Uploaded by Bryan S

Acronyms

advertisement
Acronyms
3DES (Triple Digital Encryption Standard)
o Deprecated and considered insecure. Replaced by AES
o Symmetric
o Applies the DES cipher algorithm 3 times to each data block
AAA (Authentication, Authorization, and Accounting)
o Often used to describe RADIUS, or some other form of networking protocol that provides Authentication,
Authorization, and Accounting
ABAC (Attribute-based Access Control)
o Rights granted through policies that combine attributes together
Active Directory
o Database and identity service used to provide identity management
ACL (Access Control List)
o Set of rules that allow/permit or deny any traffic flow through routers
o Looks at the packet to determine whether it should be allowed or denied
o Works at layer 3 to provide security by filtering & controlling the flow of traffic from one router to another
AES (Advanced Encryption Standard)
o Industry-standard for data security
o 128-bit, 192-bit, or 256-bit (strongest) implementations
AES256 (Advanced Encryption Standards 256bit)
o This is the 256-bit implementation of AES
o The 256 references the bit size of keys
AH (Authentication Header)
o Used to authenticate origins of packets of data transmitted
o These headers don’t hide any data from attackers, but they do provide proof that the data packets are from a
trusted source and that the data hasn’t been tampered with
o Helps protect against replay attacks
AI (Artificial Intelligence)
o For the exam, be aware of what’s called data poisoning (or tainted training) & adversarial AI
AIS (Automated Indicator Sharing)
o DHS and CISA free program
o Enables organizations to share and receive machine-readable cyber threat indicators (CTIs) and defensive
measures (DMs) in real-time
o Useful to monitor and defend networks against known threats
ALE (Annualized Loss Expectancy)
o i.e.: can expect x number of devices to fail per year
AP (Access Point)
o Networking hardware device that provides Wi-Fi access, typically then connected via wire to the router, or
directly integrated in the router itself
API (Application Programming Interface)
o APIs are used to allow applications to talk to one another
o For example: an application can query an API to retrieve data and then display that data or process it in
some way
APT (Advanced Persistent Threat)
o Stealthy threat actor (usually nation-state or state-sponsored group) that gains unauthorized access to a
system and remains undetected for a period of time
ARO (Annualized Rate of Occurrence)
o The calculated probability that a risk will occur in a given year
ARP (Address Resolution Protocol)
o Helps connect IP devices to MAC addresses
ASLR (Address Space Layout Randomization)
o Prevent exploitation of memory corruption vulnerabilities
ASP (Active Server Page)
o Microsoft server-side scripting language and engine to create dynamic web pages
o Superseded by ASP.NET in 2002
ATT&CK Adversarial Tactics, Techniques, and Common Knowledge
o Knowledge base framework of adversary tactics and techniques based on real-world
observations
o Helpful to build effective threat models and defenses against real threats
AUP (Acceptable Use Policy)
o Terms that users must accept in order to use a network, system, website, etc...
AV (Antivirus)
o Antivirus software
o Typically uses signature-based detection
o Not effective against zero-days or polymorphic malware
BASH (Bourne Again Shell)
o Powerful UNIX shell and command language
o Used to issue commands that get executed, which can also be turned into shell scripts
o Often used for automation
BCP (Business Continuity Planning)
o Plan used to create processes and systems of both prevention and recovery to deal with threats
that a company faces
o This plan outlines how a business can continue delivering products and services if crap hits the
fan
BIA (Business Impact Analysis)
o Used to predict the consequences a business would face if there were to be a disruption
BGP (Border Gateway Protocol)
o "The postal service of the Internet"
o BGP finds the best route for data to travel to reach its destination
BIOS (Basic Input/Output System)
o Firmware that performs hardware initialization when systems are booting up, and to provide runtime
services for the OS and programs
o First software to run when you power on a device
BPA (Business Partnership Agreement)
o Defines a contract between two or more parties as to how a business should run
BPDU (Bridge Protocol Data Unit)
o Frames that have spanning tree protocol information
o Switches send BPDUs with a unique source MAC address to a multicast address with a
destination MAC
BYOD (Bring Your Own Device)
o When employees use personal devices to connect to their organization’s networks and access
work-related systems
CA (Certificate Authority)
o An organization that validates the identities of entities through cryptographic keys by issuing
digital certificates
o If you check the padlock on this website (next to the domain name), you'll see that it says
"Connection is secure" and then you can click on "Certificate is valid"
 You'll then see info about how the certificate is "Issued to" and "Issued by" as well as the
valid date range
 If you click on the "Certification Path" tab, you'll see that it says "DigiCert Baltimore
Root" which is the issuer, aka the certificate authority
CAC (Common Access Card)
o Smart card for active-duty personnel
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
o These are the “problems” you have to solve from time to time to make sure that you are not a
robot
o Typically used for forms (signup, login, purchase, search, etc...) to defend against bots
CAR (Corrective Action Report)
o Lists defects that need to be rectified
CASB (Cloud Access Security Broker)
o Acts as an intermediary between the cloud and on-prem
o Monitors all activity
o Enforces security policies
CBC (Cipher Block Chaining)
o CBC is a mode of operation for block ciphers
o Block ciphers (for encryption) by themselves would only work for a single block of data…a
mode of operation like CBC can be used to give instructions on how to apply encryption to
multiple blocks of data
