Acronyms Flashcards

1
Q

AAA

A

Authentication, Authorization, and Accounting: A framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List: A table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard: A symmetric encryption algorithm widely used across the glove to secure data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES-256

A

Advanced Encryption Standards 256-bit: A version of AES using 256-bit key size for encryption, providing a higher level of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AH

A

Authentication Header: A part of the IPsec protocol suite that provides authentication and integrity to the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AI

A

Artificial Intelligence: The simulation of human intelligence processes by machines, especially computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AIS

A

Automated Indicator Sharing: A system that allows the exchange of cyber threat indicators between the public and private sectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy: A risk management concept to estimate the monetary loss that can be expected for an asset due to a risk over a year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point: A networking hardware device that allows other Wi-Fi devices to connect to a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface: A set of functions and procedures allowing the creation of applications that access the features or data on an operating system, application, or other services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat: A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurrence: The expected frequency with which a specific event is likely to occur annually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol: A communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization: A computer security technique involved in preventing exploitation of memory corruption vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge: A knowledge base maintained by MITRE for listing and explaining cyber adversary behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AUP

A

Acceptable Use Policy: A policy that sets out the rules and guidelines for the proper use of an organization’s information technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AV

A

Antivirus: Software designed to detect and destroy computer viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BASH

A

Bourne Again Shell: A Unix shell and command language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BCP

A

Business Continuity Planning: The process involved in creating a system of prevention and recovery from potential threats to a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BGP

A

Border Gateway Protocol: The protocol used to route information across the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BIA

A

Business Impact Analysis: A process that identifies and evaluate the potential effects of natural and man-made events on business operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BIOS

A

Basic Input/Output System: Firmware used to perform hardware initialization during the booting process and to provide runtime services for operating systems and programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BPA

A

Business Partners Agreement: A contract between parties who have agreed to share resources to undertake a specific, mutually beneficial project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BPDU

A

Bridge Protocol Data Unit: A type of network message that is transmitted by a local area network (LAN) bridge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

BYOD

A

Bring Your Own Device: A policy that allows employees to bring personally owned devices to their workplace and use those devices to access company information and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

CA

A

Certificate Authority: An entity that issues digital certificates for use by other parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

CAPTCHA

A

Completely Automated Public Turing Test to Tell Computers and Humans Apart: A type of challenge-response test used in computing to determine whether the user in human.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

CAR

A

Corrective Action Report: A report that outlines the corrective actions necessary to rectify a detected non-conformance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

CASB

A

Cloud Access Security Broker: On-premises or cloud-based security policy enforcement points between cloud service consumers and cloud service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

CBC

A

Cipher Block Chaining: A mode of operation for a block cipher that provides confidentiality but not message integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

CCMP

A

Counter Mode/CBC-MAC Protocol: An encryption protocol used in Wi-Fi networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

CCTV

A

Closed-circuit Television: A TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

CERT

A

Computer Emergency Response Team: An expert group that handles computer security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

CFB

A

Cipher Feedback: a mode of operation for a block cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

CHAP

A

Challenge Handshake Authentication Protocol: A type of authentication protocol used primarily to authenticate a user or network host to an authenticating entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

CIA

A

Confidentiality, Integrity, Availability: A model designed to guide policies for information security within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

CIO

A

Chief Information Officer: A job title commonly given to the most senior executive in an enterprise responsible for the information technology and computer systems that support enterprise goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

CIRT

A

Computer Incident Response Team: A service organization that is contacted when a security breach or other computer-related emergency occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

CMS

A

Content Management System: Software that helps users create, manage, and modify content on a website without the need for specialized technical knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

COOP

A

Continuity of Operation Planning: A process by government agencies to ensure that critical functions continue during a wide range of emergencies, including localized acts of nature, accidents, and technological or attack-related emergencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

CP

A

Contingency Planning: A course of action designed to help an organization respond effectively to a significant future event or situation that may or may not happen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

CRC

A

Certificate Redundancy Check: An error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.

43
Q

CRL

A

Certificate Revocation List: A list of digital certificates that have been revoked by the issuing certificate authority before their scheduled expiration date and should no longer be trusted.

44
Q

CSO

A

Chief Security Officer: A company executive responsible for the security of personnel, physical assets, and information in both physical and digital form.

45
Q

CSP

A

Cloud Service Provider: A company that offers some component of cloud computing - typically Infrastructure as a Service (IaaS), Software as a Service (SaaS) or Platform as a Service (PaaS) - to other businesses or individuals.

