Acronyms Flashcards
ABAC
Attribute-based access control
*typically matched to attributes other than the job role.
AD HOC
A wireless network that allows easy connection establishment between wireless client devices in the same physical area without the use of an infrastructure device, such as an access point or a base station.
AES
Advanced Encryption Standard
*a symmetric block cipher chosen by the U.S. government to protect classified information
API Keys
Application Programming Interface
*a code used to identify and authenticate an application or user.
APT
Advanced Persistent Threats
*advanced techniques that are persistent, occurring over a significant period of time.
ARP
Address Resolution Protocol
*used to associate the IP address to a MAC address.
AUP
Acceptable Use Policy
*an agreement between two or more parties that outlines the appropriate use of access to a corporate network or the internet
BIOS
Basic Input-Output system
*a low-level software that resides in a chip on your computer’s motherboard.
BPA
Business Partnership Agreements
*legal agreements between partners. This is a legal agreement that outlines the terms, conditions, and expectations between the partners.
BYOD
Bring Your Own Device
*allows users to use their own device, rather than have the company provide it
CAN bus
The Controller Area Network - bus is a message-based protocol designed to allow the Electronic Control Units (ECUs) found in today’s automobiles, as well as other devices, to communicate with each other in a reliable, priority-driven fashion
CASB
Cloud Access Security Broker
*an intermediary between users, devices, and cloud providers that enforces security policies.
C&C
Control and Command
CCMP
Counter Mode CBC-MAC Protocol
*the encryption mechanism that is the security standard used with WPA2 wireless networks. A block cipher, CCMP provides confidentiality, authentication, and access control features.
CER
Crossover Error Rate
*describes the overall accuracy of a biometric system.
CIA Triad
Confidentiality, Integrity, Availability
CISA
Cybersecurity and Infrastructure Security Agency
COOP
the federal government’s standards for continuity of operations
* four phases: readiness and preparedness, activation and relocation, continuity facility operations, and reconstitution
COPE
Corporate-Owned, Personally Enabled
CRM
Customer relationship management
*packages offered in the cloud would be classified as software-as-a-service (SaaS), since they are not infrastructure components.
CYOD
Choose Your Own Device
*allows users to choose a device but then centrally manages it.
DAC
Discretionary access control
*the principle of restricting access to objects based on the identity of the subject (the user or the group to which the user belongs)
DAD Triad
Disclosure, Alteration, Denial
DDoS
Distributed Denial-of-Service