o CBC helps prevent issues of identical blocks, even if you have identical inputs. It does that by
using an operation called XOR (exclusive-OR)
o
o
o
o
Each block gets XORed with the previous ciphertext before being encrypted (the first block uses
an initialization vector, aka IV)
CBC requires that blocks be processed in order, so you can’t parallelize encryption which means
it runs slower than some of the other modes (i.e.: ECB)
Think of CBC as building a chain from left to right
CBC does have vulnerabilities, including POODLE and Goldendoodle
CBT (Computer-based Training)
o An online, self-paced, and interactive training system
o Students can set their own goals and learn at their own pace
CCMP (Counter-Mode/CBC-Mac Protocol)
o Encryption protocol designed for Wireless LAN products
CCTV (Closed-Circuit Television)
o Camera monitoring system, especially one that transmits back to a centralized location with a
limited number of monitors
o Could be monitored by security personnel or simply set to record
CERT (Computer Emergency Response Team)
o Expert group that handles computer security incidents
o Could also be called CSIRT
CIRT (Computer Incident Response Team)
o Same as above
CFB (Cipher Feedback)
o When a mode of operation uses the ciphertext from the previous block in the chain
o i.e.: look up Cipher Feedback Mode (CFB)
CHAP (Challenge Handshake Authentication Protocol)
o Authenticates a user or network host to an authenticating entity
o Provides protection against replay attacks
o Requires that both the client and server know the plaintext of the secret, but it's never sent over
the network
CIO (Chief Information Officer)
o Company executive responsible for implementing and managing IT
o Mostly considered to be IT generalists
o Useful way to think about it: CIO aims to improve processes within and for the company
CTO (Chief Technology Officer)
o CTO is different from CIO, and typically focuses on development, engineering, and research &
development departments
o Useful way to think about it: CTO uses technology to improve or create products and services for
customers
CSO (Chief Security Officer)
o Executives that specialize in security
o Much more focused of a responsibility than CIO
CIS (Center for Internet Security)
o
Non-profit organization that helps put together, validate, and promote best practices to help
people, businesses, and governments protect themselves against cyber threats
CMS (Content Management System)
o i.e.: WordPress
COOP (Continuity of Operation Planning)
o Effort for agencies to make sure they can continue operations during a wide range of
emergencies
o Requires planning for various types of events such as natural or human-caused disasters
COPE (Corporate Owned Personal Enabled)
o Organization provides its employees with mobile computing devices
CP (Contingency Planning)
o Used to restore systems and information in the event that systems become compromised
CRC (Cyclical Redundancy Check)
o Used to detect accidental changes in digital networks and storage devices
CRL (Certificate Revocation List)
o List of digital certificates that have been revoked by the issuing CA
CSP (Cloud Service Provider)
o i.e.: AWS, GCP, Azure
CSR (Certificate Signing Request)
o Contains information that the Certificate Authority (CA) will use to create your certificate
o Contains the public key for which the certificate should be issued, and other identifying
information
CSRF (Cross-Site Request Forgery)
o Unauthorized actions are performed on behalf of a legitimate user
CSU (Channel Service Unit)
o Device used for digital links to transfer data
CTM (Counter-Mode)
o Converts a block cipher into a stream cipher
o Combines an IV with a counter and uses the result to encrypt each plaintext block
CVE (Common Vulnerabilities and Exposures)
o List of publicly disclosed computer security flaws
o These security flaws get assigned a CVE ID number which people can use to reference them
CVSS (Common Vulnerability Scoring System)
o Public framework used to rate the severity of security vulnerabilities
o i.e.: if you find a vulnerability as a bug bounty or in your own organization’s systems, and you
report that vulnerability, assigning a CVSS number to it will help decision makers understand the
severity and impact so that they can properly assign priority
CYOD (Choose Your Own Device)
o
Employee can choose a company-assigned device from a limited number of options
DAC (Discretionary Access Control)
o Restrict access based on the identity of subjects and/or groups that they belong to
DBA (Database Administrator)
o Personal responsible for maintaining databases and the data that they contain
DDoS (Distributed Denial of Service)
o An attacker that aims to take a service offline by flooding it with an overwhelming amount of
requests from multiple different locations/devices…
o …as opposed to DoS or Denial of Service attacks which are only sending requests from one
location/device
DEP (Data Execution Prevention)
o Microsoft security feature
o Monitor and protects pages or regions of memory
o Prevents data regions from executing (potentially malicious) code
DER (Distinguished Encoding Rules)
DES (Digital Encryption Standard)
DHCP (Dynamic Host Configuration Protocol)
o Used to automatically assign IP addresses to devices on a network
o DHCP doesn’t include security features by default, which means that attackers can leverage it to launch
attacks
o Two examples of DHCP attacks include:
 DHCP starvation which causes a Denial of Service
 DHCP spoofing which leads to on-path attacks
o
To prevent attacks, we can use :
 Authenticated DHCP - This approach replaces the normal DHCP messages with authenticated
messages. From then on, clients and servers check the authentication information and reject any
messages that come from invalid sources
 We can also use something called Port Security, which limits the number of MAC addresses that can
be seen through a particular switch interface. If the switch sees a large number of new MAC
addresses being sent through that interface, then it can automatically block connections to prevent an
attack.
