Acronyms Flashcards

1
Q

3DES

A

Triple Digital Encryption Standard

Performs encryption in 3 times of the same algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.1x

A

Switch authentication

Standard for controlling access to intranet infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AAA

A

Authentication, Authorization, and Accounting

The Principle of verifying identity, capability and use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ABAC

A

Attribute-based Access Control

Granting access based upon the characteristic of the
subject, such as clearance level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ACL

A

Access Control List

Restricting entry, based upon a listing of controls or permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard

Rijndael was approved by the US government and given this title

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES256

A

Advance Encryption Standard 256bit

The 26 bit version of this algorithm is its highest level and is deemed uncrackable by brute force methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AH

A

Authentication Header

The AH header transmit in clear text but authenticates and integrity checks each packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AI

A

Artificial Intelligence

The simulation of human intelligence and thinking in a machine, including adaptive learning and problem solving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AIS

A

Automatic Indicator Sharing

Automated sharing of threat information between organizations to enhance detection and response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ALE

A

Annualized Loss Expectancy

The single loss expectancy times the annualized rate of occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ALG

A

Application Layer Gateway

This is a type of firewall able to inspect headers and payload in the upper protocol layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AP

A

Access Point

Infrastructure connection point for most wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

API

A

Application Programming Interface

These are developed tools used by programmers that have prebuilt functions with desired utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

APT

A

Advanced Persistent Threat

Applications with advanced targeting, zero days and
exfiltration techniques that are aimed at particular
organizations or industries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARO

A

Annualized Rate of Occurrence

Most risk assessments track threats and attacks on an
annualized basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ARP

A

Address Resolution Protocol

Given the IP address ARP will locate the MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ASLR

A

Address Space Layout Randomization

This randomizes the location of an application in
memory making it harder for attackers to successfully
perform the buffer overflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ASP

A

Application Service Provider

An organization provides access to its custom
developed software, such as accounting or customer
management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ATT&CK

A

Adversarial Tactics,
Techniques, and Common
Knowledge

A database of adversarial tactics and techniques that
might be used to compromise systems organizations to
enhance threat management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Asymmetric key

A

Public key/Private key

The use of complementary values to disguise and then
reveal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

AUP

A

Acceptable Use Policy

This policy is legally required, if HR wants to fire
someone for misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

AV

A

Antivirus

Designed to identify malware, primarily based upon
known patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

AV

A

Asset Value

This can be the replacement cost or income derived
from something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

AXFR

A

Zone transfer

The synchronization of name resolution information
between a primary and secondary DNS server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

BASH

A

Bourne again shell

Bash is a UNIX and Linux command interface and
language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

BIA

A

Business Impact Analysis

This is the prerequisite for disaster recovery and
continuity planning to identify potential losses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

BIOS

A

Basic Input/Output System

The now deprecated initial program sets for computer.
Firmware based initialization code for booting a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Bluetooth

A

802.15

Technology commonly used to communicate with small
devices at modest speeds over a short range with low
security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

BCP

A

Business Continuity Plan

The orderly planning for and management of threats and
incidents to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

BGP

A

Border Gateway Protocol

Border Gateway Protocol is for routing exterior traffic
between autonomous systems/organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

BIA

A

Business Impact Analysis

Assessing the criticality of business activities and assets
in order to determine the appropriate protection and
recovery options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

BO

A

Buffer overflow

The insertion of malicious computer instructions into
the RAM of a host to accomplish denial of service or
injecting shellcode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

BPA

A

Business Partners Agreement

This outlines the goals and responsibilities between
entities pursuing a common work product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

BPDU

A

Bridge Protocol Data Unit

This protocol is used to identify efficient paths and
loops in a switched network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

BSSID

A

Basic Service Set IDentifier

This is the MAC address that a wireless device is
attached to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Brute Force

A

Brute force attack

Discovers a hash or encrypted secret by attempting all
combinations and permutations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

BYOD

A

Bring Your Own Device

The organization compensates the individual for use of
their phone in organizational activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

C2

A

Command and control

Servers that are centrally placed the hold control
instructions for illicitly managed hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

CA

A

Certificate Authority

This entity issues certificates. After verifying them, and
is the center of trust in PKI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

CAC

A

Common Access Card

A form of identification with photograph, barcode,
RFID and cryptographic storage of private key
information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

CAPTCHA

A

Completely Automated Public Turing to Tell
Computers and Humans Apart

This is intended to prevent rogue automated attempts at
access.

