-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcissp-acronyms.txt
256 lines (256 loc) · 20.7 KB
/
cissp-acronyms.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
MMTF##Mean Time to Failure!!Average time a nonrepairable component will last
MTBF##Mean Time Between Failures!!Average time between failures of a repairable component
MTTR##Mean Time to Repair!!Average time to repair a failed component
EF##Exposure Factor!!Expected percentage of damage to an asset if a threat is realized
SLE##Single Loss Expectancy!!$SLE = AV * EF
ARO##Annualized Rate of Occurrence!!Expected frequency of a threat occurring in a year
ALE##Annualized Loss Expectancy!!$ALE = SLE * ARO
SOAR##Security Orchestration, Automation, and Response!!Automates security operations, enhaces SIEM
SIEM##Security Information and Event Management!!Combines SIM and SEM
SIM##Security Information Management!!Collects, analyzes, and reports on log data
SEM##Security Event Management!!Real-time monitoring for security events
NIST SP 800-30##Risk Management Guide for Information Technology Systems
NIST SP 800-37##Risk Management Framework for Federal Information Systems
NIST SP 800-88##Guidelines for Media Sanitization
NIST SP 800-122##Guide to Protecting the Confidentiality of Personally Identifiable Information
CPTED##Crime Prevention Through Environmental Design!![Natural Surveillance, Natural Territorial Reinforcement, Natural Access Control]
XST##Cross-Site Tracing!!An attack that uses cross-site scripting and cross-site request forgery
XSRF##Cross-Site Request Forgery!!An attack that tricks a user into performing an action on a different website
XSS##Cross-Site Scripting!!An attack that injects malicious scripts into a website
Bluesnarfing##Unauthorized access to a Bluetooth device, data theft
Bluebugging##Unauthorized access to a Bluetooth device, control of the device
Bluejackin##Sending unsolicited messages to a Bluetooth device
Clark-Wilson##Model concerned with formalizing the notion of information integrity!![Subject, Object, Program (Interface)]
Brewer and Nash##Model based on the Chinese Wall security policy, prevents conflicts of interest!!Allows access controls to change dynamically based on user actions
Graham Denning##Model focuses on secure deletion and creation of both objects and subjects
Harrison-Ruzzo-Ullman##Model focuses on assigning of object rights to subjects, as well as integrity
GLBA##Gramm-Leach-Bliley Act!!Requires financial institutions to protect customer data
FERPA##Family Educational Rights and Privacy Act!!Protects student education records
SOX##Sarbanes-Oxley Act!!Requires accurate financial reporting for public companies
HIPAA##Health Insurance Portability and Accountability Act!!Protects health information
PCI DSS##Payment Card Industry Data Security Standard!!Protects credit card data
PII##Personally Identifiable Information !!Information that can be used to identify an individual
PHI##Protected Health Information!!Health information that can be used to identify an individual
HITECH##Health Information Technology for Economic and Clinical Health Act!!Strengthens HIPAA
RTO##Recovery Time Objective!!Maximum tolerable downtime for a system
MTD##Maximum Tolerable Downtime!!Maximum tolerable downtime for a system
XST##Cross-Site Tracing!!An attack that uses cross-site scripting and cross-site request forgery
RPO##Recovery Point Objective!!Maximum tolerable data loss for a system
SAST##Static Application Security Testing!!Analyzes source code for security vulnerabilities
DAST##Dynamic Application Security Testing!!Analyzes running applications for security vulnerabilities
CCE##Common Configuration Enumeration!!Identifies security misconfigurations
CPE##Common Platform Enumeration!!Identifies product names and versions
CVE##Common Vulnerabilities and Exposures!!Identifies security vulnerabilities
WOT##Web of Trust!!A reputation system for websites
PKI##Public Key Infrastructure!!Manages public and private keys
ECB##Electronic Codebook!!Symmetric encryption mode that is insecure
CBC##Cipher Block Chaining!!Symmetric encryption mode that is secure
GCM##Galois/Counter Mode, adds authentication capability, allows streaming block cyphers!!Symmetric encryption mode that is secure
