acronyms Flashcards

1
Q

AIS

A

Automated Indicator Sharing-
private and public sector cyber threat indicators and defensive measure sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ARO

A

Annual Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ALSR

A

Address Space Layout occurrence-
guards against buffer overflow by randomizing the location of executables in memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AUP

A

Acceptable User Policy-
document signed accepting practices and constraints for users to access corporate network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BGP

A

Border Gateway protocol-
protocol used by routers to exchange routing information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BPA

A

Business Partner Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BPDU

A

Bridge Protocol Data Unit-
data message transmitted across a local area network to detect loops in network topologies, contains info regarding ports,switches, port priority and addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CAR

A

Corrective Action Report-
official document issued when an element of a plan hasn’t been implemented properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CASB

A

Cloud Access Security Broker-
security policy enforcement point placed between cloud service consumers and cloud service providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CCMP

A

Counter Mode/Cipher Block Chaining-MAC Protocol-
encryption protocol designed for wireless products, implements IEEE 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CFB

A

Cipher Feedback-
mode of operation from a block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CHAP

A

Challenge Handshake authentication protocol-
originally used by PPP (point to point protocol) to validate users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CIRT

A

Computer Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CMS

A

Content Management System-
helps users create and manage content online without the need for technical knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

COOP

A

Continuity of Operation Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

COPE

A

Corporate owned, personally enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CP

A

Contingency Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CRC

A

Cyclical Redundancy Check-
error detection code commonly used in digital networks and storage devices, checks for data corruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CRL

A

Certificate Revocation List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CSP

