Acronyms Flashcards
Triple Digital Encryption Standard
(Symmetric Encryption)
3DES
Authentication, Authorization, and Accounting
(RADIUS)
AAA
Attribute-based Access Control
Access Control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted.
ABAC
Access Control List
Collection of Access Control Entries.
ACL
Advanced Encryption Standard
Symmetric Block Cipher
AES
Advanced Encryption Standards 256bit
Symmetric Block Cipher
AES256
Authentication Header
IPSec protocol that provides authentication, integrity and protection against replay attacks.
AH
Artificial Intelligence
Science of creating machines with the ability to develop problem solving and analysis without significant human direction or intervention.
AI
Automated Indicator Sharing
Threat intelligence data feed operated by the DHS.
AIS
Annualized Loss Expectancy
Expected cost of a realized threat over a given year.
SLE (Single Loss Expectancy) x
ARO (Annual Rate of Occurrence)
ALE
Access Point
AP
Application Programming Interface
Library of programming utilities used to enable software developers to access functions of another application.
API
Advanced Persistent Threat
An attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware.
APT
Annualized Rate of Occurrence
In risk calculation, the percentage of an asset’s value that would be lost during a security incident or disaster.
ARO
Address Resolution Protocol
The broadcast mechanism by which individual hardware MAC addresses are matched to an IP address on a local network segment.
ARP
Optional security feature of a switch that prevents excessive ARP replies from flooding a network segment.
ARP inspection
A network-based attack where an attacker with access to target local network segment redirects an IP address to the MAC address of a computer that is not the intended recipient.
ARP poisoning
Address Space Layout Randomization
Method used by programmers to randomly arrange the different address spaces used by a program or process to prevent buffer overflow exploits.
ASLR
Active Server Page
ASP
Adversarial Tactics, Techniques, and Common Knowledge.
A knowledge base maintained by the MITRE Corporation for listing and explaining specific adversary tactics, and procedures.
ATT&CK
Acceptable Use Policy
AUP
Antivirus
Software capable of detecting and removing virus infections and other types of malware.
A-V
Bourne Again Shell
BASH
Business Continuity Planning
Disaster Recovery Planning - How business processes should deal with minor/disaster level disruption by ensuring that there is a processing redundancy supporting the workflow.
BCP
Border Gateway Protocol
A path vector routing protocol used by ISPs to establish routing between one another.
BGP
Business Impact Analysis
A systematic activity that identifies organizational risks and determines their effect on ongoing, mission critical operations.
BIA
Basic Input/Output System
BIOS
Business Partnership Agreement
An agreement between two companies to work together closely, such as the partner agreement that large IT companies set up with resellers and solution providers.
BPA
Bridge Protocol Data Unit
Used to communicate information about the topology and are not expected on access port.
BPDU
Bring Your Own Device
BYOD
Certificate Authority
A server that guarantees subject identities by issuing signed digital certificate wrappers for their public keys.
CA
Completely Automated Public Turing Test to Tell Computers and Humans Apart.
A type of security measure known as challenge-response authentication.
CAPTCHA
Corrective Action Report
CAR
Cloud Access Security Broker
Enterprise management software designed to mediate access to cloud services by users across all types of devices.
CASB
Cipher Block Chaining
An encryption mode of operation where an exclusive or (XOR) is applied to the first plaintext block.
CBC
Computer-based Training
Training and education programs delivered using computer devices and e-learning instructional models and design.
CBT
Counter-Mode/CBC-Mac Protocol
An encryption protocol used for wireless LANs that addresses the vulnerabilities of the WEP protocol.
CCMP
Closed-Circuit Television
A TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
CCTV
Computer Emergency Response Team
A group of information security experts responsible for the protection against, detection of and response to an organization’s cybersecurity incidents.
CERT
Cipher Feedback
A mode in which the DES algorithm is used to encrypt the preceding block of cipher text. This block is then XORed with the next block of plain text to produce the next block of cipher text.