DHE (Diffie-Hellman Ephemeral)
o Way of securely exchanging cryptographic keys over public channels
DKIM (Domain Keys Identified Mail)
o Email authentication technique - applies signatures by the mail server of the sender’s domain
o Used to detect email spoofing (someone pretending to send email from an organization they
don’t belong to). Can help protect against certain phishing attempts
o Allows the receiver to make sure that an email was sent by the authorized owner of that domain
via digital signatures
o This is different from S/MIME because S/MIME signatures are used to verify the actual sender
and not just the domain being used
o DKIM does not offer encryption of the email
o
DKIM and S/MIME can be used together, but typically S/MIME is regarded as a better proof of
sender, so if you had to use just one, it should be S/MIME
DLL (Dynamic Link Library)
o Library that contains code and data that can be used by programs to function in Windows
o DLL injections can run malicious code within an application by exploiting DLLs
DLP (Data Loss Prevention)
o DLP is about detecting and preventing data breaches, exfiltration, or any other unwanted
destruction of sensitive business data
o DLP can include both tools and processes, since there is software specifically designed for DLP
DMARC (Domain Message Authentication Reporting and Conformance)
o Authenticates emails with SPF and DKIM
o Used to prevent phishing and spoofing
o Weak encryption algorithm
DMZ (Demilitarized Zone) or Screened subnet
o Designed to expose externally-facing services to the Internet without unnecessarily exposing
resources in internal networks
o You may have resources that have to be exposed to the Internet, but rather than open up the
internal LAN, we can create a separate network specifically for those resources and then add
firewalls in between the networks
DNAT (Destination Network Address Transaction)
DNS (Domain Name Service (Server))
o DNS is the phonebook of the Internet
o Whenever you type in a domain name in your browser (i.e.: cybr.com) DNS gets used to figure
out where to route your request
DNSSEC (Domain Name System Security Extensions)
o Provides cryptographic authentication of data, authenticated denial of existence, and data
integrity
DoS (Denial of Service)
o Denial of Service is any type of attack that aims to prevent normal operations
o For example, if someone purposefully overwhelms a website to prevent real users from accessing
it, that is a form of DoS
DPO (Data Privacy Officer)
o A DPO is a role/person responsible for protecting an organization’s data
DRP (Disaster Recovery Plan)
o A DRP is a formal document created by an organization to detail instructions how it should
respond to unplanned incidents (natural disasters, cyber-attacks, power outages, terrorist attacks,
etc)
DSA (Digital Signature Algorithm)
o A public-key algorithm that’s used for generation and verification of digital signatures
DSL (Digital Subscriber Line)
o
o
DSL transmits data over telephone lines
This was a common method of getting internet access before cable/fiber
EAP (Extensible Authentication Protocol)
o Authentication framework used in LANs
ECB (Electronic Code Book)
o Doesn't hide data patterns well, so it wouldn't work to encrypt images for example
ECC (Elliptic Curve Cryptography)
o Good for mobile devices because it can use smaller keys
ECDHE (Elliptic Curve Diffie-Hellman Ephemeral)
o Key exchange mechanism based on elliptic curves
o Cloudflare uses this, for example
ECDSA (Elliptic Curve Digital Signature Algorithm)
o Digital signature algorithm based on elliptic curve cryptography (ECC)
o What's the difference between this and ECDHE?
EDR (Endpoint Detection and Response)
o Technology that continuously monitors endpoints to mitigate cyber threats
EFS (Encrypted File System)
o EFS on Windows provides filesystem-level encryption
o This helps protect data from attackers who have physical access to the drives
EOL (End of Life)
o Date set where manufacturer will no longer create the product
EOS (End of Service)
o Original manufacturer no longer offers updates, support, or service
ERP (Enterprise Resource Planning)
o Software used by orgs to manage day-to-day business activities
ESN (Electronic Serial Number)
o Electronic serial numbers were created by the U.S. Federal Communications Commission to
uniquely identify mobile devices, from the days of AMPS in the United States starting in the
early 1980s.
ESP (Encapsulated Security Payload)
o Member of IPsec set of protocols
o Encrypts and authenticates packets of data between computers using VPNs
FACL (File System Access Control List)
FDE (Full Disk Encryption)
FPGA (Field Programmable Gate Array)
o Integrated circuit designed to be configured by a customer or designer after manufacturing
FRR (False Rejection Rate)
o Likelihood that a biometric security system will incorrectly reject an access attempt by an
authorized user
FTP (File Transfer Protocol)
FTPS (Secured File Transfer Protocol)
GCM (Galois Counter Mode)
o High speeds with low cost and low latency
o Provides authenticated encryption
GDPR (General Data Protection Regulation)
GPG (Gnu Privacy Guard)
GPO (Group Policy Object)
o Contains two nodes: a user configuration and computer configuration
o Collection of group policy setting
GPS (Global Positioning System)
GPU (Graphics Processing Unit)
GRE (Generic Routing Encapsulation)
o Tunneling protocol
HA (High Availability)
HDD (Hard Disk Drive)
HIDS (Host-Based Intrusion Detection System)
o Detects and alerts upon detecting an intrusion in a host (such as computers) as well as network
packets in network interfaces (similar to NIDS)
o Can't take action on it, though
HIPS (Host-Based Intrusion Prevention System)
o Like HIDS, but can take action toward mitigating a detected threat
HMAC (Hashed Message Authentication Code)
o Combines a shared secret key with hashing
o Can be used to verify data integrity and authenticity of a message
HOTP (HMAC based One Time Password)
o One-time password algorithm based on hash-based message authentication codes
o Event-based OTP (One-Time Password)
o Yubikey is an example of an OTP generator that uses HOTP
o Not time based (has a longer window before expiration)
HSM (Hardware Security Module)
