Acronyms Flashcards

1
Q

MTD

A

Maximum tolerable downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RPO

A

Recovery point objective

We have to recover to at least this point

The maximum allowed amount of data loss, measured in time

How often backups are performed. More frequent backups = smaller RPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MTTR

A

Mean time to repair

How long a repair takes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MTBF

A

Mean time between failure

Average time between failures of a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MFD

A

Multifunction device
All in one printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PKI

A

Public key infrastructure

Processes and procedures for maintaining digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MTTF

A

Mean time to failure

Expected life of a NON REPAIRABLE system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RTO

A

Recovery time objectives

We have to be up in this amount of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EAP TTLS

A

Extensible authentication protocol - Tunneled transport layer security

Allows the use of multiple authentication protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CASB

A

Cloud access security broker

Used to apply security to cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SED

A

Self encrypting drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VDI

A

Virtual desktop infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CA

A

Certificate authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

X.509

A

Defines the structure of a certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HSM

A

Hardware security module

Cryptographic hardware that stores keys and certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SLE

A

Single loss expectancy

Loss from a single event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ALE

A

Annual loss expectancy

Loss over a year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ARO

A

Annualized rate of occurrence

Number of times in a year something will happen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

NTP

A

Network time protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FDE

A

Full disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

PICERL

A

Prepare
Identify
Contain
Eradicate
Recover
Lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CMS

A

Content management system

Used to make changes to a website for dummies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SIAM

A

Service integration and management

Combines different services into one management plane
Makes working with different cloud providers easier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

OTA

A

Over the air

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
OCSP
online certificate status protocol
26
CSR
Certificate signing request
27
AIS
Automated Indicator Sharing Sharing information between businesses
28
HIPS
Host based IPS
29
ECC
Elliptic Curve Cryptography Short keys for mobile devices
30
PGP
Pretty Good Privacy Cryptography
31
RA
Registration Authority (Request Authority) Verify the certificate requester
32
CRL
Certificate Revocation List
33
HA
High Availability
34
ECB
Electronic Codebook Block cipher, each block has the same key Too simple (bad)
35
HMAC
Hash-based Message Authentication Code Hash for AH in IPsec
36
SAML
Security Assertion Markup Language Used to exchange authentication and authorization data between parties Used for federation
37
RP
Relying Parties Provide services for members of a federation
38
IdP
Identify Provider
39
TTPs
Tactics Techniques and Procedures that bad guys use
40
FISMA
Federal Information Security Management Act Government and people who work with them need to comply with their security standards
41
COPPA
Children’s Online Privacy Protection Act
42
PIV
Personal Identity Verification
43
COOP
Continuity Of Operations Plan
44
VPC
Virtual private cloud Private network inside of a cloud
45
CIS
Center for Internet Security Cybersecurity best practices
46
ISA
Interconnection Security Agreement A secure connection between two companies
47
WORM
Write once read many Can’t modify logs
48
PFX
Personal Information Exhange Certificate file with a password .pfx file .p12 for many certificates
49
OVAL
Open Vulnerability and Assessment Language Is a standard format for sharing vulnerability information between tools Like a jpg for vulnerability information
50
SAN
Subject alternative name Allows a certificate to support many different domain names
51
CVSS
Common Vulnerability Scoring System
52
RFC
Request For Comments Documents that govern how the internet works
53
SDV
Software Defined Visibility Dashboard for monitoring network
54
SDK
Software Development Kit
55
OWASP
Opens Web App Security Project
56
PDU
Power Distribution Unit
57
SWG
Secure Web Gateway Cloud gateway
58
MOU
Memorandum Of Understanding A gentleman’s agreement
59
BPA
Business Partnership Agreement Business contract
60
MSA
Measurement System Analysis Don’t make decisions on bad data!
61
DRP
Disaster Recovery Plan