0% found this document useful (0 votes)
58 views24 pages

CompTIA Sec+ 601 Acronyms Explained PDF

Uploaded by

Huy Nguyen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views24 pages

CompTIA Sec+ 601 Acronyms Explained PDF

Uploaded by

Huy Nguyen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

CompTIA Security+ Acronyms

List of acronyms from CompTIA's official exam guide, and more.

Originally created for Cybr's CompTIA Security+ course and practice exams

Bolded terms were terms that I personally saw on my version of the exam. Keep in mind you won’t
necessarily get the same questions I got so don’t just study for those terms…I just wanted to give you an
idea of what to expect.

Please note:

This list is still a work in progress. I'm working on cleaning it up, and some acronyms don't have
definitions yet. Please bear with me as I get that done :)...also, you're welcome to contribute by
commenting on this page!

Permissions:

Feel free to use this list however you see fit as long as you do not commercialize it. All I ask for in return
is that you give Cybr's course a link back :)

• Christophe

Acronyms
• 3DES (Triple Digital Encryption Standard)
o Deprecated and considered insecure. Replaced by AES
o Symmetric
o Applies the DES cipher algorithm 3 times to each data block
• AAA (Authentication, Authorization, and Accounting)
o Often used to describe RADIUS, or some other form of networking protocol that
provides Authentication, Authorization, and Accounting
• ABAC (Attribute-based Access Control)
o Rights granted through policies that combine attributes together
• Active Directory
o Database and identity service used to provide identity management
o Explanation
• ACL (Access Control List)
o Set of rules that allow/permit or deny any traffic flow through routers
o Looks at the packet to determine whether it should be allowed or denied
o Works at layer 3 to provide security by filtering & controlling the flow of traffic from one
router to another
• AES (Advanced Encryption Standard)
o Industry-standard for data security
o 128-bit, 192-bit, or 256-bit (strongest) implementations
• AES256 (Advanced Encryption Standards 256bit)
o This is the 256-bit implementation of AES
o The 256 references the bit size of keys
• AH (Authentication Header)
o Used to authenticate origins of packets of data transmitted
o These headers don’t hide any data from attackers, but they do provide proof that the
data packets are from a trusted source and that the data hasn’t been tampered with
o Helps protect against replay attacks
• AI (Artificial Intelligence)
o For the exam, be aware of what’s called data poisoning (or tainted training) &
adversarial AI
• AIS (Automated Indicator Sharing)
o DHS and CISA free program
o Enables organizations to share and receive machine-readable cyber threat indicators
(CTIs) and defensive measures (DMs) in real-time
o Useful to monitor and defend networks against known threats
• ALE (Annualized Loss Expectancy)
o ie: can expect x number of devices to fail per year
• AP (Access Point)
o Networking hardware device that provides Wi-Fi access, typically then connected via
wire to the router, or directly integrated in the router itself
• API (Application Programming Interface)
o APIs are used to allow applications to talk to one another
o For example: an application can query an API to retrieve data and then display that data
or process it in some way
• APT (Advanced Persistent Threat)
o Stealthy threat actor (usually nation-state or state-sponsored group) that gains
unauthorized access to a system and remains undetected for a period of time
• ARO (Annualized Rate of Occurrence)
o The calculated probability that a risk will occur in a given year
• ARP (Address Resolution Protocol)
o Helps connect IP devices to MAC addresses
• ASLR (Address Space Layout Randomization)
o Prevent exploitation of memory corruption vulnerabilities
• ASP (Active Server Page)
o Microsoft server-side scripting language and engine to create dynamic web pages
o Superseded by ASP.NET in 2002
• ATT&CK Adversarial Tactics, Techniques, and Common Knowledge
o Knowledge base framework of adversary tactics and techniques based on real-world
observations
o Helpful to build effective threat models and defenses against real threats
• AUP (Acceptable Use Policy)
o Terms that users must accept in order to use a network, system, website, etc...
• AV (Antivirus)
o Antivirus software
o Typically uses signature-based detection
o Not effective against zero-days or polymorphic malware
• BASH (Bourne Again Shell)
o Powerful UNIX shell and command language
o Used to issue commands that get executed, which can also be turned into shell scripts
o Often used for automation
• BCP (Business Continuity Planning)
o Plan used to create processes and systems of both prevention and recovery to deal with
threats that a company faces
o This plan outlines how a business can continue delivering products and services if crap
hits the fan
• BIA (Business Impact Analysis)
o Used to predict the consequences a business would face if there were to be a disruption
• BGP (Border Gateway Protocol)
o "The postal service of the Internet"
o BGP finds the best route for data to travel to reach its destination
• BIOS (Basic Input/Output System)
o Firmware that performs hardware initialization when systems are booting up, and to
provide runtime services for the OS and programs
o First software to run when you power on a device
• BPA (Business Partnership Agreement)
o Defines a contract between two or more parties as to how a business should run
• BPDU (Bridge Protocol Data Unit)
o Frames that have spanning tree protocol information
o Switches send BPDUs with a unique source MAC address to a multicast address with a
destination MAC
• BYOD (Bring Your Own Device)
o When employees use personal devices to connect to their organization’s networks and
access work-related systems
• CA (Certificate Authority)
o An organization that validates the identities of entities through cryptographic keys by
issuing digital certificates
o If you check the padlock on this website (next to the domain name), you'll see that it
says "Connection is secure" and then you can click on "Certificate is valid"
▪ You'll then see info about how the certificate is "Issued to" and "Issued by" as
well as the valid date range
▪ If you click on the "Certification Path" tab, you'll see that it says "DigiCert
Baltimore Root" which is the issuer, aka the certificate authority
• CAC (Common Access Card)
o Smart card for active-duty personnel
• CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