ElGamal##Asymmetric encryption algorithm based on the Diffie-Hellman key exchange, still secure
RSA##Asymmetric encryption algorithm based on the difficulty of factoring large prime numbers!! < 1024 insecure, have to use > 2048-bit keys and not postquantum
AES##Symmetric encryption algorithm that is fast and secure, Rijndal, use 256-bit keys
PGP##Pretty Good Privacy!!Asymmetric, encrypts and signs email messages
Blowfish##Symmetric encryption algorithm, replacement for DES, not secure
Twofish##Symmetric encryption algorithm, replacement for Blowfish, still secure
RC4##Symmetric stream encryption algorithm that is insecure, variable key length
DES##Symmetric encryption algorithm that is outdated and insecure, use AES instead
3DES##Symmetric encryption algorithm that is slow and secure, use AES instead
MD5##Hashing algorithm that is outdated and insecure, use SHA-256 instead
ECC##Elliptic Curve Cryptography!!Asymmetric encryption algorithm that is secure and efficient, keys are shorter
SHA##Secure Hash Algorithm!!SHA-1 is outdated and insecure, use SHA-256 instead
SHA-1##Secure Hash Algorithm 1!! Outdated and insecure, use SHA-256 instead
RIPEMD##RACE Integrity Primitives Evaluation Message Digest!!Hashing algorithm > 160bits is secure and in use
Merkle-Hellman KnapSack##Asymmetric encryption algorithm that is insecure
Diffie-Hellman##Key exchange algorithm that is still secure, inband
ECDH##Elliptic Curve Diffie-Hellman
bcrypt##Key stretching algorithm that is secure, based on Blowfish
Key stretching##Technique that makes passwords more secure (salting, hashing, and stretching)!!Has to be applied at least 4000 times
PBKDF2##Password-Based Key Derivation Function 2!!Key stretching algorithm
CIS##Center for Internet Security!!Provides best practices for securing systems
SRTP##Secure Real-Time Transport Protocol!!Encrypts VoIP traffic
DISA##Direct Inward System Access!!Allows external callers to reach internal extensions
DMARC##Domain-based Message Authentication, Reporting, and Conformance!!Combats email spoofing
PBX##Private Branch Exchange!!Telephone system within an organization
SW-CMM##Software Capability Maturity Model!!Provides a framework for software development
RMM##Risk Maturity Model!!Provides a framework for risk management
COBIT##Control Objectives for Information and Related Technologies!!Provides a framework for IT governance
SABSA##Sherwood Applied Business Security Architecture!!Integrating security into business strategies (also risk management)
FedRAMP##Federal Risk and Authorization Management Program!!Provides a framework for cloud security
ITSM##IT Service Management!!Provides a framework for managing IT services
ITIL##Information Technology Infrastructure Library!!Provides best practices for IT service management
ISO 27001##Information Security Management System!!Provides a framework for information security management
ISO 27002##Code of Practice for Information Security Controls!!Provides best practices for information security
ISO 27005##Information Security Risk Management!!Provides a framework for information security risk management
ISO 27701##Privacy Information Management System!!Provides a framework for privacy information management
SCADA##Supervisory Control and Data Acquisition!!Used to remotely control industrial processes
MFP##Multi-Function Printer!!Printer that can also scan, copy, and fax
DLP##Data Loss Prevention!!Prevents unauthorized data transfers
DRP##Disaster Recovery Plan!!Plan for recovering from disasters
CybOX##Cyber Observable eXpression!!Standard for expressing cyber observables
STIX##Structured Threat Information eXpression!!Standard for expressing threat information
TAXII##Trusted Automated eXchange of Indicator Information!!Standard for exchanging cyber threat information
CAPEC##Common Attack Pattern Enumeration and Classification!!Standard for classifying attack patterns
OpenIOC##Open Indicators of Compromise!!Standard for expressing indicators of compromise
ISAC##Information Sharing and Analysis Center!!Organization that shares threat information
CSIRT##Computer Security Incident Response Team!!Responds to security incidents
CERT##Computer Emergency Response Team!!Responds to security incidents
CFAA##Computer Fraud and Abuse Act!!Criminalizes unauthorized access to computers, 1986