A

Cloud Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CSR

A

Certificate Signing request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CSRF
Cross-site request forgery
26
CSU
Channel Service Unit- hardware device that converts digital data frames from LAN to WLAN
27
CTM
Counter Mode- counter values for cyphertext blocks
28
CYOD
Choose Your Own device
29
DAC
Discretionary access control- principle of restricting access to objects based on the identity of the subject
30
DEP
Data execution prevention
31
DKIM
Domain Keys Identified Mail- encrypted digital signature added to the header of a message
32
DLL
Dynamic Link Library
33
DLP
Data Loss Prevention
34
DMARC
Domain Message Authentication Reporting and Conformance- asses email message for authenticity by using DKIM etc.
35
DNAT
Destination Network Address Translation
36
DRP
Disaster Recovery Plan
37
DSA
Digital Signature Algorithm
38
DSL
Digital Subscriber line- communication medium used to transfer internet communication through copper telecommunications lines
39
EAP
Extensible authentication protocol- protocol for wireless networks that expands the authentication methods used by point-to-point (ppp) protocol
40
ECB
Electronic Code Book- simple mode of operation with a block cipher mostly used with symmetric key encryption
41
ECC
Elliptic curve cryptography
42
ECDHE
elliptic curve diffie-hellman ephemeral
43
ECDSA
elliptic curve digital signature algorithm
44
EFS
encrypted file system
45
ERP
enterprise resource planning
46
ESN
electronic serial number
47
ESP
encapsulated security payload
48
FACL
file system access control list
49
FDE
full disk encryption
50
FIM
File integrity manager
51
FPGA
Field Programmable Gate array- semiconductor devices based around a matrix of configurable logic blocks connected via programmable interconnects
52
FRR
False Rejection Rate
53
GCM
Galois counter mode
54
GPG
GNU privacy guard- replacement for PGP encryption software suite
55
GPO
Group Policy Object
56
GRE
Generic routing encapsulation- encapsulates packets in order to route various protocols IP. Creates a private-point-to-point connection like a VPN.
57
HA
High Availability
58
HMAC
Hashed Message Authentication Code
59
HOTP
HMAC based One Time Password
60
HSM
Hardware Security Module
61
IaaS
Infrastructure as a Service
62
IAM
Identity and Access Management
63
ICS
Industrial Control Systems
64
IDEA
International Data Encryption Algorithm
65
IDF
Intermediate Distribution Frame
66
IKE
Internet Key Exchange
67
IMAP
Internet Message Access Protocol
68
IOC
Indicator of Compromise
69
IR
Incident Response
70
IRP
Incident Response Plan
71
KDC
Key Distribution Center- System for providing keys to the users in a network
72
LDAP
Lightweight Directory Access Protocol
73
LEAP
Lightweight Extensible Authentication Protocol
74
MOA
Memorandum of Agreement- legal document describing a business partnership between two parties cooperating
75
MOU
Memorandum of Understanding- nonbinding agreement that states each parties intentions
76
MPLS
Multi-Protocol Label Switching- networking technology that routes traffic using the shortest path based on labels, rather than network addresses
77
MSA
Master Service Agreement- contract outlining the scope of the relationship between two parties including terms and conditions, responsibilities etc.
78
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
79
MTBF
Mean Time Between Failures
80
MTTF
Mean Time To Failure
81
MTTR
Mean Time to Recover
82
MTU
Maximum transmission unit- measure representing the largest data packet that a network connected device will accept
83
NAC
Network Access Control- system that can deny access to network for non-compliant devices, place them in quarantined area or give them restricted access
84
NIDS
Network Based Intrusion Detection System
85
NTFS
New Technology File system- provides virtual space to organize and store files. It also notes file positions in folders, creation dates, and provides encryption
86
NTLM
New Technology Lan Manager- automated challenge response authentication protocol, form of SSD
87
OCSP
Online Certificate Status Protocol- alternate to the certificate revocation list and is used to check whether a digital certificate is valid
88
OSPF
Open Shortest Path First- routing protocol, gathers link state information from available routers and constructs a topology map of the network
89
OVAL
Open Vulnerability Assessment Language- language used to encode system details. Community standard
90
PAC
Proxy Auto Configuration- text file that instructs a browser to forward traffic to proxy server
91
PAM
Privileged access Management
92
PAP
Password Authentication Protocol
93
PAT
Port Address Translation- type of NAT that maps a networks private internal IP to a single public IP
94
PBKDF2
Password-based key derivation function
95
PBX
private branch exchange
96
PCAP
packet capture
97
PCIDSS
Payment Card Industry Data Security Standard
98
PDU
Power Distribution Unit- manage and distribute electricity
99
PEAP
Protected Extensible Authentication Protocol- security protocol used to protect wireless networks
100
PEM
Privacy Enhanced mail
101
PFS
Perfect Forward Secrecy
102
PIV
Personal Identity Verification
103
PKCS
Public Key Cryptography Standards
104
PKI
Public Key Infrastructure
105
POP
Post Office Protocol
106
PPP
