Acronyms Flashcards
3DES
Triple Data Encryption Standard
AAA
Authentication, Authorization, and Accounting
ABAC
Attribute Based Access Control
ACL
Access Control List
AD
Active Directory
AES / AES256
Advanced Encryption Standard / 256 bit
AH
Authentication Header; supports authentication and integrity only.
AI
Artificial Intelligence
AIS
Automated Indicator Sharing -
enables organizations to share and receive machine-readable cyber threat indicators (CTIs)
ALE
Annualized Loss Expectancy
AP
Access Point
API
Application Programming Interface
APT
Advanced Persistent Threat
ARO
Annualized Rate of Occurence
ARP
Address Resolution Protocol
ASLR
Address Space Layout Randomization
ASP
Active Server Pages - is Microsoft’s first server-side scripting language and engine for dynamic web pages
ATT&K
Adversarial Tactics and Techniques
AUP
Acceptable Use Policy
AV
Antivirus
BASH
Bourne Again Shell
BCP
Business Continuity Planning
BGP
Border Gateway Protocol
BIA
Business Impact Analysis
BIOS
Basic Input Output System
BPA
Business Partnership Agreement
BPDU
Bridge Protocol Data Unit
BSSID
Basic Service Set Identifier
BYOD
Bring Your Own Device
CA
Certificate Authority
CAPTCHA
Completely Automated Public Turing - test to tell humans and computers apart
CAR
Corrective Action Report
CASB
Cloud Access Security Broker
CBC
Cipher Block Chaining
CBT
Computer Based Training
CCMP
Counter-mode CBC-MAC Protocol - an enhanced data cryptographic encapsulation mechanism designed for data confidentiality
CCTV
Closed Circuit Television
CERT
Computer Emergency Response Team
CFB
Cipher Feedback
CHAP
Challenge Handshake Authentication Protocol
CIO
Chief Information Officer
CIRT
Computer Incident Response Team
CIS
Center for Internet Security
CMS
Content Management System
CN
Common Name
COPE
Corporate Owned, Personally Enabled
CP
Contingency Planning
CRC
Cyclic Redundancy Check
CRL
Certificate Revocation List
CSA- (not certif sign authority)
Cloud Security Alliance
CSIRT
Computer Security Incident response Team
CSO
Chief Security Officer
CSR
Certificate Signing Request
CSRF/xsrf
Cross-Site Request Forgery
1: Exploits the trust a website has in the user’s web browser, 2: User submits an unauthorized request to the server, and 3: The website executes the attacker’s request
CSU
Channel Service Unit
CTM
Counter-Mode
CTO
Chief Technology Officer
CVE
Common Vulnerabilities and Exposures - open source list (database) of computer security flaws.
CVSS
Common Vulnerability Scoring System: 0 to 10, with 10 being the most severe.
CYOD
Choose Your Own Device
DAC
Discretionary Access Control
DBA
Database Administrator
DDoS
Distributed Denial of Service
DEP
Data Execution Prevention: Microsoft technology that prevent buffer overflow attacks and executable code from launching; systems level memory protection
DER
Distinguished Encoding Rules -encoding for x.509 certificates and private keys; .der and .cer file extensions.
DES, not digital
Data Encryption Standard
DHCP
Dynamic Host Configuration Protocol
DHE
Diffie-Hellman Ephemeral
DKIM
Domain Keys Identified Mail
DLL
Dynamic Link Library
DLP
Data Loss Prevention
DMARC
Domain Message Authentication Reporting and Conformance - DNS text record
DNAT
Destination Network Address Transaction
DNS
Domain Name System
DNSSEC
Domain Name System Security Extensions
DoS
Denial of Service
DPO
Data Protection Officer
DRP
Disaster Recovery Plan
DSA
Digital Signature Algorithm
DSL
Digital Subscriber Line
EAP
Extensible Authentication Protocol
ECB
Electronic Code Book
ECC
Elliptic-Curve Cryptography
ECDHE
Elliptic-Curve Diffie Hellman Ephemeral
ECDSA
Elliptic Curve Digital Signature Algorithm
EDR
Endpoint Detection and Response
EFS
Encrypted File System
EIP
Extended Instruction Pointer -tells the computer where to go next to execute the next command and controls the flow of a program.
EOL
End of Life
EOS
End of Service
ERP
Enterprise Resource Planning
ESN
Electronic Serial Number
ESP
Encapsulating Security Payload; supports CIA, Confidentiality, Integrity, and authentication
ESSID
Extended Service-Set Identifier
FACL
File system Access Control List
FDE
Full Disk Encryption
FIM
File Integrity Monitoring
FPGA
Field Programmable Gate Array- A processor that can be programmed for a specific function by the customer, not manufacturer.
FRR
False Rejection Rate
FTP
File Transfer Protocol
CAC
Common Access Card
CA
Certificate Authority
CER
Crossover Error Rate
COOP
Continuity of Operations Plan
CSP
Cloud Service Provider
DFIR
Digital Forensics and Investigation Report
BCRYPT
EAP-FAST
Extensible Authentication Protocol - Flexible Authentication via Secure Tunneling: wireless authentication protocol using a tls tunnel
FAR
False Acceptance Rate
CER
Crossover Error Rate: The rate where the biometric FAR and FRR are equal.
FAT
File Allocation Table: time stamps are local to the device.
CSF
Cybersecurity Framework :nist guidlines, standards, and framework to improve posture