NAC - Network Access Control: Controls device access to a network. A NAC platform can verify the identity, role and compliance of the devices, and grant or deny access based on predefined rules. NAC platform can protect both wired and wireless networks., DLP - Data Loss Prevention: Techniques and tools used to prevent the unauthorized loss or access to sensitive data (e.g. encryption, monitoring)., SNMP - Simple Network Management Protocol: A database of data (MIB Management Information Base., FDE - Full disk encryption: Encrypts all data on a device’s storage to protect it if lost or stolen. FDE protects the data from unauthorized access in case the laptop is lost, stolen, or disposed of without proper sanitization. FDE is recommended encryption technique for laptops and other mobile devices that store sensitive data,, IOCs - Indicators of compromise: Suspicious files, processes, or network activity. Unusual system behavior or performance issues. Unauthorized file system changes, DRP - Disaster Recovery Plan: Focuses on restoring systems after a disaster. (Focus on natural disasters) hot site, warm site and cold site. , EDR - Endpoint detection and response: Is a technology that monitors and analyzes the activity and behavior of endpoints, such as computers, laptops, mobile devices, and servers. EDR can help to detect and prevent malicious software, such as viruses, malware, and Trojans, from infecting the endpoints and spreading across the network., PCI DSS - Payment Card Industry Data Security Standard: Security requirements for organizations that store, process, or transmit cardholder data. Protect the confidentiality, integrity, and availability of cardholder data and prevent fraud, identity theft, and data breaches., CAB - Change advisory board: A group that evaluates, approves, or rejects proposed changes., MOA - Memorandum of agreement: Outlines specific terms and conditions for a partnership. Formal partnership terms, it is legally binding., NDA - Non disclosure agreement: A legal contract ensuring parties do not share confidential information., SLA - Service Level Agreement: Outlines the expected performance of services. Specifies service expectations (e.g., uptime 99.99%, response time)., SOW - Statement of Work: A document that outlines specific work to be completed by a vendor, including deliverables and timelines, ROE - Rules of engagement: Defines scope for tests. Tells pen tester what they can and cannot do. Very Important!, MOU - Memorandum of Understanding: A non-binding agreement outlining the terms and expectations between parties. Informal agreement., PII - Personally Identifiable Information: Sensitive data like SSNs, emails, or phone numbers., AUP - Acceptable Use Policy: Defines acceptable behaviors for using company assets., BPA - Business Partnership Agreement: When two separate businesses come tighter to formalize a partnership. Defines roles in partnership., MSA - Master Security Agreement: It outlines the terms, the services that a consulting firm will provide to a client. High-level contract for ongoing services., BIA - Business Impact Analysis: Identifies critical business functions and how they are affected by different risks., MTD - Maximum Tolerable Downtime: How long a business process can be down before it causes significant harm., RTO - Recovery Time Objective: How quickly the business must recover after a disruption., WRT - Work Recovery Time: Time it takes to resume normal operations., RPO - Recovery Point Objective: Maximum data loss allowed during a disruption., BCP - Business Continuity Plan: Helps to keep your business continue operation, in case of some type of failure. Ensures critical operations continue during disasters. (Backups, full back up, differential, incremental), COBO - Corporate owned, business owned: Devices provided by the company for business use only, COPE - Corporate owned, personally enabled: Devices provided by the company but allowing personal use., CYOD - Choose your own device: Employees select a company-approved device for work., BYOD - Bring your own device: Employees use their personal devices for work, requiring specific security measures., SIEM - Security Information and Event Management: A security alerting and monitoring tool that collects system, application, and network logs from multiple sources in a centralized system. It can analyze the collected data, correlate events, generate alerts, and provide reports and dashboards., RBAC - Role-Based Access Control: restricting access to data and resources based on the roles or responsibilities of users. RBAC by assigning roles to users and granting access rights to roles, rather than to individual users., VPN - Virtual private network that creates a secure tunnel between two or more devices over a public network. VPN can encrypt and authenticate the data, as well as hide the IP addresses and locations of the devices., OCSP - Online Certificate Status protocol: allows applications to check the revocation status of a