o These are the “problems” you have to solve from time to time to make sure that you are
not a robot
o Typically used for forms (signup, login, purchase, search, etc...) to defend against bots
• CAR (Corrective Action Report)
o Lists defects that need to be rectified
• CASB (Cloud Access Security Broker)
o Acts as an intermediary between the cloud and on-prem
o Monitors all activity
o Enforces security policies
• CBC (Cipher Block Chaining)
o CBC is a mode of operation for block ciphers
o Block ciphers (for encryption) by themselves would only work for a single block of
data…a mode of operation like CBC can be used to give instructions on how to apply
encryption to multiple blocks of data
o CBC helps prevent issues of identical blocks, even if you have identical inputs. It does
that by using an operation called XOR (exclusive-OR)
o Each block gets XORed with the previous ciphertext before being encrypted (the first
block uses an initialization vector, aka IV)
o CBC requires that blocks be processed in order, so you can’t parallelize encryption which
means it runs slower than some of the other modes (ie: ECB)
o Think of CBC as building a chain from left to right
o CBC does have vulnerabilities, including POODLE and Goldendoodle
• CBT (Computer-based Training)
o An online, self-paced, and interactive training system
o Students can set their own goals and learn at their own pace
• CCMP (Counter-Mode/CBC-Mac Protocol)
o Encryption protocol designed for Wireless LAN products
• CCTV (Closed-Circuit Television)
o Camera monitoring system, especially one that transmits back to a centralized location
with a limited number of monitors
o Could be monitored by security personnel or simply set to record
• CERT (Computer Emergency Response Team)
o Expert group that handles computer security incidents
o Could also be called CSIRT, which is short for Computer Security Incident Response
Team
• CIRT (Computer Incident Response Team)
o Same as above
• CFB (Cipher Feedback)
o When a mode of operation uses the ciphertext from the previous block in the chain
o ie: look up Cipher Feedback Mode (CFB)
• CHAP (Challenge Handshake Authentication Protocol)
o Authenticates a user or network host to an authenticating entity
o Provides protection against replay attacks
o Requires that both the client and server know the plaintext of the secret, but it's never
sent over the network
• CIO (Chief Information Officer)
o Company executive responsible for implementing and managing IT
o Mostly considered to be IT generalists
o Useful way to think about it: CIO aims to improve processes within and for the company
• CTO (Chief Technology Officer)
o CTO is different from CIO, and typically focuses on development, engineering, and
research & development departments
o Useful way to think about it: CTO uses technology to improve or create products and
services for customers
• CSO (Chief Security Officer)
o Executives that specialize in security
o Much more focused of a responsibility than CIO
• CIS (Center for Internet Security)
o Non-profit organization that helps put together, validate, and promote best practices to
help people, businesses, and governments protect themselves against cyber threats
• CMS (Content Management System)
o ie: WordPress
• COOP (Continuity of Operation Planning)
o Effort for agencies to make sure they can continue operations during a wide range of
emergencies
o Requires planning for various types of events such as natural or human-caused disasters
• COPE (Corporate Owned Personal Enabled)
o Organization provides its employees with mobile computing devices
• CP (Contingency Planning)
o Used to restore systems and information in the event that systems become
compromised
• CRC (Cyclical Redundancy Check)
o Used to detect accidental changes in digital networks and storage devices
• CRL (Certificate Revocation List)
o List of digital certificates that have been revoked by the issuing certificate authority (CA)
• CSP (Cloud Service Provider)
o ie: AWS, GCP, Azure
• CSR (Certificate Signing Request)
o Contains information that the Certificate Authority (CA) will use to create your
certificate
o Contains the public key for which the certificate should be issued, and other identifying
information
• CSRF (Cross-Site Request Forgery)
o Unauthorized actions are performed on behalf of a legitimate user
• CSU (Channel Service Unit)
o Device used for digital links to transfer data
• CTM (Counter-Mode)
o Converts a block cipher into a stream cipher
o Combines an IV with a counter and uses the result to encrypt each plaintext block
• CVE (Common Vulnerabilities and Exposures)
o List of publicly disclosed computer security flaws
o These security flaws get assigned a CVE ID number which people can use to reference
them
• CVSS (Common Vulnerability Scoring System)
o Public framework used to rate the severity of security vulnerabilities
o ie: if you find a vulnerability as a bug bounty or in your own organization’s systems, and
you report that vulnerability, assigning a CVSS number to it will help decision makers
understand the severity and impact so that they can properly assign priority
• CYOD (Choose Your Own Device)
o Employee can choose a company-assigned device from a limited number of options
• DAC (Discretionary Access Control)
o Restrict access based on the identity of subjects and/or groups that they belong to
• DBA (Database Administrator)
o Personal responsible for maintaining databases and the data that they contain
• DDoS (Distributed Denial of Service)
o An attacker that aims to take a service offline by flooding it with an overwhelming
amount of requests from multiple different locations/devices…
o …as opposed to DoS or Denial of Service attacks which are only sending requests from
one location/device
• DEP (Data Execution Prevention)
o Microsoft security feature
o Monitor and protects pages or regions of memory
o Prevents data regions from executing (potentially malicious) code
• DER (Distinguished Encoding Rules)
• DES (Digital Encryption Standard)
o Weak encryption algorithm
• DHCP (Dynamic Host Configuration Protocol)
o Used to automatically assign IP addresses to devices on a network
o DHCP doesn’t include security features by default, which means that attackers can
leverage it to launch attacks
o Two examples of DHCP attacks include:
▪ DHCP starvation which causes a Denial of Service
▪ DHCP spoofing which leads to on-path attacks
o To prevent attacks, we can use :
▪ Authenticated DHCP - This approach replaces the normal DHCP messages with
authenticated messages. From then on, clients and servers check the
authentication information and reject any messages that come from invalid