Point-to-point Protocol- a data link layer communication protocol between two routers directly without any host or any other networking
107
PPTP
Point-to-Point Tunneling Protocol- secure transfer, creates VPN
108
PSK
Preshared key
109
PUP
Potentially Unwanted Program
110
RA
Recovery Agent
111
RA
Registration Authority
112
RACE
Research and Development in Advanced Communication technologies in eruope
113
RAD
Rapid Application Development
114
RADIUS
Remote Authentication Dial-in User Service
115
RAS
Remote Access Server
116
RAT
Remote Access Trojan
117
RBAC
Role Based Access Control/Rule Based Access Control
118
RC4
Rivest Cipher Version 4
119
RDP
Remote Desktop Protocol
120
ROI
Return on Investment
121
RPO
Recovery Point Objective
122
RTBH
Remotely Triggered Black Hole- blocks undesirable data traffic at the edge of a network (based on src or dst ip addr)
123
RTO
Recovery Time Objective- maximum amount of time acceptable for restoring a network or application and regaining access to data
124
RTOS
Real Time Operating System- for critical systems, designed so that a scheduler in the os can meet specific deadlines for different tasks
125
RTP
Real-Time Transport Protocol- designed for transmitting audio or video data that is optimized for consistent delivery of live data
126
S/MIME
Secure/Multipurpose internet mail extensions- encrypts emails, digitally signs your emails
127
SAE
Simultaneous Authentication of Equals- Key exchange protocol, establishes a shared secret. Primarily used for securing the key exchange process in WIFI networks
128
SAML
Security Assertions Markup Language- Standardized way to tell external applications and devices that user is who they say they are. Makes SSO possible
129
SAN
Storage Area Network
130
SCADA
Supervisory Control And Data Acquisition- systems used for controlling, monitoring industrial devices
131
SCAP
Security Control Automation Protocol- method for using specific standards to enable automated vulnerability management policy compliance evaluation etc
132
SCEP
Simple Certificate Enrollment Protocol- Protocol used to make digital certificate issuance at large organizations easier
133
SD-WAN
Software Defined Wide Area Network
134
SDLC
Software Development Life Cycle
135
SDLM
Software Development Lifecycle methodology
136
SDN
Software Defined Networking
137
SED
Self Encrypting Drives
138
SEM
structured exception handler
139
SLA
Service-Level agreement- outlines a commitment between a service provider and a client
140
SLE
Single Loss Expectancy- monetary value expected from the occurrence of a risk on an asset
141
SNMP
Simple Network Management Protocol
142
SOAP
Simple Object Access Protocol- intermediate language for applications that have different programming languages. Lightweight protocol used to create web APIS
143
SOAR
Security Orchestration Automation Response- stack of software that collect data about cyber threats and respond to security events with little or no human assistance
144
SOW
Statement of Work- document that outlines the scope, timeline and cost of a project between two parties
145
SPF
Sender Policy Framework- email authentication method that helps to identify the email servers that are allowed to send email to a given domain
146
SRTP
Secure Real Time Protocol
147
STIX
Structured Threat Information Exchange- XML programming language used for conveying data about cyber threats in a way that can be easily understood
148
SWG
Secure Web Gateway- URL filtering, filters web and internet traffic on application layer
149
TACAS+
Terminal Access Control Access Control System- improved version of TACAS protocol, used for authentication, authorization and accounting
150
TAXII
Trusted Automated Exchange of Indicator information- format through which threat intelligence data is transmitted, supports transferring STIX
151
TGT
Ticket Granting Ticket- user authentication software used to request access tokens from the Ticket Granting Service (TGS) for specific resources
152
TKIP
Temporary key integrity protocol- used in wireless to provide more secure encryption
153
TOC
Time of Check
154
TOTP
Time Based One Time Password
155
TOU
Time of Use
156
TTP
Tactics, Techniques and Proceedures
157
TSIG
Transaction Signature- primarily used to enable DNS to authenticate updates to a DNS database
158
UAT
User Acceptance Testing- final stage of software development lifecycle before the software goes live
159
UEM
Unified End Point Management- approach to control and securing desktops, laptops, smartphones and tablets in a connected, cohesive manner from a single console
160
UPS
Uninterruptible Power Supply
161
UTM
Unified Threat Management
162
UTP
Unshielded Twisted Pair- type of copper cable widely used for networking
163
VDI
Virtual Desktop Infrastructure
164
VLSM
Variable Length Subnet Masking
165
VPC
Virtual Private Cloud
166
VTC
Video Teleconferencing
167
WAF
Web Application Firewall
168
WAP
Wireless Access Point
169
WEP
Wired Equivalent Privacy
170
WIDS
Wireless Intrusion Detection System
171
WIPS
Wireless Intrusion Prevention System
172
WO
Work Order- document that provides all the information about a maintenance task and outlines a process for completing that task
173
WPA
Wifi Protected Access
174
WPS
Wifi Protected Setup
175
WTLS
Wireless TLS
176
XDR
Extended Detection and Response- unified security incident platform that uses AI and automation
177
XSRF
Cross-site request forgery
178
XSS
Cross-site Scripting