certificate in real-time. The OCSP responder returns a response that indicates whether the certificate is valid, revoked, or unknown., CVSS - Common Vulnerability Scoring System: Provides a standardized way to assess and communicate the severity and risk of vulnerabilities. CVSS uses a set of metrics and formulas to calculate a (Quantitative scoring of a vulnerability) numerical score ranging from 0 to 10, where higher score indicate higher criticality., MTTF - Mean time to failure: Is a reliability metric that represents the average time a system or component operates before experiencing a failure., MTTR - Mean time to repair: Is the time required to repair a product or system after a failure., MTBF - Mean time between failure: Is the average time expected between outages. This is usually an estimation based on the internal device components and their expected operational lifetime., MTD - Maximum tolerable downtime hours., RPO - Recovery Point Objective: Define how much data loss would be acceptable during a recovery. Maximum acceptable data loss., SSO - Single Sign On: Provide credentials one time. No additional authentication required., CSR - Certificate Signing Request: is a standardized encoded request sent by an applicant (e.g., a server or user) to a Certificate Authority (CA) to obtain a digital certificate., CA - Certificate Authority: (CA) has digitally signed the website certificate. You trust the CA, therefore you trust the website., CIA - Confidentiality, Integrity, and Availability: These three form the security triad. Confidentiality helps prevent the unauthorized disclosure of data. Integrity provides assurances that data has not been modified, tampered with, or corrupted. Availability indicates that data and services are available when needed., CRL - Certification revocation list. A list of certificates that a CA has revoked. Certificates are commonly revoked if they are compromised, or issued to an employee who has left the organization. The Certificate Authority (CA) that issued the certificate publishes a CRL, and a CRL is public., CERT - Computer Emergency Response Team A group of experts who respond to security incidents. Also known as CIRT, SIRT, or IRT., CVE - Common Vulnerabilities and Exposures: A dictionary of publicly known security vulnerabilities and exposures., DAC - Discretionary access control. An access control model where all objects have owners and owners can modify permissions for the objects (files and folders). Microsoft NTFS uses the DAC model. Other access control models are MAC and RBAC., NFC - Near Field Communication: Enables short-range wireless communication between devices., IR - Infrared: Uses infrared light for short-range, line-of-sight communication., RAID - Redundant Array of Independent Disks: A data storage technology that provides redundancy to ensure data is not lost., SCADA - Supervisory Control and Data Acquisition: Systems used to control industrial processes, often for critical infrastructure like water or power plants., RTOS - Real Time Operating Systems: Execute actions in real time., ABAC - Attribute-based access control: is an access control model that uses attributes (characteristics) to define and enforce access policies. Unlike role-based or discretionary models, ABAC decisions are based on a combination of user, resource, environment, and action attributes., MAC - Mandatory Access Control: A highly secure access control model in which access permissions are determined by a central authority based on predefined policies. In MAC, users and resources are assigned classifications (e.g., Confidential, Secret, Top Secret) and access is granted strictly based on these classifications. MAC is often used in environments requiring stringent security, such as military or government systems. , PII - Personally Identifiable Information: Any data that can identify a person (e.g., name, address, Social Security number)., SAML - Security Assertions Markup Language: Is an Extensible Markup Language (XML)-based data standard used to exchange authentication and authorization information between different parties. SAML provides SSO for web-based applications., AD - Active Directory: A database and set of services that connect users with the network resources they need to get their work done. The database (or directory) contains critical information about your environment, including what users and computers there are and who’s allowed to do what., UTM - Unified Threat Management: combines multiple security features (firewall, IDS, antivirus) into one appliance for easier management., MFA - Multi Factor Authentication M2FA, MDM - Mobile Device Management: Software to manage and secure mobile devices within an organization, ensuring secure access and data protection., IoT - Internet of Things: Network of connected devices that collect, share, and act on data through the internet., IDS - Intrusion Detection System: Monitors and alerts on suspicious activity., IPS - Intrusion Prevention System: