click below
click below
Normal Size Small Size show me how
Security+ Terms
| Question | Answer |
|---|---|
| 3DES | Triple Data Encryption Standard - Symmetric encryption algorithm that encrypts data by processing each block of data 3 times using different DES keys each time. 168 bits in length. |
| HMAC | Hash-Based Message Authentication Code - an algorithm that implements a partial digital signature that guarantees the integrity of a message during transmission, but does not provide for nonrepudiation. Uses a secret key with a hashing algorithms. |
| List 7 Symmetric Key algorithms | DES, 3DES, RC4, IDEA, AES, Twofish, Blowfish |
| RC4 | Rivest Cipher 4 - 128bit stream cipher used with SSL, RDP, WEP, WPA, and more. The predictable nature of the key led to the replacement of WEP to WPA |
| OTP | One Time Pad - type of encryption that, when used to the letter is impossible to actually crack without knowing the key (the pad). Each character of plaintext encrypted by a modular addition from a secret key. Oldest form of Cryptography. |
| Blowfish | Symmetric key block cipher that puts 64bit blocks of data through 16 rounds of cryptographic functions using a key length that can vary from 32 to 448bits in size. Alternative to DES. Still used with no successful attack discovered. |
| TwoFish | Works with 128bit blocks of data. block cipher, but the maximum length of the keys used for encryption cant exceed 256bits |
| PGP | Pretty Good Privacy - method of securing emails, created to prevent attackers from intercepting and manipulating email and attachments by encrypting and digitally signing the contents of the email using public key cryptography. Employs DSA, RSA, MD5, SHA |
| IDEA | International Data Encryption Standard |
| IPSec | Internet Protocol Security |
| AES | Advanced Encryption Standard |
| AH | Authentication Header |
| ALE | Annualized Loss Expectancy |
| ARO | Annual Rate of Occurance |
| SSO | Single Sign On |
| BCP | Business Continuity Planning |
| BIA | Business Impact Analysis |
| CCMP | Chaining Message Authentication Protocol |
| CIA | Confidentiality Integrity Availability |
| DAC | Discretionary Access Control |
| EAP | Extensible Authentication Protocol |
| ECC | Elliptic Curve Cryptography |
| FTPS | File Transfer Protocol Secure |
| SFTP | Secure File Transfer Protocol |
| S/MIME | Secure Multipurpose Internet Mail Extensions |
| SHA-1 | Secure Hash Algorithm |
| TTLS | Tunel Transport Layer Security |
| TACACS | Terminal Access Controller Access Control System |
| TPM | Trusted Platform Module |
| TKIP | Temporal Key Integrity Protocol |
| RSA | Rivest Shamir Adleman |
| RIPEMD-160 | RACE Integrity Primitives Evaluation Message Digest |
| RBAC | Role Based Access Control |
| PSK | Pre Shared Key |
| PKI | Public Key Infrastructure |
| PEAP | Protected Extensible Authentication Protocol |
| PAP | Password Authentication Protocol |
| GPG | Gnu Privacy Guard |
| IKE | Internet Key Exchange |
| L2F | Layer 2 Forwarding |
| LBAC | Lattice Based Access Control |
| LDAP | Light-weight Directory Access Protocol |
| LEAP | Light-weight Extensible Authentication Protocol |
| NTLM | NT LAN Manager |
| MD5 | Message Digest |
| DES | Data Encryption Standard |
| ARP | Address Resolution Protocol |
| CAC | Common Access Card |
| CCD | Charge Coupled Device |
| CCTV | Closed Circuit Television |
| CRL | Certificate Revocation List |
| CSRF or XSRF | Cross Site Request Forgery |
| DAM | Database Activity Monitoring |
| DDoS | Distributed Denial of Service |
| DLP | Data Loss Prevention |
| DMZ | Demilitarized Zone |
| DR | Disaster Recovery |
| EF | Exposure Factor |
| IETF | Internet Engineering Task Force |
| ESP | Encapsulating Security Payload |
| FIPS | Federal Information Processing Standard |
| FQDN | Fully Qualified Domain Name |
| HA | High Availability |
| HAVAL | Hash of Variable Length |
| HSM | Hardware Security Module |
| ICMP | Internet Control Message Protocol |
| IPS | Intrusion Prevention System |
| ISAKMP | Internet Security Association and Key Management Protocol |
| MitB | Man in the Browser |
| MitM | Man in the Middle |
| MTBF | Mean Time Between Failures |
| MTR | Mean Time to Restore |
| NAC | Network Access Control |
| NAP | Network Access Protection |
| NFS | Network File Sharing |
| NIDS | Network Intrusion Detection System |
| NIPS | Network Intrusion Prevention System |
| NIST | National Institute of Standards and Technology |
| NGF | Next Generation Firewall |
| NSA | National Security Agency |
| OWASP | Open Web Application Security Project |
| PII | Personally Identifiable Information |
| PPTP | Point to Point Tunneling Protocol |
| RADIUS | Remote Authentication Dial In User System |
| RAID | Redundant Array of Independent Disks |
| RAS | Remote Access Servers |
| RCP | Remote Copy |
| RPO | Recovery Point Objectives |
| RTO | Recovery Time Objectives |
| SA | Security Association |
| SANS | System Administration Networking and Security Institute |
| SCP | Secure Copy |
| SEM | Security Event Managers |
| SIEM | Security Information Event Managers |
| SIM | Security Incident Manager |
| SLE | Single Loss Expectancy |
| SMTP | Simple Mail Transport Protocol |
| SPI | Stateful Packet Inspection |
| SPIM | Spam Over Instant Messaging |
| SSH | Secure Shell |
| SSID | Service Set Identifier |
| STP | Spanning Tree Protocol |
| TFTP | Trivial File Transfer Protocol |
| TLS | Transport Layer Security |
| UCE | Unsolicited Commercial Email |
| UPS | Uninteruptable Power Supply |
| WAP | Wireless Access Point |