o Physical device that safeguards and manages digital keys (i.e.: private CA keys)
o Performs encryption/decryption functions for digital signatures
HTML (HyperText Markup Language)
HTTP (Hypertext Transfer Protocol)
HTTPS (Hypertext Transfer Protocol over SSL/TLS)
HVAC (Heating, Ventilation, Air Conditioning)
IaaS (Infrastructure as a Service)
ICMP (Internet Control Message Protocol)
o Used by network devices (such as routers) to send error messages or other operational
information indicating success/failure when communicating with another IP address
ICS (Industrial Control Systems)
o General term to describe control systems associated with industrial processes
IDEA (International Data Encryption Algorithm)
o Symmetric-key block cipher
IDF (Intermediate Distribution Frame)
o Cable rack in a central office that cross connects and manages IT or telecom cabling between a
main distribution frame (MDF) and remote workstation devices
o Used for WAN and LAN environments, for example
IdP (Identity Provider)
o Service that stores and manages digital identities
o Provides authentication services to apps within a federation or distributed network
o User authentication as a service
o i.e.: Google, Facebook, or Twitter login
IDS (Intrusion Detection System)
IEEE (Institute of Electrical and Electronics Engineers)
IKE (Internet Key Exchange)
o UDP port 500
o Protocol used to set up a security association (SA) in the IPsec protocol suite
IM (Instant Messaging)
IMAP4 (Internet Message Access Protocol v4)
o API that enables email programs to access the mail server
o i.e.: Outlook can be configured to retrieve email via IMAP4 (or POP3 as an alternative)
IoC (Indicators of Compromise)
o Forensic data found in systems via log entries or files that identify potentially malicious activity
on a system or network
IoT (Internet of Things)
IP (Internet Protocol)
IPSec (Internet Protocol Security)
o In the Internet Layer of the TCP/IP Stack
o Secure network protocol suite that authenticates and encrypts the packets of data to provide
encrypted communication
o Used in VPNs
o Can be used to protect data flows between two hosts (host-to-host), two networks (network-tonetwork) or between a security gateway and host (network-to-host)
o Protects against replays
IR (Incident Response)
IRC (Internet Relay Chat)
IRP (Incident Response Plan)
o Preparation
o Detection & Analysis
o Containment, Eradication, and Recovery
o Post-Incident Activity
ISO (International Organization for Standardization)
o Organization that develops and published International Standards
ISP (Internet Service Provider)
ISSO (Information Systems Security Officer)
ITCP (IT Contingency Plan)
o Plans, policies, procedures, and technical measures that enable the recovery of IT operations
after unexpected incidents
IV (Initialization Vector)
o Used in cryptography is an input to a cryptographic primitive
o Used to provide the initial state
KDC (Key Distribution Center)
o Used to reduce risks in exchanging keys
o A user requests to use a service. The KDC will use cryptographic techniques to authenticate
requesting users as themselves, and it will check whether a user has the right to access the
service requested
o If the user has the right, the KDC can issue a ticket permitting access
KEK (Key Encryption Key)
o A key that encrypts another key for transmission or storage
L2TP (Layer 2 Tunneling Protocol)
o Used to support VPNs or as part of the delivery of services by ISPs
o Uses encryption only for its own control messages, not for content itself
o Uses IPSec for data encryption over Layer 3
LAN (Local Area Network)
LDAP (Lightweight Directory Access Protocol)
o
o
o
Open and vendor-neutral application protocol for managing and interacting with directory
servers
Often used for authentication and storing information about users, groups, and applications
Can be susceptible to LDAP Injections
LEAP (Lightweight Extensible Authentication Protocol)
o Wireless LAN authentication method
o Dynamic WEP keys and mutual authentication (b/t a wireless client and a RADIUS server)
MaaS (Monitoring as a Service)
MAC (Mandatory Access Control)
o Access control used to limit access to resources based on the sensitivity of the information that
the resource contains and the authorization of the user
o Uses labels which are made up of a security level and zero or more security categories
o Security levels indicate a level or hierarchical classification of the information (ie: "confidential"
or "restricted")
o Security categories define the category or group to which the information belongs
o If the user does not have the proper label for a piece of information, they cannot access it
MAC (Media Access Control)
MAC (Message Authentication Code)
o Authenticates the source of a message and its integrity
o Piece of information used to authenticate a message and make sure it came from the intended
sender without any unintended modifications
o
o
o
MAM (Mobile Application Management)
Used to control enterprise applications and app data on end users' devices
Provides application-level control to IT admins
Different from MDM because MDM aims to control the entire mobile device and requires a service agent to
be running on the mobile device. MAM instead focuses purely on apps and their data
o Functionality includes:
 Control the installation, updating, or removal of mobile apps via an enterprise app store
 Remotely wipe data from managed apps
 Monitor application usage
 Control user and group access
 Control user authentication
MAN (Metropolitan Area Network)
o Computer network larger than a single building
MBR (Master Boot Record)
o Special type of boot sector at the very beginning of partitioned storage
o Holds information about how logical partitions are organized
MD5 (Message Digest 5)
o Hash function that can very easily be cracked
MDF (Main Distribution Frame)
MDM (Mobile Device Management)
o Software that allows administration of devices as a whole
o Different from MAM because MAM focuses on specific applications, while MDM focuses on
controlling entire devices
MFA (Multifactor Authentication)
MFD (Multi-Function Device)
o Device that incorporates the functionality of multiple other devices
MFP (Multi-Function Printer)
o Also includes fax, scanning, copy, etc...