CFB
Challenge Handshake Authentication Protocol
Authentication scheme developed for dial-up networks that uses an encrypted three-way handshake to authenticate the client to the server.
CHAP
Chief Information Officer
CIO
Computer Incident Response Team
Group is responsible for responding to security breaches, viruses and other potentially catastrophic incidents in enterprises that face significant security risks.
CIRT
Center for Internet Security
CIS is a forward-thinking nonprofit that harnesses the power of a global IT community to safeguard public and private organizations against cyber threats.
CIS
Content Management System
Helps companies manage digital content.
CMS
Continuity of Operation Planning
Sites that provide an alternate location for operations after a critical outage.
COOP
Corporate Owned Personal Enabled
Enterprise mobile device provisioning model where the device remains the property of the organization, but certain personal use, such as private email, social networking, and web browsing, is permitted.
COPE
Contingency Planning
A course of action designed to help an organization respond effectively to a significant future incident, event or situation that may or may not happen.
CP
Cyclical Redundancy Check
A network method designed to detect errors in the data and information transmitted over the network.
CRC
Certificate Revocation List
A list of certificates that were revoked before their expiration date.
CRL
Chief Security Officer
CSO
Cloud Service Provider
A vendor offering public cloud service models, such as PaaS, IaaS, or Saas
CSP
Certificate Signing Request
A Base64 ASCHII file that a subject sends to a CA to get a certificate.
CSR
Cross-Site Request Forgery
A malicious script hosted on the attackers site that can exploit a session started on another site in the same browser.
CSRF
Channel Service Unit
A digital communication device that is used to connect a digital line to a digital device. C
CSU
Counter-Mode
An encryption mode of operation where a numerical counter valued is used to create a constantly changing IV.
CTM
Chief Technology Officer
CTO
Common Vulnerabilities and Exposures
Scheme for identifying vulnerabilities developed by MITRE and adopted by NIST.
CVE
Common Vulnerability Scoring System
Risk management approach to quantifying vulnerability data and then taking into account the degree of risk to different types of systems or information.
CVSS
Choose Your Own Device
An employee provisioning model in which an organization allows people to select the mobile devices they would like, usually from a limited number of options.
CYOD
Discretionary Access Control
Access control model where each resource is protected by an Access Control List managed by the resource’s owner.
DAC
Database Administrator
DBA
Distributed Denial of Service
An attack that uses multiple compromised hosts (a botnet) to overwhelm a service with request/response traffic.
DDoS
Data Execution Prevention
(Windows operating systems) prevents malicious code from being executed from system memory locations
DEP
Distinguished Encoding Rules
The binary format used to structure the information in a digital certificate.
DER
Digital Encryption Standard
A symmetric-key algorithm for the encryption of digital data.
DES
Dynamic Host Configuration Protocol
A client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway.
DHCP
Dynamic Host Configuration Protocol
An attack in which an attacker responds to a client requesting address assignment from a DHCP server.
DHCP Spoofing
Diffie-Hellman Ephemeral
A cryptographic protocol that is based on Diffie-Hellman and that provides for secure key exchange by using ephemeral keys. DH - Asymmetric Algorithms.
DHE
Domain Keys Identified Mail
Aprotocol that allows an organization to take responsibility for transmitting a message by signing it in a way that mailbox providers can verify.
DKIM
Dynamic Link Library
A collection of small programs that larger programs can load when needed to complete specific tasks.
DLL
Data Loss Prevention
A software solution that detects and prevents sensitive information from being stored on unauthorized networks.
DLP
Domain Message Authentication Reporting and Conformance
An email authentication policy that protects against bad actors using fake email addresses disguised to look like legitimate emails from trusted sources.
DMARC
Demilitarized Zone
A segment isolated from the rest of a private network by one or more firewalls that accepts connection from the Internet over designated ports.