DMCA##Digital Millennium Copyright Act!!Criminalizes circumventing copyright protection mechanisms, 1998
CALEA##Communications Assistance for Law Enforcement Act!!Requires telecommunications providers to assist law enforcement, 1994
FISMA##Federal Information Security Management Act!!Requires federal agencies to secure information systems
ITIL##Information Technology Infrastructure Library!!Provides best practices for IT service management
Zachman Framework##Framework for enterprise architecture!![What, How, Where, Who, When, Why]
CIDR##Classless Inter-Domain Routing!!Allocates IP addresses more efficiently
MOU##Memorandum of Understanding!!Just documents an agreement
SLA##Service Level Agreement!!Defines the level of service a customer can expect
BPA##Business Partners Agreement!!Each parnters responsibilities and division of profits
MOA##Memorandum of Agreement!!A bit more formal and detailed than an MOU
MSA##Master Service Agreement!!All key terms that will govern future transactions
SOW/WO##Statement of Work/Work Order!!Defines the work to be done and the deliverables
SOC##System and Organization Controls!!A report after a Cloud Services Provider makes an audit
SOC1##System and Organization Controls 1!!Provides assurance needed for financial reporting
SOC2##System and Organization Controls 2!!Provides detailed assurance (often private, since contains sensitive details): security, availability, processing integrity, confidentiality, and privacy
SOC3##System and Organization Controls 3!!Public report on controls: security, availability, and confidentiality, only high level
Type 1 SOC##Describes controls that the serivce provider has in place and an auditor's opinion on the fairness of the presentation
Type 2 SOC##Sames as 1 but also includes the results of testing the controls
CSA##Cloud Security Alliance!!Provides best practices for securing cloud services
SSAR 18##Statement on Standards for Attestation Engagements 18!!Defines the standards for SOC reports in the US
ISAE 3402##International Standard on Assurance Engagements!!Defines the standards for SOC reports
Bell LaPadula##Model for mandatory access control (confidentiality), state machine!![Simple Security Property (no readup), *-Property (no write down)]
Biba Model##Model for integrity, state machine!![Simple Integrity Property (no write up), *-Property (no read down)]
TCSEC##Trusted Computer System Evaluation Criteria!!Orange Book, 1983
ATO##Authority to Operate!!Permission to operate a system, for 3 years
IATO##Interim Authority to Operate!!Temporary permission to operate a system, for 6 months
IATT##Interim Authority to Test!!Temporary permission to test a system, for 6 months
DATO##Denial of Authorization to Operate!!Permission to operate a system is denied
TEMPEST##Protects against electromagnetic radiation emanations
HVAC##Heating, Ventilation, and Air Conditioning!!System that provides heating and cooling
CASB##Cloud Access Security Broker!!Monitors and manages security for cloud services
MSP##Managed Service Provider!!Provides IT services to customers
MSSP##Managed Security Service Provider!!Provides security services to customers
MAC##Mandatory Access Control!!Access control based on security labels
HMAC##Hash-based Message Authentication Code!!Hash-based MAC
Bllowfish##Symmetric encryption algorithm that is fast and secure, not as performant as AES
AES-GCM##Advanced Encryption Standard - Galois/Counter Mode!!Symmetric encryption algorithm that is fast and secure, use 256-bit keys, and authenticated encryption
ISO 310000##Risk Management!!Provides a framework for risk management, not specific to IT, qualitative
DCCP##Datagram Congestion Control Protocol!!Used for streaming media
SCTP##Stream Control Transmission Protocol!!Used for telephony signaling
COTS##Commercial Off-The-Shelf!!Software that is purchased and used as is
CMMI##Capability Maturity Model Integration!!Provides a framework for process improvement
Pass-the-ticket##Attack that uses Kerberos tickets to gain unauthorized access, part of the Kerberos Golden Ticket attack
Golden ticket##Attack that uses a forged Kerberos ticket granting ticket to gain unauthorized access
Silver ticket##Attack that uses a forged service ticket to gain unauthorized access, part of the Kerberos Golden Ticket attack