sources
▪ We can also use something called Port Security, which limits the number of
MAC addresses that can be seen through a particular switch interface. If the
switch sees a large number of new MAC addresses being sent through that
interface, then it can automatically block connections to prevent an attack.
• DHE (Diffie-Hellman Ephemeral)
o Way of securely exchanging cryptographic keys over public channels
• DKIM (Domain Keys Identified Mail)
o Email authentication technique - applies signatures by the mail server of the sender’s
domain
o Used to detect email spoofing (someone pretending to send email from an organization
they don’t belong to). Can help protect against certain phishing attempts
o Allows the receiver to make sure that an email was sent by the authorized owner of that
domain via digital signatures
o This is different from S/MIME because S/MIME signatures are used to verify the actual
sender and not just the domain being used
o DKIM does not offer encryption of the email
o DKIM and S/MIME can be used together, but typically S/MIME is regarded as a better
proof of sender, so if you had to use just one, it should be S/MIME
• DLL (Dynamic Link Library)
o Library that contains code and data that can be used by programs to function in
Windows
o DLL injections can run malicious code within an application by exploiting DLLs
• DLP (Data Loss Prevention)
o DLP is about detecting and preventing data breaches, exfiltration, or any other
unwanted destruction of sensitive business data
o DLP can include both tools and processes, since there is software specifically designed
for DLP
• DMARC (Domain Message Authentication Reporting and Conformance)
o Authenticates emails with SPF and DKIM
o Used to prevent phishing and spoofing
• DMZ (Demilitarized Zone) or Screened subnet
o Designed to expose externally-facing services to the Internet without unnecessarily
exposing resources in internal networks
o You may have resources that have to be exposed to the Internet, but rather than open
up the internal LAN, we can create a separate network specifically for those resources
and then add firewalls in between the networks
• DNAT (Destination Network Address Transaction)
• DNS (Domain Name Service (Server))
o DNS is the phonebook of the Internet
o Whenever you type in a domain name in your browser (ie: cybr.com) DNS gets used to
figure out where to route your request
• DNSSEC (Domain Name System Security Extensions)
o Provides cryptographic authentication of data, authenticated denial of existence, and
data integrity
• DoS (Denial of Service)
o Denial of Service is any type of attack that aims to prevent normal operations
o For example, if someone purposefully overwhelms a website to prevent real users from
accessing it, that is a form of DoS
• DPO (Data Privacy Officer)
o A DPO is a role/person responsible for protecting an organization’s data
• DRP (Disaster Recovery Plan)
o A DRP is a formal document created by an organization to detail instructions how it
should respond to unplanned incidents (natural disasters, cyber attacks, power outages,
terrorist attacks, etc)
• DSA (Digital Signature Algorithm)
o A public-key algorithm that’s used for generation and verification of digital signatures
• DSL (Digital Subscriber Line)
o DSL transmits data over telephone lines
o This was a common method of getting internet access before cable/fiber
• EAP (Extensible Authentication Protocol)
o Authentication framework used in LANs
• ECB (Electronic Code Book)
o Doesn't hide data patterns well, so it wouldn't work to encrypt images for example
• ECC (Elliptic Curve Cryptography)
o Good for mobile devices because it can use smaller keys
• ECDHE (Elliptic Curve Diffie-Hellman Ephemeral)
o Key exchange mechanism based on elliptic curves
o Cloudflare uses this, for example
• ECDSA (Elliptic Curve Digital Signature Algorithm)
o Digital signature algorithm based on elliptic curve cryptography (ECC)
o What's the difference between this and ECDHE?
• EDR (Endpoint Detection and Response)
o Technology that continuously monitors endpoints to mitigate cyber threats
• EFS (Encrypted File System)
o EFS on Windows provides filesystem-level encryption
o This helps protect data from attackers who have physical access to the drives
• EOL (End of Life)
o Date set where manufacturer will no longer create the product
• EOS (End of Service)
o Original manufacturer no longer offers updates, support, or service
• ERP (Enterprise Resource Planning)
o Software used by orgs to manage day-to-day business activities
• ESN (Electronic Serial Number)
o Electronic serial numbers were created by the U.S. Federal Communications
Commission to uniquely identify mobile devices, from the days of AMPS in the United
States starting in the early 1980s.
• ESP (Encapsulated Security Payload)
o Member of IPsec set of protocols
o Encrypts and authenticates packets of data between computers using VPNs
• FACL (File System Access Control List)
• FDE (Full Disk Encryption)
• FPGA (Field Programmable Gate Array)
o Integrated circuit designed to be configured by a customer or designer after
manufacturing
• FRR (False Rejection Rate)
o Likelihood that a biometric security system will incorrectly reject an access attempt by
an authorized user
• FTP (File Transfer Protocol)
• FTPS (Secured File Transfer Protocol)
• GCM (Galois Counter Mode)
o High speeds with low cost and low latency
o Provides authenticated encryption
• GDPR (General Data Protection Regulation)
• GPG (Gnu Privacy Guard)
• GPO (Group Policy Object)
o Contains two nodes: a user configuration and computer configuration
o Collection of group policy settings
• GPS (Global Positioning System)
• GPU (Graphics Processing Unit)
• GRE (Generic Routing Encapsulation)
o Tunneling protocol
• HA (High Availability)
• HDD (Hard Disk Drive)
• HIDS (Host-Based Intrusion Detection System)
o Detects and alerts upon detecting an intrusion in a host (such as computers) as well as
network packets in network interfaces (similar to NIDS)
o Can't take action on it, though
• HIPS (Host-Based Intrusion Prevention System)
o Like HIDS, but can take action toward mitigating a detected threat
• HMAC (Hashed Message Authentication Code)
o Combines a shared secret key with hashing
o Can be used to verify data integrity and authenticity of a message
• HOTP (HMAC based One Time Password)
o One-time password algorithm based on hash-based message authentication codes
o Event-based OTP (One-Time Password)
o Yubikey is an example of an OTP generator that uses HOTP
o Not time based (has a longer window before expiration)
• HSM (Hardware Security Module)