43
Q

CAR

A

Corrective Action Report

A document generated when the defect or error has been
detected that has the goal of eliminating a reoccurrence.

44
Q

CASB

A

Cloud Access Security
Broker

A software resource place between users and cloud
applications that monitors and enforces policy-based
access to cloud resources.

45
Q

CBC

A

Cipher Block Chaining

Each plaintext block is XORed (see XOR) with the
immediately previous ciphertext block.

46
Q

CBT

A

Computer-Based Training

Courseware or lessons that are delivered via a computer,
commonly used for at home and corporate training.

47
Q

CCMP

A

Counter-Mode/CBC-Mac Protocol

Each plaintext block is XORed (see XOR) with the
immediately previous ciphertext block that includes a
message authentication code.

48
Q

CCTV

A

Closed-circuit Television

Allows monitoring and recording of activities in an
area.

49
Q

CER

A

Cross-over Error Rate

The point at which false acceptances are equal to false
rejection.

50
Q

CER

A

Certificate

A generic term for a document that facilitates
authentication.

51
Q

CERT

A

Computer Emergency Response Team

A multi-discipline group designated to handle IT
incidents.

52
Q

CFB

A

Cipher Feedback

A mode of operation for a block cipher.

53
Q

Chain of custody

A

Evidence control and management

The documentation of handling and protection of
evidence.

54
Q

CHAP

A

Challenge Handshake Authentication Protocol

Commonly used by routers and has several derivatives
in use by Microsoft for authentication.

55
Q

CIO

A

Chief Information Officer

The most senior official in an organization responsible
for the information technology and systems that support
enterprise.

56
Q

CIRT

A

Computer Incident Response Team

A group that investigates and resolves IT security
problems.

57
Q

CIS

A

Center for Internet Security

Its mission is to identify develop, promote, and lead the
world with regard to best practices for cybersecurity
solutions.

58
Q

CMP

A

Change Management Policy

An organizational process designed to facilitate making
changes to organizational resources in such a way that
they are identifiable, auditable, and orderly.

59
Q

CMS

A

Content Management System

These are applications that facilitate the creation,
editing, publishing and archival of web pages and
content.

60
Q

CN

A

Common Name

An identifying name that may be applied to a directory
resource, such as a user, server, or other object.

61
Q

COOP

A

Continuity of Operations Plan

Ensuring that vital and primary mission essential
functions continue to run, even in the face of
emergencies.

62
Q

COPE

A

Corporate Owned, Personally Enabled

Smart phones owned by the organization, but approved
for personal use.

63
Q

CP

A

Contingency Planning

Procedures to follow in the event of a catastrophic
incident, even though it may be unlikely.

64
Q

CRC

A

Cyclical Redundancy Check

An error checking code, used in digital technology
primarily to identify accidental changes to data.

65
Q

Crimeware

A

Cyber theft

A class of malware that automates malicious activity.

66
Q

CRL

A

Certificate Revocation List

This is maintained by a certificate authority to identify
certificates associated with compromised or lost private
keys.

67
Q

CSO

A

Chief Security Officer

This official is responsible for development, oversight,
mitigation and other risk strategies.

68
Q

CSP

A

Cloud Service Provider

An organization that provides IaaS, PaaS or SaaS to an
array of customers.

An organization that provides cloud-based access to
infrastructure, storage and/or applications.

69
Q

CSA

A

Cloud Security Alliance

A nonprofit organization that promotes best practices in
security for cloud-based computing.

70
Q

CSIRT

A

Computer Security Incident Response Team

Information technology personnel whose purpose is to
prevent, manage and coordinate actions about security
incidents.

71
Q

CSR

A

Certificate Signing Request

Created by an applicant seeking to gain a certificate
from an authority.

