Acronyms Flashcards

1
Q

ACL

A

Access control list- rule that either permits or denies actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARP

A

Address resolution protocol (ARP)-A protocol that provides translations between MAC addresses and IP addresses on a local network. 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AI

A

The use of artificial intelligence techniques by attackers for malicious purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TTP

A

Adversary tactics, techniques, and procedures (TTPs)-The study of the methods used by cyber security adversaries when engaging in attacks. 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AUP

A

Acceptable Use Policy–A document that provides network and system users with a clear direction on permissible uses of information resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APT

A

Advance persistent Treats -Cybersecurity adversary characterized by a sophisticated series of related attacks taking placed over an extended period of time.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ALE

A

Annualized loss expectancy (ALE)–The possible yearly cost of all instances of a specific realized threat against a specific asset. THE ALE is calculated using the formula ALE=Single loss expectancy (SLE) *Annualized rate of occurrence (ARO) 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ARO

A

Annualized Rate of Occurrence ARO- The expected frequency that a specific threat or risk will occur within a single year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

API

A

Application programming interfaces (API)- API’s allow application developers to interact directly with a web service through function calls. 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AV

A

Asset Value (AV)– A dollar value assigned to an asset based on actual cost and nonmonetary expenses. 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AC

A

Attack Complexity Metric (AC)- A metric that describes the difficulty of exploiting a vulnerability. 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AV

A

Attack Vector Metric (AV)- A metric that describes how an attacker would exploit a vulnerability.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ABAC

A

Attribute based access control (ABAC)- An advance implementation of a rule based access control model that uses polices that include multiple attributes for rules. 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A

A

Availability Metric (A) - A metric that describes the type of distribution that might occur if an attacker successfully exploits a vulnerability. 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BEC

A

Business Email Compromise (BEC)-Relies on using apparently legitimate email addresses to conduct scams and other attacks. 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BIA

A

Business Impact Analysis (BIA)- a formal process designed to identify the mission-essential functions within an organization and facilitate the identification of the critical systems that support those functions. 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BPA

A

Business Partners agreement (BPA) Exists when 2 organizations agree to do business with each other in a partnership. 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CTF

A

Capture The Flag (CTF) –An exercise that pits technologist against one another in an attempt to attack a system and achieve a specific goal, such as stealing a sensitive file. 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CCMP

A

CCMP- (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) –Encryption technology used in the WPA2 protocol. It implements AES (Advance Encryption Standard) with a 128 bit key as a stream cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AES

A

AES (Advance Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CIS

A

Center For Internet Security (CIS) An industry organization that publishes hundreds of benchmarks for commonly used platforms. 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CA

A

Certificate Authorities (CA) CA are the glue that binds the public key infrastructure together. These neural organizations offer notarization services for digital certificates. 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CRL

A

Certificate Revocation List (CRL) used to ensure that the certificate was not revoked. 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CSR

A

Certificate Signing Request (CSR)– Provides your public key to the certificate authority to create an X.509 digital certificate containing your identifying information and a copy of your public key. 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

CHAP

A

Challenge handshake Authentication Protocol (CHAP) A protocol that challenges a user or system to verify its identity without sending a secret key over the network. 9

26
Q

CYOD

A

Choose your Own Device (CYOD) – The organization owns the device but allows the user to select and maintain it. 9

27
Q

CCTV

A

Closed Circuit Television (CCTV) displays what the camera is seeing on a screen. Some CCTV systems include recording capabilities.

28
Q

CASB

A

Cloud Access Security Broker (CASB) – A security policy enforcement solution that consistently enforces security policies across cloud providers.

29
Q

CN

A

Common name (CN) Clearly describes the certificate owner. 11

30
Q

CPE

A

Common platform enumeration (CPE)–Provides a standard nomenclature for describing product names and versions. 11

31
Q

CLE

A

Column level encryption (CLE) allows for specific columns within tables to be encrypted. 11

32
Q

CCE

A

Common configuration enumeration (CCE) provides a standard nomenclatures for discussing system configuration issues.