MITM (Man in the Middle)
o Attacker interrupts a data transfer to eavesdrop
o AKA on-path attacks
ML (Machine Learning)
MMS (Multimedia Message Service)
o Used to send messages that include multimedia content
MOA (Memorandum of Agreement)
o Legally-binding agreement between two parties
MOU (Memorandum of Understanding)
o Non-legally binding agreement
o Used to signal willingness between parties to move forward with a contract
MPLS (Multi-Protocol Label Switching)
o Routing technique to direct data from one note to the next based on the short path labels
o
MSA (Measurement Systems Analysis)
Mathematical method of determining the amount of variation that exists within a measurement process
MSCHAP (Microsoft Challenge Handshake)
o Encrypted authentication used in a wide area network (WAN)
o Authentication Protocol
MSP (Managed Service Provider)
MSSP (Managed Security Service Provider)
MTBF (Mean Time Between Failures)
o Predicted time in between failures of a system
MTTF (Mean Time to Failure)
o Used to predict when a system will fail (and can't be repaired)
MTTR (Mean Time to Recover)
o Aka mean time to restore
o
Average time it takes to recover from a system failure
MTTR (Mean Time to Repair)
o Represents the average time it takes to repair a system
o
MTU (Maximum Transmission Unit)
Largest packet or frame size that can be sent in a packet or frame-based network such as the Internet
NAC (Network Access Control)
o Provides visibility, access control, and compliance
o Can define and implement strict access management controls for networks
o Centralized solution to end-point security
o Uses IEEE 802.1X standard
o Usually works with TACACS or RADIUS to verify authentication
NAS (Network Attached Storage)
NAT (Network Address Translation)
NDA (Non-Disclosure Agreement)
NFC (Near Field Communication)
o Mobile payment
o Key cards
o Smart cards
NFV (Network Functions Virtualization)
o Virtualizes entire classes of network node functions into building blocks
NIC (Network Interface Card)
NIDS (Network Based Intrusion Detection System)
o Detects malicious traffic on a network
NIPS (Network Based Intrusion Prevention System)
o Detects and prevents malicious traffic on a network
NIST (National Institute of Standards & Technology)
NTFS (New Technology File System)
Used by Windows NT to store, organize, and find files on an HD efficiently
-
NTLM (New Technology LAN Manager)
Used to authenticate user identity and protect the integrity and confidentiality of their activity
SSO tool
Relies on a challenge-response protocol to confirm the user without requiring them to submit a password
NTLM has known vulnerabilities and is typically only still used for legacy clients and server
Replaced by Kerberos
NTLM relies on a three-way handshake between the client and server to authenticate a user, while Kerberos
uses a two-part process that leverages a ticket granting service or key distribution center (KDC)
NTP (Network Time Protocol)
o
o
Port 123 (UDP)
Sync time
OAuth (Open Authorization)
o Token-based authentication
o Lets an organizations share info across third-party services without exposing their users'
usernames/passwords
OCSP (Online Certificate Status Protocol)
o Used by CAs to check the revocation status of an X.509 digital certificate
OID (Object Identifier)
o Standard for naming any object, concept, or thing
OS (Operating System)
OSI (Open Systems Interconnection)
o Conceptual model
OSINT (Open-Source Intelligence)
OSPF (Open Shortest Path First)
o Distributes routing information between routers
OT (Operational Technology)
o Hardware/software that detects or causes a change by directly monitoring and/or controlling
industrial equipment, assets, processes, and events
OTA (Over The Air)
o Pushing updates for software, configuration settings, or even encryption keys, on remote devices
OTG (On The Go)
OVAL (Open Vulnerability Assessment Language)
o Community standard to promote open and publicly available security content, and to standardize
the transfer of this information
OWASP (Open Web Application Security Project)
o
o
o
P12 (PKCS #12)
Archive file format for storing cryptography objects as a single file
Used to bundle a private key with its X.509 certificate, or to bundle the members of a chain of trust
Think of it as a container for X.509 public key certs, private keys, CRLs, and generic data
P2P (Peer to Peer)
PaaS (Platform as a Service)
o
o
PAC (Proxy Auto Configuration)
Used to define how web browsers and other user agents can automatically choose the appropriate proxy
server for fetching URLs
Contains a JavaScript function that returns a string with one or more access method specifications
PAM (Privileged Access Management)
o Safeguarding identities with special access or admin capabilities
PAM (Pluggable Authentication Modules)
o Used to separate the tasks of authentication from applications
o Apps can call PAM libraries to check permissions
PAP (Password Authentication Protocol)
o Two-way handshake to provide the peer system with a simple method to establish its identity
PAT (Port Address Translation)
PBKDF2 (Password-Based Key Derivation Function 2)
o Key derivation functions with a sliding computation cost, which is used to reduce vulnerabilities
of brute-force attacks
o Applies a pseudorandom function (like HMAC) to the input password along with a salt value,
and repeats this process multiple times to produce a derived key
o Derived key can then be used as a cryptographic key
PBX (Private Branch Exchange)
o Telephone system that switches calls between users on local line
o Multiline telephone system
PCAP (Packet Capture)
o Collects and records packet data from a network which can then be analyzed
o
PCI DSS (Payment Card Industry Data Security Standard)
Security standards to use when accepting, processing, storing, or transmitting credit card information
PDU (Power Distribution Unit)
o Provides multiple electric power outputs
PEAP (Protected Extensible Authentication Protocol)
o Provides a method to transport securely authenticated data including legacy password-based
protocols, via 802.11 Wi-Fi
o Uses tunneling between PEAP clients and an auth server
PED (Personal Electronic Device)
o Devices like phones, laptops, pagers, radios, etc..
