CompTIA Security+ SYO 601 Acronym Flashcards

​Learn and study for the SYO 601 Acronym with our flashcards quizzes. Study, learn, and revise the SYO 601 Acronym with our quiz based flashcards. This flashcard is simple and easy to use and is more fun-oriented. ​

275 cards   |   Total Attempts: 195
  

Cards In This Set

Front Back
3DES
Triple Digital Encryption Standard Considered as weak encryption, symmetric block cipher encrypts 64-bit blocks
AAA
Authentication, Authorization, Accounting 1. Authentication has 2 components: Identification (Username or email address) and the authentication factor (Something you know, Something you have, Something you are, Somewhere you are or are not, Something you do) 2. Authorization: the rights and privileges assigned to a user to be able to perform their job. 3. Accounting or Auditing: Accounting is the process of recording system activities and resource access. Auditing is part of accounting where an administrator examines logs of what was recorded.
ABAC
Attribute-based Access Control: Access control based on different attributes: group membership, OS being used, IP address, the presence of up-to-date patches and anti-malware, geographic location. Typically used in an SDN (Software Defined Network).
ACL
Access Control List: A list of objects and what subjects can access them. For example; A user accesses a directory but only has read access to the documents inside.Routers and firewalls both employ ACLs, either allowing or denying access to different parts of the network.
AES
Advanced Encryption Standard: A symmetric block cipher. Three different block sizes; 128, 192, & 256 bit. Used in BitLocker
AH
Authentication Header: An IPSec protocol that provides authentication as well as integrity & protection from replay attacks. Uses protocol # 51.
AI
Artificial Intelligence
AIS
Automated Indicator Sharing Threat intelligence data feed operated by the DHS
ALE
Annual Loss Expectancy: The amount of money an organization would lose over the course of a year. The formula is the SLE (Single Loss Expectancy) times the ARO (Annual Rate of Occurrence). SLE x ARO = ALE.
AP
Access Point: Sometimes referred to as a WAP (Wireless Access Point). An AP is a bridge between wireless and wired networks.
API
Application Programming Interface A software module or component that identifies inputs and outputs for an application
APT
Advanced Persistent Threat: An attack that uses multiple attack vectors, attempt to remain hidden as to maintain a connection to compromised systems. You can normally tie this to nation-states (foreign countries)
ARO
Annual Rate of Occurrence: The number of times a year that a particular loss occurs. It is used to measure risk with ALE and SLE in a quantitative risk assessment.
ARP
Address Resolution Protocol: Matches the MAC address to a known IP address. Easily spoofed, used in MITM (Man-in-the-Middle) attack.
ATT&CK
Adversarial Tactics, Techniques,
and Common Knowledge
A knowledge base maintained by MITRE