3DES
Triple Digital Encryption Standard
- Deprecated and considered insecure. Replaced by AES
- Symmetric
- Applies the DES cipher algorithm 3 times to each data block
AAA
-Authentication, Authorization, and Accounting)
- Often used to describe RADIUS, or some other form of networking protocol that provides Authentication, Authorization, and Accounting
ABAC
Attribute Based Access Control
Rights granted through policies that combine attributes together
Active Directory
Database and identity service used to provide identity management
ACL
Access Control List
AES
Advanced Encryption Standard
AES256
Advanced Encryption Standard 256 bits
AH
Authentication Header
AIS
Automated Indicator Sharing
ALE
Annualized Loss Expectancy
ie: can expect x number of devices to fail per year
AP
Access Point
Networking hardware device that provides Wi-Fi access, typically then connected via wire to the router, or directly integrated in the router itself
APT
Advanced Persistent Threat
Stealthy threat actor (usually nation-state or state-sponsored group) that gains unauthorized access to a system and remains undetected for a period of time
ARO
Annualized Rate of Occurrence
The calculated probability that a risk will occur in a given year
ARP
Address Resolution Protocol
Connects IP address with MAC address
ASLR
Address Space Layout Randomization
Prevent exploitation of memory corruption vulnerabilities
ASP
Active Server Page
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge
Knowledge base framework of adversary tactics and techniques based on real-world observations
AUP
Acceptable Use Policy
Terms that users must accept in order to use a network, system, website, etc…
AV
Antivirus
BASH
Born Again Shell
Powerful UNIX shell and command language
BCP
Business Continuity Planning
BIA
Business Impact Analysis
Used to predict the consequences a business would face if there were to be a disruption
BGP
Border Gateway Protocol
BIOS
Basic Input Output System