PEM (Privacy Enhanced Mail)
o File format for storing and sending cryptographic keys, certificates, and other data
o For example, when using SSH, you will often use a .pem file
o Encodes the binary data using base64
o Starts with -----BEGIN a label and then ----PFS (Perfect Forward Secrecy)
o Feature of specific key agreement protocols that give assurances that session keys will not be
compromised, even if long-term secrets used in the session key exchange are compromised
o i.e.: for HTTPS, the long-term secret is usually the private key of the server
PFX (Personal Information Exchange)
o
o
PGP (Pretty Good Privacy)
Encryption program used to provide cryptographic privacy and authentication for data communication
Useful for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions
PHI (Personal Health Information)
PII (Personally Identifiable Information)
PIV (Personal Identity Verification)
o MFA on a smartcard
o Used for identity proofing
PKCS (Public-Key Cryptography Standards)
o Group of standards for public keys
PKI (Public Key Infrastructure)
o Roles, policies, hardware, software, and procedures needed to create, manage, distribute, use,
store, and revoke digital certificates and manage public-key encryption
o
POP (Post Office Protocol)
Most commonly used message request protocol for transferring messages from e-mail servers to e-mail
clients
POTS (Plain Old Telephone Service)
PPP (Point-to-Point Protocol)
o Communication between two routers directly without any hosts or other networks in between
o Data Link Layer
PPTP (Point-to-Point Tunneling Protocol)
o Obsolete method of implementing virtual private networks
o Port 1723
PSK (Pre-Shared Key)
o Shared secrets sent using a secure channel before it needs to be used
PTZ (Pan-Tilt-Zoom)
o Camera that can be remotely controlled, including zoom and directional control
QA (Quality Assurance)
QoS (Quality of Service)
o Performance of systems by the users of the network/systems
PUP (Potentially Unwanted Program)
RA (Recovery Agent)
RA (Registration Authority)
RACE (Research and Development in Advanced Communications Technologies in Europe)
RAD (Rapid Application Development)
o Agile software development approach
o Focuses on ongoing software projects and user feedback and less on following a strict plan
o Emphasizes rapid prototyping over costly planning
RADIUS (Remote Authentication Dial-in User Serve)
o Provides centralized authentication to protect networks against unauthorized use
o Could also be used for device administration, but its primary purpose is network authentication
o Combines authentication and authorization
o Encrypts only the password field, not the entire packet.
o
o
o
o
o
RAID (Redundant Array of Inexpensive Disks)
Storage virtualization technology that combines multiple physical disk drive components into one or more
logical units
Used to increase data redundancy, performance, or both
Striping - spreads blocks of data across multiple disks. Great for increased performance but provides zero
data redundancy or protection
Mirroring - copies the same data across disks. Provides data redundancy and protection from failure, but
requires more disks which increases cost
Parity - calculated value that gets used to restore data from multiple drives if one of the drives were to fail.
This prevents the need to mirror using separate drives since parity is spread among disks.
RAID 0 - striping
o Needs 2 drives minimum
RAID 1 - mirroring
o Needs 2 drives minimum
RAID 4 - striping and parity
o Needs 3 drives minimum
RAID 5 - striping and parity
o Needs 3 drives minimum
RAID 6 - striping and parity
o Needs 4 drives minimum
RAM (Random Access Memory)
RAS (Remote Access Server)
RAT (Remote Access Trojan)
o Malware that gives the attacker admin control over the target computer
o Typically used to then take further action
RBAC (Role-based access control)
o Used to assign rights and permissions based on roles of users
o Roles are usually assigned by groups
RC4 (Rivest Cipher version 4)
o Insecure
o
WEP
RCS (Rich Communication Services)
RFC (Request for Comments)
RFID (Radio Frequency Identifier)
o Uses electromagnetic fields to automatically identify and track tags attached to objects
o Consists of a tiny radio transponder, a radio receiver, and a transmitter
o Made up of tags and readers
RIPEMD RACE Integrity Primitives
o Family of hash functions
Evaluation Message Digest
o Helps guarantee a low number of collisions
ROI (Return on Investment)
RPO (Recovery Point Objective)
o The maximum amount of data (measured by time) that can be lost after a recovery from a
disaster or failure
o Used to determine the frequency of backups
o ie: if an RPO is 70 minutes, you require system backups every 70 minutes
RSA (Rivest, Shamir, & Adleman)
o Algorithm used to encrypt and decrypt messages (public-key cryptosystem)
o Asymmetric...the public key can be known to everyone
o Messages encrypted using the public key can only be decrypted with the private key
o Slower than some
RTBH (Remote Triggered Black Hole)
o Can be used to drop traffic before it enters a protected network
o A common use is to mitigate DDoS
RTO (Recovery Time Objective)
o Max amount of time it can take to recover after a failure or disaster before the business is
significantly impacted
RTOS (Real-Time Operating System)
o Event-driven and preemptive
o Switches between tasks based on their priorities (event-driven) or on a regular clocked interrupts
and on events (time-sharing)
RTP (Real-Time Transport Protocol)
o Used to transfer audio/video over IP networks
o Streaming media, for example
S/MIME (Secure/Multipurpose Internet Mail Extensions)
o Provides a way to integrate public-key encryption and digital signatures into most modern email
clients.