Meet-in-the-middle##Attack that uses two separate attacks against 2DES to find a key
Side-channel##Attack that uses information from the physical implementation of a system
SAMM##Software Assurance Maturity Model!!Provides a framework for software security
FAIR##Factor Analysis of Information Risk!!Provides a framework for risk management based on quantification
COSO ERM##Committee of Sponsoring Organizations of the Treadway Commission Enterprise Risk Management!!Provides a framework for enterprise risk management, qualitative
CIS Controls##Center for Internet Security Controls!!Provides best actionable practices for securing systems
TPM##Trusted Platform Module!!Hardware-based security chip
TCB##Trusted Computing Base!!Hardware, software, and firmware that is trusted
HSM##Hardware Security Module!!Hardware-based security device
UEFI##Unified Extensible Firmware Interface!!Modern replacement for BIOS
Secure boot##Ensures that only trusted software is loaded during the boot process
Measured boot##Logs the boot process and compares it to a known good state
EMP##Electromagnetic Pulse!!Can damage electronic equipment
ICS##Industrial Control System!!Used to control industrial processes
DCS##Distributed Control System!!Used to control industrial processes (water, power generation)
PLC##Programmable Logic Controller!!Used to control industrial processes
CAN Bus##Controller Area Network Bus!!Used in vehicles for communication between ECUs
ECU##Electronic Control Unit!!Used in vehicles for control systems
CSMA/CD##Carrier Sense Multiple Access with Collision Detection!!Used in IEEE 802.3 Ethernet
CSMA/CA##Carrier Sense Multiple Access with Collision Avoidance!!Used in IEEE 802.11 Wi-Fi
EAP##Extensible Authentication Protocol!!Used in Wi-Fi networks 802.1X, can be p2p
PEAP##Protected Extensible Authentication Protocol!!Used in Wi-Fi networks 802.1X (wraps EAP with TLS tunnel)
LEAP##Lightweight Extensible Authentication Protocol!!Used in Wi-Fi networks 802.1X (CISCO alternative to TKIP/WPA)
IEEE 802.15.1##Bluetooth
L2TP##Layer 2 Tunneling Protocol!!Used for VPNs
L2F##Layer 2 Forwarding!!Cisco proprietary protocol
RFC 1087##Ethics and the Internet!!RFC on ethics
Kerckhoffs' Principle##Cryptographic principle that the security of a system should not depend on the secrecy of the algorithm
Shannon's Maxim##Cryptographic principle that the security of a system should depend on the secrecy of the key
Locard's Exchange Principle##Forensic principle that every contact leaves a trace
Defense-in-depth##Security principle that uses multiple layers of security controls
SASE##Secure Access Service Edge!!Combines network security and wide area networking
MTTF##Mean Time to Failure!!Average time a nonrepairable component will last
MTBF##Mean Time Between Failures!!Average time between failures of a repairable component
NAC##Network Access Control!!Controls access to a network
Nearline##Storage that is not immediately available
Line interactive##UPS that corrects voltage fluctuations
NIACAP##National Information Assurance Certification and Accreditation Process!!US government process for certifying and accrediting systems
Smurf attack##DDoS attack that uses spoofed ICMP
Fraggle attack##DDoS attack that uses spoofed UDP
Ping of Death##DDoS attack that uses ICMP, over 65536 bytes ping
Land attack##DDoS attack that sets source and destination IP to the same address
SAML##Security Assertion Markup Language!!Used for SSO
Teardrop attack##DDoS attack that uses IP fragmentation
Birthday attack##Cryptographic attack that exploits the birthday paradox, used against hash
SYN Flood##DDoS attack that uses TCP, SYN requests
Kerberos port##88
PVC##Permanent Virtual Circuit!!Used in Frame Relay
SVC##Switched Virtual Circuit!!Used in ATM
FRR##False Rejection Rate!!Biometric error rate
FAR##False Acceptance Rate!!Biometric error rate
CER##Crossover Error Rate!!Biometric error rate
Parol evidence rule##Rule that written contracts cannot be changed by oral evidence
Best evidence rule##Rule that the original document is the best evidence (copy can be used if the original is lost)
Real evidence##Physical evidence
Testimonial evidence##Oral evidence
