Acronyms Flashcards
ACL
Access Control List
A rule set that can be implemented on a firewall, switch, or other infrastructure device to control access.
AP
Access Point
A wireless transmitter and receiver that hooks into the wired portion of a network and provides an access point to that network for wireless devices.
ASLR
Address Space Layout Randomization
A technique that can be used to prevent memory attacks
AES
Advanced Encryption Standard
A symmetric algorithm adopted by the US government as the replacement algorithm for 3DES.
APT
Advanced Persistent Threat
A hacking process that targets a specific entity and is carried out over a long period of time. The attacker is usually a group of organized individuals often funded and supported by a nation-state to gain illicit access to another government’s information.
ALE
Annualized Loss Expectancy
The expected risk cost of an annual threat event.
ARO
Annualized Rate of Occurrence
An estimate of how often a given threat might occur annually.
API
Application Programming Interface
A software interface that handles interactions between multiple software applications or mixed hardware/software intermediaries.
ASIC
Application Specific Integrated Circuit
A circuit that is designed specifically for an application and thus is not a general-purpose chip.
AI
Artificial Intelligence
The ability of a machine or computer to learn and adapt.
ARF
Asset Reporting Format
A data model that is used to express the transport format of information about assets and the relationships between assets and reports.
AJAX
Asynchronous JavaScript and XML
A group of interrelated web development techniques used on the client side to create asynchronous web applications.
AIK
Attestation Identity Key
Versatile memory that ensures the integrity of an EK.
ABAC
Attribute-Based Access Control
An access control system that takes multiple factors or attributes into consideration before authenticating and authorizing an entity.
AR
Augmented Reality
A program that overlays virtual objects on the real-world environment.
AAA
Authentication, Authorization, and Accounting
Framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
BYOD
Bring Your Own Device
A strategy in which users bring their own devices and use them for company and personal work.
BACnet
Building Automation and Control Network
An application, network, and media access control layer communications service that can operate over a number of layer 2 protocols, including ethernet.
BCP
Business Continuity Plan
A process that focuses on sustaining an organization’s business/mission processes during and after disruption.
BIA
Business Impact Analysis
The process of identifying mission critical systems and identifying measure to provide fault tolerance and high availability.
CMMI
Capability Maturity Model Integration
A process improvement approach.
CA
Certificate Authority
An entity that creates and signs digital certificates, maintains the certificates, and revokes them when necessary.
CRL
Certificate Revocation List
A list of digital certificates that a CA has revoked.
CSR
Certificate Signing Request
A request that a self-generated certificate be validated and signed by a CA.