33
Q

CVE

A

Common Vulnerabilities and Exposure (CVE) Provides a standard nomenclature for describing security related software flaws. 11

34
Q

CVSS

A

Common Vulnerability Scoring System (CVSS) – Security Content Automation Protocol (SCAP) Component that provides a standardized scoring system for describing the characteristics and severity of security vulnerabilities. 11

35
Q

COBO

A

Company Owned Business ONLY (COBO) – Most frequently used to describe company owned devices used only for business work. 11

36
Q

CBT

A

Computer Based Training (CBT)- method of Delivery training content to users by digital means.11

37
Q

CD

A

Continuous Delivery (CD) – Sometimes called continuous delivery; it rolls out tested changes into production automatically as soon as they have been tested. 12

38
Q

CI

A

Continuous Integration (CI)– A development practice that checks code into a shared repository on a consistent, ongoing basis.

39
Q

COBIT

A

Control Objectives for Information and Related Technologies (COBIT)– Describes the common requirements that organizations should have in place surrounding their information systems. 13

40
Q

COPE

A

Corporate-Owned, personally Enabled (COPE)– Corporate provided devices that allow reasonable personal use while meeting enterprise security and control needs. 13

41
Q

XSRF/CSRF

A

Cross Site Request Forgery (XSRF/CSRF) An attack that is similar in nature to that of XSS. However, with XSRF, the attack is focused on the visiting user’s web browser more so than the website being visited. 13

42
Q

XSRF/CSRF

A

Cross Site Request Forgery (XSRF/CSRF) An attack that is similar in nature to that of XSS. However, with XSRF, the attack is focused on the visiting user’s web browser more so than the website being visited. 13

43
Q

XSS

A

Cross-Site Scripting (XSS)–Running a script routine on a user’s machine from a website without their permission. 13

44
Q

CER

A

Cross Over Rate– The point at which the false rejection rate (FRR) and the False acceptance rate (FAR) are equal. Sometimes called the Equal Error Rate (ERR) 13

45
Q

CSF

A

Cybersecurity Framework– NIST cybersecurity framework provides organization against cybersecurity risks.

46
Q

CYOD

A

Choose your own device

47
Q

DLP

A

Data Loss Prevention–Any systems that identify, monitor, and protect data to prevent it from unauthorized use, modification, destruction, egress, or exfiltration from a location.15

48
Q

DPO

A

Data Protection Officer - A specific individual who bears overall responsibility for carrying out the organization’s data privacy efforts.16

49
Q

DDoS

A

Denial of Service-One of the most common forms of the distributed denial of service attacks is a network based DDOS. Malicious actors commonly use large scale botnets to conduct network DDoS attacks, and commercial services exist that conduct DDOS attacks and DDos like behavior for stress and load testing purposes. 16

50
Q

DMZ

A

Demilitarized Zone- A network zone that resides between an internal network and the internet used to host systems that require public access. 16

51
Q

DRM

A

A type of protection software that uses encryption to enforce copyright restrictions on digital media. Over the past decade, publishers attempted to deploy DRM schemes across a variety of media types, including music, movies, and books. 17

52
Q

DRP

A

Disaster Recovery Plan -Term that describes the actions an organization takes to resume normal operations after a disaster interrupts normal activity. 18

53
Q

DMARC

A

Domain based message authentication reporting and conformance (DMARC)-A protocol that uses SPF and DKIM to determine if an email message is authentic. 19

54
Q

DNS

A

Domain Name System (DNS)–The network service used in TCP/IP networks that translates hostnames to IP addresses. 19

55
Q

DNSSEC

A

Domain Name System Security Extensions (DNSSEC)–Provide authentication of DNS data, allowing DNS queries to be validated even if they are not encrypted. 19

56
Q

DV

A

Domain Validation (DV) Certificates The CA simply verifies that the certificate subject has control of the domain name. 19

57
Q

DKIM

A

DomainKeys Identified Mail (DKIM)-Allows organizations to add content to messages to identify them as being from their domain. 19

58
Q

DHCP

A

Dynamic Host Configuration Protocol (DHCP)– A protocol used to assign TCP/IP configuration settings to systems upon bootup. DHCP uses UDP

59
Q

Dynamic Packet Filtering Firewall

A

A firewall that enables real time modification of the filtering rules based on traffic content. Dynamic packet-filtering firewalls are known as forth generation firewalls.

60
Q
A