o Physical device that safeguards and manages digital keys (ie: private CA keys)
o Performs encryption/decryption functions for digital signatures
• HTML (HyperText Markup Language)
• HTTP (Hypertext Transfer Protocol)
• HTTPS (Hypertext Transfer Protocol over SSL/TLS)
• HVAC (Heating, Ventilation, Air Conditioning)
• IaaS (Infrastructure as a Service)
• ICMP (Internet Control Message Protocol)
o Used by network devices (such as routers) to send error messages or other operational
information indicating success/failure when communicating with another IP address
• ICS (Industrial Control Systems)
o General term to describe control systems associated with industrial processes
• IDEA (International Data Encryption Algorithm)
o Symmetric-key block cipher
• IDF (Intermediate Distribution Frame)
o Cable rack in a central office that cross connects and manages IT or telecom cabling
between a main distribution frame (MDF) and remote workstation devices
o Used for WAN and LAN environments, for example
• IdP (Identity Provider)
o Service that stores and manages digital identities
o Provides authentication services to apps within a federation or distributed network
o User authentication as a service
o ie: Google, Facebook, or Twitter login
• IDS (Intrusion Detection System)
• IEEE (Institute of Electrical and Electronics Engineers)
• IKE (Internet Key Exchange)
o UDP port 500
o Protocol used to set up a security association (SA) in the IPsec protocol suite
• IM (Instant Messaging)
• IMAP4 (Internet Message Access Protocol v4)
o API that enables email programs to access the mail server
o ie: Outlook can be configured to retrieve email via IMAP4 (or POP3 as an alternative)
• IoC (Indicators of Compromise)
o Forensic data found in systems via log entries or files that identify potentially malicious
activity on a system or network
• IoT (Internet of Things)
• IP (Internet Protocol)
• IPSec (Internet Protocol Security)
o In the Internet Layer of the TCP/IP Stack
o Secure network protocol suite that authenticates and encrypts the packets of data to
provide encrypted communication
o Used in VPNs
o Can be used to protect data flows between two hosts (host-to-host), two networks
(network-to-network) or between a security gateway and host (network-to-host)
o Protects against replays
• IR (Incident Response)
• IRC (Internet Relay Chat)
• IRP (Incident Response Plan)
o Preperation
o Detection & Analysis
o Containment, Eradication, and Recovery
o Post-Incident Activity
• ISO (International Organization for Standardization)
o Organization that develops and published International Standards
• ISP (Internet Service Provider)
• ISSO (Information Systems Security Officer)
• ITCP (IT Contingency Plan)
o Plans, policies, procedures, and technical measures that enable the recovery of IT
operations after unexpected incidents
• IV (Initialization Vector)
o Used in cryptography is an input to a cryptographic primitive
o Used to provide the initial state
• KDC (Key Distribution Center)
o Used to reduce risks in exchanging keys
o A user requests to use a service. The KDC will use cryptographic techniques to
authenticate requesting users as themselves, and it will check whether a user has the
right to access the service requested
o If the user has the right, the KDC can issue a ticket permitting access
• KEK (Key Encryption Key)
o A key that encrypts another key for transmission or storage
• L2TP (Layer 2 Tunneling Protocol)
o Used to support VPNs or as part of the delivery of services by ISPs
o Uses encryption only for its own control messages, not for content itself
o Uses IPSec for data encryption over Layer 3
• LAN (Local Area Network)
• LDAP (Lightweight Directory Access Protocol)
o Open and vendor-neutral application protocol for managing and interacting with
directory servers
o Often used for authentication and storing information about users, groups, and
applications
o Can be susceptible to LDAP Injections
• LEAP (Lightweight Extensible Authentication Protocol)
o Wireless LAN authentication method
o Dynamic WEP keys and mutual authentication (b/t a wireless client and a RADIUS
server)
• MaaS (Monitoring as a Service)
• MAC (Mandatory Access Control)
o Access control used to limit access to resources based on the sensitivity of the
information that the resource contains and the authorization of the user
o Uses labels which are made up of a security level and zero or more security categories
o Security levels indicate a level or hierarchical classification of the information (ie:
"confidential" or "restricted")
o Security categories define the category or group to which the information belongs
o If the user does not have the proper label for a piece of information, they cannot access
it
• MAC (Media Access Control)
• MAC (Message Authentication Code)
o Authenticates the source of a message and its integrity
o Piece of information used to authenticate a message and make sure it came from the
intended sender without any unintended modifications
• MAM (Mobile Application Management)
o Used to control enterprise applications and app data on end users' devices
o Provides application-level control to IT admins
o Different from MDM because MDM aims to control the entire mobile device and
requires a service agent to be running on the mobile device. MAM instead focuses
purely on apps and their data
o Functionality includes:
▪ Control the installation, updating, or removal of mobile apps via an enterprise
app store
▪ Remotely wipe data from managed apps
▪ Monitor application usage
▪ Control user and group access
▪ Control user authentication
• MAN (Metropolitan Area Network)
o Computer network larger than a single building
• MBR (Master Boot Record)
o Special type of boot sector at the very beginning of partitioned storage
o Holds information about how logical partitions are organized
• MD5 (Message Digest 5)
o Hash function that can very easily be cracked
• MDF (Main Distribution Frame)
• MDM (Mobile Device Management)
o Software that allows administration of devices as a whole
o Different from MAM because MAM focuses on specific applications, while MDM focuses
on controlling entire devices
• MFA (Multifactor Authentication)
• MFD (Multi-Function Device)
o Device that incorporates the functionality of multiple other devices
• MFP (Multi-Function Printer)
o Also includes fax, scanning, copy, etc...
• MITM (Man in the Middle)
o Attacker interrupts a data transfer to eavesdrop
o AKA on-path attacks
• ML (Machine Learning)
• MMS (Multimedia Message Service)
o Used to send messages that include multimedia content
• MOA (Memorandum of Agreement)
o Legally-binding agreement between two parties
