implementations of this use TCP ports 989 and 990.

80
New cards

GPG

Free software based on the OpenPGP standard and used to encrypt and decrypt files.

81
New cards

GPO

Group policy is used within Microsoft Windows to manage users and computers. It is implemented on a domain controller within a domain.

82
New cards

GPS

Can help locate lost mobile devices. Remote wipe, or remote sanitize, erases all data on lost devices.

83
New cards

GRE

A tunneling protocol developed by Cisco systems.

84
New cards

GUI

Users interact with the graphical elements instead of typing commands from a text interface.

85
New cards

HDD

A disk drive that has one or more platters and a spindle.

86
New cards

HIDS

An IDS used to monitor an individual server or workstation. It protects local resources on the host such as the operating system files, and in some cases, it can detect malicious activity missed by antivirus software.

87
New cards

HIPS

An extension of a host-based IDS. Designed to react in real time to catch an attack in action.

88
New cards

HMAC

A hashing algorithm used to verify integrity and authenticity of a message with the use of a shared secret. Combined with MD5 and SHA-1.

89
New cards

HTOP

An open standard used for creating one-time passwords, similar to those used in tokens or key fobs. It combines a secret key and an incrementing counter, and then uses HMAC to create a hash of the result.

90
New cards

HSM

A removable or external device that can generate, store, and manage RSA keys used in asymmetric encryption. High-volume e-commerce sites use this to increase the performance of SSL sessions.

91
New cards

HTML

Language used to create web pages.

92
New cards

HTTP

Used for web traffic on the internet and in intranets. Uses TCP port 80.

93
New cards

HTTPS

Encrypts HTTP traffic with SSL or TLS using TCP port 443.

94
New cards

HVAC

Systems increase availability by regulating airflow within data centers and server rooms. Results in fewer failures and longer MTBF times.

95
New cards

IaaS

A cloud-computing technology that allows an organization to rent access o hardware. Provides customers with access to hardware in a self-managed platform.

96
New cards

ICMP

Used for diagnostics such as ping. Many DoS attacks use this. It is common to block these at firewalls and routers.

97
New cards

IDS

A detective control used to detect attacks after they occur. Monitors a network or host for intrusions and provides ongoing protection.

98
New cards

IGMP

Used for multicasting. Computers belonging to a multicasting group have a multicasting IP address in addition to a standard unicast IP address.

99
New cards

IIS

A Microsoft Windows web server. Comes free with Microsoft products. Linux systems use Apache as a web server.

100
New cards

IKE

Ussed with IPsec to create a secure channel over UDP port 500 in a VPN tunnel.