o This would encrypt all email information from client to client, regardless of the communication
used between email servers
SaaS (Software as a Service)
SAE (Simultaneous Authentication of Equals)
o Secure password-based authentication and password-authenticated key agreement method
SAML (Security Assertions Markup Language)
o XML-based markup language for security assertions
o Allows an IdP to authenticate users and then pass an auth token to another application (service
provider)
SAN (Storage Area Network)
o Dedicated, independent high-speed network that interconnects and delivers shared pools of
storage devices to multiple servers
SAN (Subject Alternative Name)
o Extension to X.509 that allows various values to be associated with a security certificate
SCADA (System Control and Data Acquisition)
o Control system for high-level supervision of machines and processes
SCAP (Security Content Automation Protocol)
SCEP (Simple Certificate Enrollment Protocol)
o Makes the request and issuing of digital certificates as simple as possible
SDK (Software Development Kit)
o Collection of software development tools you can install in one package
SDLC (Software Development Life Cycle)
SDLM (Software Development Life-cycle Methodology)
SDN (Software Defined Networking)
o Makes networking a bit more like cloud computing than traditional network management by
defining network technology via software
SDV (Software Defined Visibility)
o Framework that allows customers, security and network equipment vendors, as well as MSPs, to
control and program Gigamon's Visibility Fabric via REST-based APIs
SED (Self-Encrypting Drives)
o Data gets encrypted as it gets added to disk (HDD and SSD)
SEH (Structured Exception Handler)
o A way of handling both software and hardware exceptions/failures gracefully
SFTP (Secured File Transfer Protocol)
SHA (Secure Hashing Algorithm)
o One-way functions
SHTTP (Secure Hypertext Transfer Protocol)
o Obsolete alternative to HTTPS
SIEM (Security Information and Event Management)
SIM (Subscriber Identity Module)
o
SIP (Session Initiation Protocol)
Used to initiate, maintain, and terminate real-time sessions that include voice, video, and messaging apps
SLA (Service Level Agreement)
SLE (Single Loss Expectancy)
o Monetary value of an asset
o % of loss for each realized threat
S/MIME (Secure/Multipurpose Internet Mail Exchanger)
o Widely accepted protocol for sending digitally signed and encrypted messages
SMS (Short Message Service)
SMTP (Simple Mail Transfer Protocol)
o Protocol for electronic mail
SMTPS (Simple Mail Transfer Protocol Secure)
SNMP (Simple Network Management Protocol)
o Networking protocols used for the management and monitoring of network-connected devices in
IP networks
SOAP (Simple Object Access Protocol)
o Lightweight XML-based protocol that's used for exchanging information in decentralized,
distributed application environments
o Versus REST, which mostly uses JSON
SOAR (Security Orchestration, Automation, Response)
o Technologies that enable orgs to collect inputs monitored by the security operations team
o i.e.: alerts from the SIEM and other security tech where incident analysis and triage can be
performed by leveraging a combination of human and machine power
SoC (System on Chip)
o Raspberry Pi is an example of SoC
o Multiple components running on a single chip
SOC (Security Operations Center)
SPF (Sender Policy Framework)
o Email-authentication technique which is used to prevent spammers from sending messages on
behalf of your domain
SPIM (Spam over Internet Messaging)
SQL (Structured Query Language)
o
SQL is used to communicate with SQL databases in order to create, read, update, or delete data
SQLi (SQL Injection)
o SQL injections are a type of web-based attack that target SQL databases to either extract data,
insert data, modify database settings, or — in extreme cases — take control of the host server
SRTP (Secure Real-Time Protocol)
o Provides encryption, message authentication and integrity, and replay attack protection to the RTP data
SSD (Solid State Drive)
o Physical storage device comparable to hard drives but that uses different technology
SSH (Secure Shell)
SSL (Secure Sockets Layer)
SSO (Single Sign-On)
STIX (Structured Threat Information eXchange)
o XML structured language for sharing threat intelligence
o Like TAXII, STIX is a community-driven project
STP (Shielded Twisted Pair)
SWG (Secure Web Gateway)
o Protects users from web-based threads and applies and enforces corporate acceptable use policies
o Instead of connecting directly to a website, the user accesses the SWG, which then connects the user to the
desired website
o This helps with URL filtering, web visibility, malicious content inspection, web access controls, and more
TACACS+
o Authentication protocol used for remote communication with any server in a UNIX network or terminals
o Uses allow/deny mechanisms with auth keys that correspond to usernames and passwords
o Primarily used for device administration, but can technically be used for some network management
o Encrypts the entire packet
o Separates authentication and authorization
o Port 49
TAXII (Trusted Automated eXchange of Indicator Information)
o Aims to enable robust, secure, and high-volume exchanges of cyber threat information
TCP/IP (Transmission Control Protocol/Internet Protocol)
TGT (Ticket Granting Ticket)
o Files created by the key distribution center (KDC) portion of the Kerberos authentication protocol
o Used to grant users access to network resources
o Once the user has the TGT, they use it to obtain a service ticket from the Ticket Granting Service (TGS), at
which point the user is granted access
TKIP (Temporal Key Integrity Protocol)
o Security protocol used in IEEE 802.11 wireless networking standard
TLS (Transport Layer Security)
o Successor of deprecated SSL