• MOU (Memorandum of Understanding)
o Non-legally binding agreement
o Used to signal willingness between parties to move forward with a contract
• MPLS (Multi-Protocol Label Switching)
o Routing technique to direct data from one note to the next based on the short path
labels
• MSA (Measurement Systems Analysis)
o Mathematical method of determining the amount of variation that exists within a
measurement process
• MSCHAP (Microsoft Challenge Handshake)
o Encrypted authentication used in a wide area network (WAN)
• Authentication Protocol
• MSP (Managed Service Provider)
• MSSP (Managed Security Service Provider)
• MTBF (Mean Time Between Failures)
o Predicted time in between failures of a system
• MTTF (Mean Time to Failure)
o Used to predict when a system will fail (and can't be repaired)
• MTTR (Mean Time to Recover)
o Aka mean time to restore
o Average time it takes to recover from a system failure
• MTTR (Mean Time to Repair)
o Represents the average time it takes to repair a system
• MTU (Maximum Transmission Unit)
o Largest packet or frame size that can be sent in a packet or frame-based network such
as the Internet
• NAC (Network Access Control)
o Provides visibility, access control, and compliance
o Can define and implement strict access management controls for networks
o Centralized solution to end-point security
o Uses IEEE 802.1X standard
o Usually works with TACACS or RADIUS to verify authentication
• NAS (Network Attached Storage)
• NAT (Network Address Translation)
• NDA (Non-Disclosure Agreement)
• NFC (Near Field Communication)
o Mobile payment
o Key cards
o Smart cards
• NFV (Network Functions Virtualization)
o Virtualizes entire classes of network node functions into building blocks
• NIC (Network Interface Card)
• NIDS (Network Based Intrusion Detection System)
o Detects malicious traffic on a network
• NIPS (Network Based Intrusion Prevention System)
o Detects and prevents malicious traffic on a network
• NIST (National Institute of Standards & Technology)
• NTFS (New Technology File System)
o Used by Windows NT to store, organize, and find files on an HD efficiently
• NTLM (New Technology LAN Manager)
o Used to authenticate user identity and protect the integrity and confidentiality of their
activity
o SSO tool
o Relies on a challenge-response protocol to confirm the user without requiring them to
submit a password
o NTLM has known vulnerabilities and is typically only still used for legacy clients and
server
o Replaced by Kerberos
o NTLM relies on a three-way handshake between the client and server to authenticate a
user, while Kerberos uses a two-part process that leverages a ticket granting service or
key distribution center (KDC)
• NTP (Network Time Protocol)
o Port 123 (UDP)
o Sync time
• OAUTH (Open Authorization)
o Token-based authentication
o Lets organizations share info across third-party services without exposing their users'
usernames/passwords
• OCSP (Online Certificate Status Protocol)
o Used by CAs to check the revocation status of an X.509 digital certificate
• OID (Object Identifier)
o Standard for naming any object, concept, or thing
• OS (Operating System)
• OSI (Open Systems Interconnection)
o Conceptual model
• OSINT (Open Source Intelligence)
• OSPF (Open Shortest Path First)
o Distributes routing information between routers
• OT (Operational Technology)
o Hardware/software that detects or causes a change by directly monitoring and/or
controlling industrial equipment, assets, processes, and events
• OTA (Over The Air)
o Pushing updates for software, configuration settings, or even encryption keys, on
remote devices
• OTG (On The Go)
• OVAL (Open Vulnerability Assessment Language)
o Community standard to promote open and publicly available security content, and to
standardize the transfer of this information
• OWASP (Open Web Application Security Project)
• P12 (PKCS #12)
o Archive file format for storing cryptography objects as a single file
o Used to bundle a private key with its X.509 certificate, or to bundle the members of a
chain of trust
o Think of it as a container for X.509 public key certs, private keys, CRLs, and generic data
• P2P (Peer to Peer)
• PaaS (Platform as a Service)
• PAC (Proxy Auto Configuration)
o Used to define how web browsers and other user agents can automatically choose the
appropriate proxy server for fetching URLs
o Contains a JavaScript function that returns a string with one or more access method
specifications
• PAM (Privileged Access Management)
o Safeguarding identities with special access or admin capabilities
• PAM (Pluggable Authentication Modules)
o Used to separate the tasks of authentication from applications
o Apps can call PAM libraries to check permissions
• PAP (Password Authentication Protocol)
o Two-way handshake to provide the peer system with a simple method to establish its
identity
• PAT (Port Address Translation)
• PBKDF2 (Password-Based Key Derivation Function 2)
o Key derivation functions with a sliding computation cost, which is used to reduce
vulnerabilities of brute-force attacks
o Applies a pseudorandom function (like HMAC) to the input password along with a salt
value, and repeats this process multiple times to produce a derived key
o Derived key can then be used as a cryptographic key
• PBX (Private Branch Exchange)
o Telephone system that switches calls between users on local line
o Multiline telephone system
• PCAP (Packet Capture)
o Collects and records packet data from a network which can then be analyzed
• PCI DSS (Payment Card Industry Data Security Standard)
o Security standards to use when accepting, processing, storing, or transmitting credit
card information
• PDU (Power Distribution Unit)
o Provides multiple electric power outputs
• PEAP (Protected Extensible Authentication Protocol)
o Provides a method to transport securely authenticated data including legacy password-
based protocols, via 802.11 wifi
o Uses tunneling between PEAP clients and an auth server
• PED (Personal Electronic Device)
o Devices like phones, laptops, pagers, radios, etc..
• PEM (Privacy Enhanced Mail)
o File format for storing and sending cryptographic keys, certificates, and other data
o For example, when using SSH, you will often use a .pem file
o Encodes the binary data using base64
o Starts with -----BEGIN a label and then -----
• PFS (Perfect Forward Secrecy)
o Feature of specific key agreement protocols that give assurances that session keys will
not be compromised, even if long-term secrets used in the session key exchange are
compromised
o ie: for HTTPS, the long-term secret is usually the private key of the server

