Acronyms Flashcards

1
Q

3DES

A

Triple Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AD

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES / AES256

A

Advanced Encryption Standard / 256 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header; supports authentication and integrity only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AIS

A

Automated Indicator Sharing -
enables organizations to share and receive machine-readable cyber threat indicators (CTIs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARO

A

Annualized Rate of Occurence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASP

A

Active Server Pages - is Microsoft’s first server-side scripting language and engine for dynamic web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ATT&K

A

Adversarial Tactics and Techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BIOS
Basic Input Output System
26
BPA
Business Partnership Agreement
27
BPDU
Bridge Protocol Data Unit
28
BSSID
Basic Service Set Identifier
29
BYOD
Bring Your Own Device
30
CA
Certificate Authority
31
CAPTCHA
Completely Automated Public Turing - test to tell humans and computers apart
32
CAR
Corrective Action Report
33
CASB
Cloud Access Security Broker
34
CBC
Cipher Block Chaining
35
CBT
Computer Based Training
36
CCMP
Counter-mode CBC-MAC Protocol - an enhanced data cryptographic encapsulation mechanism designed for data confidentiality
37
CCTV
Closed Circuit Television
38
CERT
Computer Emergency Response Team
39
CFB
Cipher Feedback
40
CHAP
Challenge Handshake Authentication Protocol
41
CIO
Chief Information Officer
42
CIRT
Computer Incident Response Team
43
CIS
Center for Internet Security
44
CMS
Content Management System
45
CN
Common Name
46
COPE
Corporate Owned, Personally Enabled
47
CP
Contingency Planning
48
CRC
Cyclic Redundancy Check
49
CRL
Certificate Revocation List
50
CSA- (not certif sign authority)
Cloud Security Alliance
51
CSIRT
Computer Security Incident response Team
52
CSO
Chief Security Officer
53
CSR
Certificate Signing Request
54
CSRF/xsrf
Cross-Site Request Forgery 1: Exploits the trust a website has in the user's web browser, 2: User submits an unauthorized request to the server, and 3: The website executes the attacker's request
55
CSU
Channel Service Unit
56
CTM
Counter-Mode
57
CTO
Chief Technology Officer
58
CVE
Common Vulnerabilities and Exposures - open source list (database) of computer security flaws.
59
CVSS
Common Vulnerability Scoring System: 0 to 10, with 10 being the most severe.
60
CYOD
Choose Your Own Device
61
DAC
Discretionary Access Control
62
DBA
Database Administrator
63
DDoS
Distributed Denial of Service
64
DEP
Data Execution Prevention: Microsoft technology that prevent buffer overflow attacks and executable code from launching; systems level memory protection
65
DER
Distinguished Encoding Rules -encoding for x.509 certificates and private keys; .der and .cer file extensions.
66
DES, not digital
Data Encryption Standard
67
DHCP
Dynamic Host Configuration Protocol
68
DHE
Diffie-Hellman Ephemeral
69
DKIM
Domain Keys Identified Mail
70
DLL
Dynamic Link Library
71
DLP
Data Loss Prevention
72
DMARC
Domain Message Authentication Reporting and Conformance - DNS text record
73
DNAT
Destination Network Address Transaction
74
DNS
Domain Name System
75
DNSSEC
Domain Name System Security Extensions
76
DoS
Denial of Service
77
DPO
Data Protection Officer
78
DRP
Disaster Recovery Plan
79
DSA
Digital Signature Algorithm
80
DSL
Digital Subscriber Line
81
EAP
Extensible Authentication Protocol
82
ECB
Electronic Code Book
83
ECC
Elliptic-Curve Cryptography
84
ECDHE
Elliptic-Curve Diffie Hellman Ephemeral
85
ECDSA
Elliptic Curve Digital Signature Algorithm
86
EDR
Endpoint Detection and Response
87
EFS
Encrypted File System
88
EIP
Extended Instruction Pointer -tells the computer where to go next to execute the next command and controls the flow of a program.
89
EOL
End of Life
90
EOS
End of Service
91
ERP
Enterprise Resource Planning
92
ESN
Electronic Serial Number
93
ESP
Encapsulating Security Payload; supports CIA, Confidentiality, Integrity, and authentication
94
ESSID
Extended Service-Set Identifier
95
FACL
File system Access Control List
96
FDE
Full Disk Encryption
97
FIM
File Integrity Monitoring
98
FPGA
Field Programmable Gate Array- A processor that can be programmed for a specific function by the customer, not manufacturer.
99
FRR
False Rejection Rate
100
FTP
File Transfer Protocol
101
CAC
Common Access Card
102
CA
Certificate Authority
103
CER
Crossover Error Rate
104
COOP
Continuity of Operations Plan
105
CSP
Cloud Service Provider
106
DFIR
Digital Forensics and Investigation Report
107
108
BCRYPT
109
EAP-FAST
Extensible Authentication Protocol - Flexible Authentication via Secure Tunneling: wireless authentication protocol using a tls tunnel
110
FAR
False Acceptance Rate
111
CER
Crossover Error Rate: The rate where the biometric FAR and FRR are equal.
112
FAT
File Allocation Table: time stamps are local to the device.
113
CSF
Cybersecurity Framework :nist guidlines, standards, and framework to improve posture