Can block threats automatically. (Example: IDS will alert admins of potential attack, while IPS will actively block the threat., WAF - Web Application Firewall) protects web applications., NGFW - Next-Generation Firewall: Combines multiple security features., PAN - Personal Area Network): Short-range wireless networks like Bluetooth., ACL - Access Control List: A set of rules that control network traffic flow and restrict access., GPO - Group Policy Object: Is a feature of Microsoft Windows that allows administrators to manage and control the working environment of users and computers in an Active Directory (AD) environment. GPOs define rules, configurations, and settings that can be applied across an organization to enforce security policies, standardize environments, and streamline administrative tasks., EAP-TLS - Extensible Authentication Protocol: Transport Layer Security. An extension of EAP sometimes used with 802.lx. This is one of the most secure EAP standards and is widely implemented. The primary difference between PEAP and EAP-TLS is that EAP-TLS requires certificates on the 802. lx server and on each of the wireless clients, PAM - (Pluggable Authentication Modules: A framework on Unix/Linux that adds authentication features. Example: A server admin uses PAM to set password policies or enforce two-factor authentication., EAP - (Extensible Authentication Protocol): Supports multiple authentication methods like passwords or certificates., LEAP - Lightweight Extensible Authentication Protocol -using a username and password (outdated, no longer use), PEAP - Protected Extensible Authentication Protocol is authentication protocols used in wireless networks., Metadata - data that describes other data sources., UTM - Unified Threat Management: combines multiple security features (firewall, IDS, antivirus) into one appliance for easier management., ALE - Annual Loss Expectancy: money loss per year, SLE - Single Loss Expectancy: cost of a single loss, ARO - Annual Rate of Occurrence: How many times it happens a year. (Focus on numerical value. How much money is at risk> How much is this risk going a cost., FIM - File Integrity Monitoring: Is a method to secure data by detecting any changes or modifications to files, directories, or registry keys. FIM can help a security administrator track any unauthorized or malicious changes to the data, as well as verify the integrity and compliance of the data., UPS - Uninterruptible Power Supply: Battery backup to keep systems running temporarily during a power outage., RAID - Redundant Array of Independent Disks: A data storage technology that provides redundancy to ensure data is not lost., SOAR - Security Orchestration, Automation, and Response: A set of tools that automates security tasks, such as threat detection and incident response., AV - Antivirus: Software designed to detect, block, and remove malicious software (malware) from a host., EOL - End of Life: When software, hardware, or an operating system is no longer supported by its developer., SaaS - Software as a Service: Ready-to-use software over the internet. , PaaS - Platform as a Service: Developers build applications without managing infrastructure. , IaaS - Infrastructure as a Service: Provides virtual machines, storage, and networking. , IaC - Infrastructure as a Code: Managing infrastructure using code., AAA - Authentication, Authorization and Accounting, VLAN - Virtual Local Area Network: A way to segment a network logically., DMZ - Demilitarized Zone: Is a public-facing area that isolates servers from the internal network., DOS - Denial of Service: Type of attack to crash a service; over whelm a service; usually from one source., DDoS - Distributed Denial of Service: Type of attack to crash a service; over whelm a service usually from multiple sources., XSS - Cross-Site Scripting: Injects malicious scripts into web applications., SDLC - System Development Life Cycle: A structured approach to building software., TPM - Trusted Platform Module: Provides full drive encryption and is included in most laptops., HSM - Hardware Security Module: Is a removable device that can generate and store RSA keys used with servers. The keys can be used to encrypt data sent to and from the server, but they wouldn't be used for full drive encryption., SPF - Sender Policy Framework: Provides authorization for email servers. The recipient of an email can view the SPF record of a domain to determine if an email was sent from an authorized server., SASE - Secure Access Service Edge. It is a cloud-based service that combines network and security functions into a single integrated solution. SASE can help reduce traffic on the VPN and internet circuit by providing secure and optimized access to the data center and cloud applications for remote employees.,
0%
CompTIA Security+ 701 Acronyms
Share
Share
Share
by
U95055917
College
CS
Edit Content
Print
Embed
More
Assignments
Leaderboard
Flash cards
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?