PFX (Personal Information Exchange)


• PGP (Pretty Good Privacy)
o Encryption program used to provide cryptographic privacy and authentication for data
communication
o Useful for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole
disk partitions
• PHI (Personal Health Information)
• PII (Personally Identifiable Information)
• PIV (Personal Identity Verification)
o MFA on a smartcard
o Used for identity proofing
• PKCS (Public-Key Cryptography Standards)
o Group of standards for public keys
• PKI (Public Key Infrastructure)
o Roles, policies, hardware, software, and procedures needed to create, manage,
distribute, use, store, and revoke digital certificates and manage public-key encryption
• POP (Post Office Protocol)
o Most commonly used message request protocol for transferring messages from e-mail
servers to e-mail clients
• POTS (Plain Old Telephone Service)
• PPP (Point-to-Point Protocol)
o Communication between two routers directly without any hosts or other networks in
between
o Data Link Layer
• PPTP (Point-to-Point Tunneling Protocol)
o Obsolete method of implementing virtual private networks
o Port 1723
• PSK (Pre-Shared Key)
o Shared secrets sent using a secure channel before it needs to be used
• PTZ (Pan-Tilt-Zoom)
o Camera that can be remotely controlled, including zoom and directional control
• QA (Quality Assurance)
• QoS (Quality of Service)
o Performance of systems by the users of the network/systems
• PUP (Potentially Unwanted Program)
• RA (Recovery Agent)
• RA (Registration Authority)
• RACE (Research and Development in Advanced Communications Technologies in Europe)
• RAD (Rapid Application Development)
o Agile software development approach
o Focuses on ongoing software projects and user feedback and less on following a strict
plan
o Emphasizes rapid prototyping over costly planning
• RADIUS (Remote Authentication Dial-in User Serve)
o Provides centralized authentication to protect networks against unauthorized use
o Could also be used for device administration, but its primary purpose is network
authentication
o Combines authentication and authorization
o Encrypts only the password field, not the entire packet.
• RAID (Redundant Array of Inexpensive Disks)
o Storage virtualization technology that combines multiple physical disk drive components
into one or more logical units
o Used to increase data redundancy, performance, or both
o Striping - spreads blocks of data across multiple disks. Great for increased performance
but provides zero data redundancy or protection
o Mirroring - copies the same data across disks. Provides data redundancy and protection
from failure, but requires more disks which increases cost
o Parity - calculated value that gets used to restore data from multiple drives if one of the
drives were to fail. This prevents the need to mirror using separate drives since parity is
spread among disks.
o RAID 0 - striping
▪ Needs 2 drives minimum
o RAID 1 - mirroring
▪ Needs 2 drives minimum
o RAID 4 - striping and parity
▪ Needs 3 drives minimum
o RAID 5 - striping and parity
▪ Needs 3 drives minimum
o RAID 6 - striping and parity
▪ Needs 4 drives minimum
• RAM (Random Access Memory)
• RAS (Remote Access Server)
• RAT (Remote Access Trojan)
o Malware that gives the attacker admin control over the target computer
o Typically used to then take further action
• RBAC (Role-based access control)
o Used to assign rights and permissions based on roles of users
o Roles are usually assigned by groups
• RC4 (Rivest Cipher version 4)
o Insecure
o WEP
• RCS (Rich Communication Services)
• RFC (Request for Comments)
• RFID (Radio Frequency Identifier)
o Uses electromagnetic fields to automatically identify and track tags attached to objects
o Consists of a tiny radio transponder, a radio receiver, and a transmitter
o Made up of tags and readers
• RIPEMD RACE Integrity Primitives
o Family of hash functions
• Evaluation Message Digest
o Helps guarantee a low number of collisions
• ROI (Return on Investment)
• RPO (Recovery Point Objective)
o The maximum amount of data (measured by time) that can be lost after a recovery from
a disaster or failure
o Used to determine the frequency of backups
o ie: if an RPO is 70 minutes, you require system backups every 70 minutes
• RSA (Rivest, Shamir, & Adleman)
o Algorithm used to encrypt and decrypt messages (public-key cryptosystem)
o Asymmetric...the public key can be known to everyone
o Messages encrypted using the public key can only be decrypted with the private key
o Slower than some
• RTBH (Remote Triggered Black Hole)
o Can be used to drop traffic before it enters a protected network
o A common use is to mitigate DDoS
• RTO (Recovery Time Objective)
o Max amount of time it can take to recover after a failure or disaster before the business
is significantly impacted
• RTOS (Real-Time Operating System)
o Event-driven and preemptive
o Switches between tasks based on their priorities (event-driven) or on a regular clocked
interrupts and on events (time-sharing)
• RTP (Real-Time Transport Protocol)
o Used to transfer audio/video over IP networks
o Streaming media, for example
• S/MIME (Secure/Multipurpose Internet Mail Extensions)
o Provides a way to integrate public-key encryption and digital signatures into most
modern email clients.
o This would encrypt all email information from client to client, regardless of the
communication used between email servers
• SaaS (Software as a Service)
• SAE (Simultaneous Authentication of Equals)
o Secure password-based authentication and password-authenticated key agreement
method
• SAML (Security Assertions Markup Language)
o XML-based markup language for security assertions
o Allows an IdP to authenticate users and then pass an auth token to another application
(service provider)
• SAN (Storage Area Network)
o Dedicated, independent high-speed network that interconnects and delivers shared
pools of storage devices to multiple servers
• SAN (Subject Alternative Name)
o Extension to X.509 that allows various values to be associated with a security certificate
• SCADA (System Control and Data Acquisition)
o Control system for high-level supervision of machines and processes
• SCAP (Security Content Automation Protocol)
• SCEP (Simple Certificate Enrollment Protocol)
o Makes the request and issuing of digital certificates as simple as possible
• SDK (Software Development Kit)
o Collection of software development tools you can install in one package
• SDLC (Software Development Life Cycle)
• SDLM (Software Development Life-cycle Methodology)
• SDN (Software Defined Networking)
o Makes networking a bit more like cloud computing than traditional network
management by defining network technology via software
• SDV (Software Defined Visibility)
o Framework that allows customers, security and network equipment vendors, as well as