Bandwidth##Constant!!Amount of data that can be transmitted in a fixed amount of time
Throughput##Variable!!Actual amount of data that can be transmitted in a fixed amount of time
Baseband##Single communication channel, digital (Ethernet)
Broadband##Multiple communication channels, analog (TV, cable modem)
Evidence##Relevant, material, and competent
IPSec##Internet Protocol Security!!Encrypts IP packets
PPTP##Point-to-Point Tunneling Protocol!!VPN protocol
Store-and-forward##Switching method that receives the entire frame before forwarding!!Good for error checking
Cut-through##Switching method that forwards the frame as soon as the destination is known!!Faster but no error checking
Arbitration switching##Switching method that uses a bus to determine which device can send data!!Used in Token Ring
ASLR##Address Space Layout Randomization!!Randomizes memory addresses to prevent buffer overflow attacks
Extranet##Network that allows external users to access internal resources (b2b scenarios)
Screened subnet##DMZ that uses two firewalls
ESP##Encapsulating Security Payload!!IPSec protocol that encrypts the payload
AH##Authentication Header!!IPSec protocol that authenticates the payload
NAT-T##Network Address Translation Traversal!!IPSec protocol that allows NAT
IKE##Internet Key Exchange!!IPSec protocol that negotiates keys
ISAKMP##Internet Security Association and Key Management Protocol!!IPSec protocol that negotiates keys
VXLAN##Virtual Extensible LAN!!Used in virtualized environments, good for multi-tenancy
LPD##Line Printer Daemon protocol, 515
LPR##Line Printer Remote protocol, 515/9100
SMB##Server Message Block, port 445
RDP##Remote Desktop Protocol, port 3389
SDLC##Synchronous Data Link Control (IBM)!!Master-slave, primary system polls secondary, Layer 2 protocol
Token passing##Prevents collisions in ring networks
TKIP##Temporal Key Integrity Protocol!!WPA encryption protocol, replacement for WEP
WPA##Wi-Fi Protected Access!!Encryption protocol, replacement for WEP
WEP##Wired Equivalent Privacy!!Insecure encryption protocol
CCMP##Counter Mode with Cipher Block Chaining Message Authentication Code Protocol!!AES 128bit, replaces WEP/WPA/TKIP
WPA2##Wi-Fi Protected Access 2!!CCMP, replacement for WPA
WPA3##Wi-Fi Protected Access 3!!CCMP, replacement for WPA2
iSCSI##Internet Small Computer System Interface!!Used for storage area networks, IP-based
Private circuit##Dedicated physical circuit, good for security!!leased line, PPP, SLIP, ISDN, DSL
Packet-switching##Data is broken into packets and sent over the network!!X.25, Frame Relay, ATM, SDLC, HDLC
ATM##Asynchronous Transfer Mode!!Cell-based, good for voice and video
Frame Relay##Packet-switching, good for bursty traffic
X.25##Packet-switching, good for low-speed connections
HDLC##High-Level Data Link Control!!Synchronous, bit-oriented, Layer 2 protocol
UTM##Unified Threat Management!!May include IDS/IPS/TLS/SSL proxy, antivirus, antispam, content filtering (good for SMBs - small and medium businesses)
BAS##Breach and Attack Simulation!!Simulates attacks to test defenses
SIPS##Secure Session Initialization Protocol!!Used in VoIP
SRTP##Secure Real-Time Transport Protocol
ITU-T##International Telecommunication Union Telecommunication Standardization Sector
X.500##Directory Access Protocol
X.509##Certificate standard for PKI
STRIDE##Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege!!Threat modeling
DREAD##Damage, Reproducibility, Exploitability, Affected Users, Discoverability!!Risk assessment
PASTA##Process for Attack Simulation and Threat Analysis!!Threat modeling, [Preparation, Analysis, Simulation, Threat Analysis]
Risk based access control##Access control based on risk!!for example, MFA for high-risk users
ECDSA##Elliptic Curve Digital Signature Algorithm!!Digital signature algorithm
HAVAL##Hash of Variable Length!!Hashing algorithm
DSA##Digital Signature Algorithm!!Digital signature algorithm
FHSS##Frequency Hopping Spread Spectrum!!Used in Bluetooth,
DSSS##Direct Sequence Spread Spectrum!!Used in Wi-Fi
OFDM##Orthogonal Frequency Division Multiplexing!!Used in Wi-Fi, offers greatest throughput
OSPF##Open Shortest Path First!!Routing protocol, used in interior networks
VRF##Virtual Routing and Forwarding!!Used in MPLS
MPLS##Multi-Protocol Label Switching!!Used in WANs