DMZ
Destination Network Address Translaction
NAT service where private internal addresses are mapped to one or more public addresses to facilitate Internet connectivity for host on a local network via a router
DNAT
Domain Name Service (Server)
DNS
Domain Name System Security Extensions
A security protocol that provides authentication of DNS data and upholds DNS data integrity.
DNSSEC
Denial of Service
Any type of physical, application, or network attack that affects the availability of a managed resource.
DoS
Data Privacy Officer
Institutional data governance role with responsibility for complaint collection and processing of personal and sensitive data.
DPO
Disaster Recovery Plan
A documented and resourced plan showing actions and responsibilities to be used in response to critical incidents.
DRP
Digital Signature Algorithm
Public key encryption standard used for digital signatures that provides authentication and integrity verification for messages.
DSA
Digital Subscriber Line
A family of technologies that are used to transmit digital data over telephone lines.
DSL
Extensible Authentication Protocol
Framework for negotiating authentication methods that enable systems to use hardware-based identifier, such as fingerprint scanners or smart card readers, for authentication.
EAP
Electronic Code Book
ECB
Elliptic Curve Cryptography
An symmetric encryption algorithm that leverage the algebraic structures of elliptic curves over finite fields to derive public/private key pairs.
ECC
Elliptic Curve Diffie-Hellman Ephemeral
A cryptographic protocol that is based on Diffie-Hellman and that provides for secure key exchange keys and elliptic curve cryptography.
ECDHE
Elliptic Curve Digital Signature Algorithm
Implementation of the DSA cipher that uses the ECC algorithm.
ECDSA
Endpoint Detection and Response
A software agent that collects system data and logs for analysis by a monitoring systems to provide early detection of threats.
EDR
Encrypted File System
EFS
End of Life
Product life cycle phase where sales are discontinued and support options reduced over time.
EOL
End of Service
Product life cycle phase where support is no longer available from the vendor.
EOS
Enterprise Resource Planning
ERP
Electronic Serial Number
ESN
Encapsulated Security Payload
Provides integrity, confidentiality, and authenticity of packets by encapsulating and encrypting them.
Transport mode - host-to-host transport mode only uses encryption of the payload of an IP packet but not its header. transport mode is used for transmission between hosts on a private network.
Tunnel mode - network tunnel is created which encrypts the entire IP packet (payload and header). Tunnel mode is commonly used for transmission between networks.
ESP
File System Access Control List
FACL
Full Disk Encryption
Encryption of all data on a disk (including system files, temporary files, and the page file can be accomplished via a supported OS, third-party software, or at the controller level by the disk device itself.
FDE
Field Programmable Gate Array
A processor that can be programmed to perform a specific function by a customer rather than at the time of manufacture.
FPGA
False Rejection Rate
Biometric assessment metric that measures the number of valid subjects who are denied access.
FRR
File Transfer Protocol
A protocol used to transfer file between network hosts. VAriants included S(ecure)FTP, FTP with SSL (FTPS and FTPES) and T(rivial)FTP. FTP utilizes ports 20 and 21.
FTP
Secured File Transfer Protocol
A type of FTP using TLS for confidentiality.
FTPS
Galois Counter Mode
A mode of block chained encryption that provides message authenticity for each block.
GCM
General Data Protection Regulation
PRovisions and requirement protecting the personal data of European Union (EU) citizens. Transfer of personal data outside the EU SIngle Market are restricted unless protected by like-for-like regulations, such as the US’s Privacy Shield requirements.
GDPR
Gnu Privacy Guard
A complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows you to encrypt and sign your data and communications; it features a versatile key management system, along with access modules for all kinds of public key directories.
GPG
Group Policy Object
On a Windows domain, a way to deploy per-user and per-computer settings such as password policy, account restrictions, firewall status, and so on.
GPO
Global Positioning System
Means of determining a receiver’s position on the Earth based on information received from GPS satellites. The receiver must have line-of-sight to the GPS satellites.