MSPs, to control and program Gigamon's Visibility Fabric via REST-based APIs
• SED (Self-Encrypting Drives)
o Data gets encrypted as it gets added to disk (HDD and SSD)
• SEH (Structured Exception Handler)
o A way of handling both software and hardware exceptions/failures gracefully
• SFTP (Secured File Transfer Protocol)
• SHA (Secure Hashing Algorithm)
o One-way functions
• SHTTP (Secure Hypertext Transfer Protocol)
o Obsolete alternative to HTTPS
• SIEM (Security Information and Event Management)
• SIM (Subscriber Identity Module)
• SIP (Session Initiation Protocol)
o Used to initiate, maintain, and terminate real-time sessions that include voice, video,
and messaging apps
• SLA (Service Level Agreement)
• SLE (Single Loss Expectancy)
o Monetary value of an asset
o % of loss for each realized threat
• S/MIME (Secure/Multipurpose Internet Mail Exchanger)
o Widely accepted protocol for sending digitally signed and encrypted messages
• SMS (Short Message Service)
• SMTP (Simple Mail Transfer Protocol)
o Protocol for electronic mail
• SMTPS (Simple Mail Transfer Protocol Secure)
• SNMP (Simple Network Management Protocol)
o Networking protocols used for the management and monitoring of network-connected
devices in IP networks
• SOAP (Simple Object Access Protocol)
o Lightweight XML-based protocol that's used for exchanging information in
decentralized, distributed application environments
o Versus REST, which mostly uses JSON
• SOAR (Security Orchestration, Automation, Response)
o Technologies that enable orgs to collect inputs monitored by the security operations
team
o ie: alerts from the SIEM and other security tech where incident analysis and triage can
be performed by leveraging a combination of human and machine power
• SoC (System on Chip)
o Raspberry Pi is an example of SoC
o Multiple components running on a single chip
• SOC (Security Operations Center)
• SPF (Sender Policy Framework)
o Email-authentication technique which is used to prevent spammers from sending
messages on behalf of your domain
• SPIM (Spam over Internet Messaging)
• SQL (Structured Query Language)
o SQL is used to communicate with SQL databases in order to create, read, update, or
delete data
• SQLi (SQL Injection)
o SQL injections are a type of web-based attack that target SQL databases to either extract
data, insert data, modify database settings, or — in extreme cases — take control of the
host server
• SRTP (Secure Real-Time Protocol)
o Provides encryption, message authentication and integrity, and replay attack protection
to the RTP data
• SSD (Solid State Drive)
o Physical storage device comparable to hard drives but that uses different technology
• SSH (Secure Shell)
• SSL (Secure Sockets Layer)
• SSO (Single Sign-On)
• STIX (Structured Threat Information eXchange)
o XML structured language for sharing threat intelligence
o Like TAXII, STIX is a community-driven project
• STP (Shielded Twisted Pair)
• SWG (Secure Web Gateway)
o Protects users from web-based threads and applies and enforces corporate acceptable
use policies
o Instead of connecting directly to a website, the user accesses the SWG, which then
connects the user to the desired website
o This helps with URL filtering, web visibility, malicious content inspection, web access
controls, and more
• TACACS+ (Terminal Access Controller Access Control System)
o Port 49
o Authentication protocol used for remote communication with any server in a UNIX
network or terminals
o Uses allow/deny mechanisms with auth keys that correspond to usernames and
passwords
o Primarily used for device administration, but can technically be used for some network
management
o Encrypts the entire packet
o Separates authentication and authorization
• TAXII (Trusted Automated eXchange of Indicator Information)
o Aims to enable robust, secure, and high-volume exchanges of cyber threat information
• TCP/IP (Transmission Control Protocol/Internet Protocol)
• TGT (Ticket Granting Ticket)
o Files created by the key distribution center (KDC) portion of the Kerberos authentication
protocol
o Used to grant users access to network resources
o Once the user has the TGT, they use it to obtain a service ticket from the Ticket Granting
Service (TGS), at which point the user is granted access
• TKIP (Temporal Key Integrity Protocol)
o Security protocol used in IEEE 802.11 wireless networking standard
• TLS (Transport Layer Security)
o Successor of deprecated SSL
o Provides secure communications
• TOTP (Time-based One Time Password)
o String of dynamic digits of code who change values based on time
o Used for MFA
• TPM (Trusted Platform Module)
o Dedicated microcontroller/chip designed to secure hardware with integrated crypto
keys
• TSIG (Transaction Signature)
o Computer-networking protocol, primarily enables DNS to authenticate updates to a DNS
database
• TTP (Tactics, Techniques, and Procedures)
o Behaviors, methods, tools, and strategies that cyber threat actors and hackers use to
plan and execute cyber attacks on business networks
• UAT (User Acceptance Testing)
o Last phase of the software testing process
o Actual software users test the software to make sure it can handle necessary, real-world
tasks and scenarios, according to specifications
o Aka User Acceptability Testing or End-User testing
• UAV (Unmanned Aerial Vehicle)
• UDP (User Datagram Protocol)
• UEFI (Unified Extensible Firmware Interface)
o Specification that defines a software interface between an OS and platform firmware
o Replaces the legacy BIOS firmware interface, but provides legacy BIOS services
o UEFI can support remote diagnostics and repair of computers, even if no OS is installed
• UEM (Unified Endpoint Management)
o Allows you to manage, secure, and deploy resources and apps on any device from a
single console
o Goes beyond just MDM since it can also control PCs, or IoT devices, for example
• UPS (Uninterruptable Power Supply)
o Provides an emergency power to a load in the event of power failure
• URI (Uniform Resource Identifier)
o Identifier for a specific resource
• URL (Universal Resource Locator)
o All URLs are URIs, but not all URIs are URLs
o If the protocol (http, https, ftp, etc) is present or implied, then it's a URL
• USB (Universal Serial Bus)
• USB OTG (USB On The Go)
o Allows USB devices to act as a host, allowing other USB devices to attack to them
o Those devices can then switch back and forth between the roles of host and device
o For example, a phone may read from the removal media as the host, but then act as a
mass storage device
• UTM (Unified Threat Management)
o When a single hardware or software provides multiple security functions
o This is in contrast of having individual solutions for each security function
• UTP (Unshielded Twisted Pair)
• VBA (Visual Basic)
o Event-driven programming language from Microsoft