72
Q

CSRF

A

Cross-site Request Forgery

An attack wherein a message is spoofed from a user to a
trusted site.

73
Q

CSU

A

Channel Service Unit

A connecting device used to link an organization to
telco-based T-services

74
Q

CTO

A

Chief Technology Officer

The executive person tasked with identifying useful
technology, IT strategies and partnerships.

75
Q

CTOS

A

Centralized terminal operating system.

Legacy management.

76
Q

CTR

A

Counter

This form of encryption is used by AES to perform
streaming encryption.

77
Q

CVE

A

Common Vulnerabilities and Exposures

A database of known and published software flaws that
may impact security that is managed by MITRE.

78
Q

CVSS

A

Common Vulnerability Scoring System

An empirical scheme for rating vulnerability severity
based upon specific aspects of the vulnerability,
environment, and nature of threats.

79
Q

CYOD

A

Choose Your Own Device

In this mode of control and acquisition, an employee
chooses a device from a company provided list.
Ownership may be personal or organization.

80
Q

DAC

A

Discretionary Access Control

The creator has all control over an asset and access to it.
The default form of access for Windows.

81
Q

Data

custodian

A

Facilitates use

Exemplified by data center personnel who manage and
maintain systems.

82
Q

Data owner

A

Responsible for use

Determines logical controls, authorizes use and defines
required security.

83
Q

DBA

A

Database Administrator

This role is filled by personnel capable of managing
automated and large information repositories.

84
Q

DDoS

A

Distributed Denial of Service

This attack methodology involves a multitude of
remotely controlled devices focusing upon a single
target.

85
Q

DEP

A

Data Execution Prevention

And operating system memory management technique
that prevents user data from overlapping into computer
instructions.

86
Q

DER

A

Distinguished Encoding Rules

A commonly used method of encoding the data that
makes up the certificate using ASN.1.

87
Q

DES

A

Digital Encryption Standard

The first US government standard for symmetric
encryption. It has a 56 bit key.

88
Q

DHCP

A

Dynamic Host Configuration Protocol

This is an extension of BOOTP and is used to
dynamically allocate IPs.

89
Q

DHE

A

Diffie-Hellman Ephemeral

This is a key exchange algorithm that enhances
confidentiality by discarding the session keys after use.

90
Q

Dictionary

A

Dictionary attack

Performs hashing or encryption on an array of
predetermined candidate phrases, and compares it to the
secret.

91
Q

Differential

BU

A

Differential backup

-It backups files to alternative media that have the archive
bit set, and then it does not clear it.

92
Q

DKIM

A

Domain Keys Identified Mail

A messaging security standard designed to facilitate
non-repudiation between sender and receiver.

93
Q

DLL

A

Dynamic Link Library

These files are not directly executed, but are called up
by an application when certain additional functions or
libraries are needed.

94
Q

DLP

A

Data Loss Prevention

Strategies and applications that prevent data theft or
illicit access.

95
Q

DMARC

A

Domain Message Authentication Reporting
and Conformance

This is an email security standard designed to allow
domains to protect themselves from unauthorized use
and spoofing.

96
Q

DNAT

A

Destination Network Address Translation

The initial destination of a packet as it enters a NAT
system to be redirected to another destination.

97
Q

DMZ

A

Demilitarized Zone

The perimeter area where the outside world may access
certain services.

98
Q

DNS

A

Domain Name Service

An application that handles symbolic name to address
mappings, as well as the reverse.

99
Q

DNSSEC

A

Domain Name System
Security Extensions

An array of tools devised by the IETF to secure DNS
transactions.

100
Q

DoS

A

Denial of Service

A one on one attack that causes access or utility to
cease.

101
Q

DPO

A

Data Protection Officer

A senior officer responsible for an organization’s data
protection strategies and compliance.

102
Q

DRP

A

Disaster Recovery Plan

The immediate plans for recovery of operations or
services in the event of a catastrophic incident.

103
Q

DSA

A

Digital Signature Algorithm

An algorithm created by the NSA to implement non-
repudiation.

104
Q

DSL

A

Digital Subscriber Line

High-speed Internet conductivity based upon existing
infrastructure for telephones.