GPS
Graphics Processing Unit
GPU
Generic Routing Encapsulation
Provides a private path for transporting packets through an otherwise public network by encapsulating (or tunneling) the packets
GRE
High Availability
The property that defines how closely systems approach the goal of providing data availability 100 percent of the time while maintaining a high level of system performance.
HA
Hard Disk Drive
HDD
Host-Based Intrusion Detection System
A type of IDS that monitors a computer system for unexpected behavior or drastic changes to the systems state.
HIDS
Host-Based Intrusion Prevention System
A type of IPS that monitors a computer system for unexpected behavior or drastic changes to the system’s state on an endpoint.
HIPS
Hashed Message Authentication Code
A method used to verify both the integrity and authenticity of a message by combining a cryptographic hash of the message with a secret key.
HMAC
HMAC based One Time Password
An algorithm that generates a one-time password using a hash-based authentication code to verify the authenticity of the message.
HOTP
Hardware Security Module
An appliance for generating and storing cryptographic keys. This sort of solution may be less susceptible to tampering and insider threats than software based storage.
HSM
HyperText Markup Language
The basic scripting language used by web browsers to render pages on the world wide web. ·
HTML
Hypertext Transfer Protocol
The protocol used to provide web content to browsers. HTTP uses port 80.
HTTP
Hypertext Transfer Protocol over SSL/TLS
HTTPS(secure) provides for encrypted transfers, using SSL/TLS and port 443.
HTTPS
Heating, Ventilation, Air Conditioning
Building control systems maintain an optimum heating, cooling, and humidity level working environment for different parts of the building.
HVAC
Infrastructure as a Service
A computing method that uses the cloud to provide any or all infrastructure needs.
IaaS
Internet Control Message Protocol
IP-level protocol for reporting errors and status information supporting the function of troubleshooting utilities such as ping.
ICMP
Industrial Control Systems
A network managing embedded devices (computer systems that are designed to perform a specific, dedicated function).
ICS
International Data Encryption Algorithm
IDEA
Intermediate Distribution Frame
IDF
Identity Provider
In a federated network, the service that holds the user account and performs authentication.
IdP
Intrusion Detection System
A software and/or hardware system that scans, audits, and monitors the security infrastructure for signs of attacks in progress.
IDS
Institute of Electrical and Electronics Engineers
A standard for encapsulating EAP communications over a LAN (EAPoL) to implement port-based authentication.
IEEE
Internet Key Exchange
Framework for creating a Security Association (SA) used with IPSec. An SA establishes that two hosts trust one another (authenticate) and agree secure protocols and cipher suites to use to exchange data.
IKE
Instant Messaging
IM
Internet Message Access Protocol v4
TCP/IP application protocol providing a means for a client to access and manage email messages stored in a mailbox on a remote server. IMAP4 utilizes TCP port number 143
IMAPv4
Indicators of Compromise
A sign that an asset or network has been attacked or is currently under attack.
IoC
Internet of Things
Devices that can report state and configuration data and be remotely managed over IP networks.
IoT
Internet Protocol
IP
Intrusion Prevention System
An IDS that can actively block attacks.
IPS
Internet Protocol Security
A set of open, non-proprietary standards that are used to secure data through authentication and encryption as the data travels across the network or the Internet.
IPSec
Incident Response
Procedures and guidelines covering appropriate priorities, actions, and responsibilities in the event of security incidents, divided into preparation, detection/analysis, containment, eradication/recovery, and post-incident stages.
IR
Internet Relay Chat
A group communication protocol that enables user to chat, send private messages, and share files.
IRC
Incident Response Plan
Specific procedures that must be performed if a certain type of event is detected or reported.
IRP
International Organization for Standardization
ISO
Internet Service Provider
ISP
Information Systems Security Officer
Organizational role with technical responsibilities for implementation of security policies, frameworks, and controls.
ISSO