VDE (Virtual Desktop Environment)


• VDI (Virtual Desktop Infrastructure)
o When the desktop and application software is separated from the hardware
• VLAN (Virtual Local Area Network)
o A partitioned and isolated part of a LAN created with logic (not physical separation)
• VLSM (Variable Length Subnet Masking)
o A design where subnets can have varying sizes
• VM (Virtual Machine)
• VoIP (Voice over IP)
o Voice communications over Internet Protocol networks
• VPC (Virtual Private Cloud)
o On-demand pool of shared resources in a public cloud environment
o Provides isolation between organization and resources
o Lets you essentially carve out a piece of the public cloud to host your private resources
• VPN (Virtual Private Network)
o Encrypted connection over the Internet from a device to a network
o Helps ensure that you can communicate with remote systems securely and prevents
eavesdropping on the traffic
• VTC (Video Teleconferencing)
• WAF (Web Application Firewall)
o A WAF, or Web Application Firewall, is often placed in front of web apps and APIs to
help defend against common attacks (like DDoS, XSS, SQL injections, etc)
o This is not a silver bullet and can oftentimes be bypassed by skilled attacks
o It can also only really defend web apps and APIs, not things like internal networks
• WAP (Wireless Access Point)
o Allows other wifi devices to connect to a wired network
• WEP (Wired Equivalent Privacy)
o Security protocol that used to be used until it was found that it was inadequate
• WIDS (Wireless Intrusion Detection System)
o Can detect the presence of unauthorized access points and create alerts
o They can also identify network break-in attempts
• WIPS (Wireless Intrusion Prevention System)
o Can detect the presence of unauthorized access points and automatically take action
such as quarantining devices or kicking them off networks
• WORM (Write Once Read Many)
o Data storage device where information, once written, can't be modified
o Great to ensure the data doesn't get tampered with
• WPA (WiFi Protected Access)
o Designed to be more secure than WEP
o WPA vs WPA2
▪ WPA uses TKIP, while WPA2 can use TKIP or AES (which is usually preferred)
• WPS (WiFi Protected Setup)
o Flawed security mechanism used for routers - can be brute forced
• WTLS (Wireless TLS)
o Security level for WAP (Wireless Application Protocol) apps
• XaaS (Anything as a Service)
o Term used to describe anything that can be used or sold as a service. For example, you
can have Database as a Service (DaaS), Authentication as a Service (AaaS), etc…
• XML (Extensible Markup Language)
o XML is markup language, kind of like HTML (take a look at some examples on Google)
o XML has vulnerabilities that can be exploited, such as with XXE
• XOR (Exclusive Or)
o Logical operator that returns true (represented by a 1) if its arguments are different (ie:
one argument is 0 and the other is 1)
o If the arguments are the same, then XOR returns a 0
• XSRF (Cross-Site Request Forgery)
o Same as CSRF
• XSS (Cross-Site Scripting)
o XSS, or Cross-Site Scripting is a type of web-based attack
• X.509
o Standard defining the format of public-key certificates
• 802.1X
o Network authentication protocol
o Defines the standards for using EAP to authenticate clients through authenticators
(router/switch/network device), using an authentication server (such as RADIUS)
o Devices/users connecting need to provide credentials and prove their identity to get
access to the network
o Usually authenticated by AD, RADIUS

You might also like