o Provides secure communications
TOTP (Time-based One Time Password)
o String of dynamic digits of code who change values based on time
o Used for MFA
TPM (Trusted Platform Module)
o Dedicated microcontroller/chip designed to secure hardware with integrated crypto keys
TSIG (Transaction Signature)
o Computer-networking protocol, primarily enables DNS to authenticate updates to a DNS
database
TTP (Tactics, Techniques, and Procedures)
o Behaviors, methods, tools, and strategies that cyber threat actors and hackers use to plan and
execute cyber attacks on business networks
UAT (User Acceptance Testing)
o Last phase of the software testing process
o Actual software users test the software to make sure it can handle necessary, real-world tasks and
scenarios, according to specifications
o Aka User Acceptability Testing or End-User testing
UAV (Unmanned Aerial Vehicle)
UDP (User Datagram Protocol)
UEFI (Unified Extensible Firmware Interface)
o Specification that defines a software interface between an OS and platform firmware
o Replaces the legacy BIOS firmware interface, but provides legacy BIOS services
o UEFI can support remote diagnostics and repair of computers, even if no OS is installed
UEM (Unified Endpoint Management)
o Allows you to manage, secure, and deploy resources and apps on any device from a single console
o Goes beyond just MDM since it can also control PCs, or IoT devices, for example
UPS (Uninterruptable Power Supply)
o Provides an emergency power to a load in the event of power failure
URI (Uniform Resource Identifier)
o Identifier for a specific resource
URL (Universal Resource Locator)
o All URLs are URIs, but not all URIs are URLs
o If the protocol (http, https, ftp, etc) is present or implied, then it's a URL
USB (Universal Serial Bus)
USB OTG (USB On The Go)
o Allows USB devices to act as a host, allowing other USB devices to attack to them
o
o
Those devices can then switch back and forth between the roles of host and device
For example, a phone may read from the removal media as the host, but then act as a mass storage device
UTM (Unified Threat Management)
o When a single hardware or software provides multiple security functions
o This is in contrast of having individual solutions for each security function
UTP (Unshielded Twisted Pair)
VBA (Visual Basic)
o Event-driven programming language from Microsoft
VDE (Virtual Desktop Environment)
VDI (Virtual Desktop Infrastructure)
o When the desktop and application software is separated from the hardware
VLAN (Virtual Local Area Network)
o A partitioned and isolated part of a LAN created with logic (not physical separation)
VLSM (Variable Length Subnet Masking)
o A design where subnets can have varying sizes
VM (Virtual Machine)
VoIP (Voice over IP)
o Voice communications over Internet Protocol networks
VPC (Virtual Private Cloud)
o On-demand pool of shared resources in a public cloud environment
o Provides isolation between organization and resources
o Lets you essentially carve out a piece of the public cloud to host your private resources
VPN (Virtual Private Network)
o Encrypted connection over the Internet from a device to a network
o Helps ensure that you can communicate with remote systems securely and prevents eavesdropping on the
traffic
VTC (Video Teleconferencing)
WAF (Web Application Firewall)
o A WAF, or Web Application Firewall, is often placed in front of web apps and APIs to help defend against
common attacks (like DDoS, XSS, SQL injections, etc)
o This is not a silver bullet and can oftentimes be bypassed by skilled attacks
o It can also only really defend web apps and APIs, not things like internal networks
WAP (Wireless Access Point)
o Allows other Wi-Fi devices to connect to a wired network
WEP (Wired Equivalent Privacy)
o Security protocol that used to be used until it was found that it was inadequate
WIDS (Wireless Intrusion Detection System)
o Can detect the presence of unauthorized access points and create alerts
o They can also identify network break-in attempts
WIPS (Wireless Intrusion Prevention System)
o Can detect the presence of unauthorized access points and automatically take action such as quarantining
devices or kicking them off networks
WORM (Write Once Read Many)
o Data storage device where information, once written, can't be modified
o Great to ensure the data doesn't get tampered with
WPA (WiFi Protected Access)
o Designed to be more secure than WEP
o WPA vs WPA2
 WPA uses TKIP, while WPA2 can use TKIP or AES (which is usually preferred)
WPS (WiFi Protected Setup)
o Flawed security mechanism used for routers - can be brute forced
WTLS (Wireless TLS)
o Security level for WAP (Wireless Application Protocol) apps
XaaS (Anything as a Service)
o Term used to describe anything that can be used or sold as a service. For example, you can have Database as
a Service (DaaS), Authentication as a Service (AaaS), etc…
XML (Extensible Markup Language)
o XML is markup language, kind of like HTML (take a look at some examples on Google)
o XML has vulnerabilities that can be exploited, such as with XXE
XOR (Exclusive Or)
o Logical operator that returns true (represented by a 1) if its arguments are different (ie: one argument is 0
and the other is 1)
o If the arguments are the same, then XOR returns a 0
XSRF (Cross-Site Request Forgery)
o Same as CSRF
XSS (Cross-Site Scripting)
o XSS, or Cross-Site Scripting is a type of web-based attack
X.509
o Standard defining the format of public-key certificates
802.1X
o Network authentication protocol
o Defines the standards for using EAP to authenticate clients through authenticators (router/switch/network
device), using an authentication server (such as RADIUS)
o Devices/users connecting need to provide credentials and prove their identity to get access to the network
o Usually authenticated by AD, RADIUS
Download