46
Q

CSR

A

Certificate Signing Request: A message sent from an applicant to a certificate authority in order to apply for a digital identity certificate.

47
Q

CSRF

A

Cross-site Request Forgery: A type of malicious exploit of a website where unauthorized commands are transmitted from a user that the web application trusts.

48
Q

CSU

A

Channel Service Unit: A device used in digital data transmission for interfacing a digital data terminal with a digital transmission medium.

49
Q

CTM

A

Counter Mode: A mode of operation in cryptography for block ciphers.

50
Q

CTO

A

Chief Technology Officer: An executive-level position in a company or other entity whose occupant is focused on scientific and technological issues within an organization.

51
Q

CVE

A

Common Vulnerability Enumeration: A list of publicly disclosed cybersecurity vulnerabilities.

52
Q

CVSS

A

Common Vulnerability Scoring System: A free and open industry standard for assessing the severity of computer system security vulnerabilities.

53
Q

CYOD

A

Choose Your Own Device: A corporate policy that permits employees to choose which devices they use for work purposes.

54
Q

DAC

A

Discretionary Access Control: A type of access control defined by the Access Control List (ACL) where access rights are assigned to users by the system (or system’s administrators).

55
Q

DBA

A

Database Administrator: A person who uses specialized software to store and organize data.

56
Q

DDoS

A

Distributed Denial of Service: A type of cyber-attack where multiple compromised computer systems attack a target, such as a server, website, or other network resource, and cause a denial of service for users of the targeted resource.

57
Q

DEP

A

Data Execution Prevention: A security feature that can help prevent damage to your computer from viruses and other security threats.

58
Q

DES

A

Digital Encryption Standard: A previously dominant algorithm for the encryption of electronic data.

59
Q

DHCP

A

Dynamic Host Configuration Protocol: A network management protocol used on IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network.

60
Q

DHE

A

Diffie-Hellman Ephemeral: A method of securely exchanging cryptographic keys over a public channel.

61
Q

DLL

A

Dynamic Link Library: A feature of Windows and other operating systems that allows multiple software programs to share the same functionality.

62
Q

DLP

A

Data Loss Prevention: A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

63
Q

DMARC

A

Domain Message Authentication Reporting and Conformance: An email authentication protocol designed to give email domain owners the ability to protect their domain from unauthorized use, commonly known as email spoofing.

64
Q

DNAT

A

Destination Network Address Translation: A technique for transparently changing the destination IP address of an end route packet and performing the invers function for any replies.

65
Q

DNS

A

Domain Name System: The phonebook of the Internet, a hierarchical and decentralized naming system for computers, services or other resources connected to the Internet or a private network.

66
Q

DoS

A

Denial of Service: A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

67
Q

DPO

A

Data Privacy Officer: A role within a company or organization responsible for ensuring that the company complies with data protection laws.

68
Q

DRP

A

Disaster Recovery Plan: A structured approach with policies and procedures for responding to an unplanned incident and recovering critical systems.

69
Q

DSA

A

Digital Signature Algorithm: A standard for digital signatures.

70
Q

DSL

A

Digital Subscriber Line: A family of technologies that provide internet access by transmitting digital data over the wires of local telephone network.

71
Q

EAP

A

Extensible Authentication Protocol: An authentication framework frequently used in wireless networks and Point-to-Point connections.

72
Q

ECC

A

Elliptic Curve Cryptography: An approach to public‐key cryptography based on the algebraic
structure of elliptic curves over finite fields.

73
Q

ECDHE

A

Elliptical Curve Diffie-Hellman Ephemeral: A variant of the Diffie-Hellman algorithm that uses elliptic curve cryptography.

74
Q

ECDSA

A

Elliptical Curve Digital Signature Algorithm: A cryptographic algorithm used by Bitcoin to ensure that funds can only be spent by their rightful owners.

75
Q

EDR

A

Endpoint Detection and Response: A cybersecurity technology that addresses the need for continuous monitoring and response to advanced threats.

76
Q

EFS

A

Encrypted File System: A feature of some versions of Microsoft Windows that provides filesystem-level encryption.

76
Q

ERP

A

Enterprise Resource Planning: Business process management software that allows an organization to use a system of integrated applications to manage the business and automate many back office functions.

77
Q

ESN

A

Electronic Serial Number: A unique identification number embedded by manufacturers on a microchip in wireless phones.

77
Q

ESP

A

Encapsulated Security Payload: A component of IPsec used for providing confidentiality, along with some authentication and integrity, to the data.

77
Q

FACL

A

File System Access Control List: A data structure, most often associated with Microsoft Windows and NTFS, that controls access to files and folders.

77
Q

FDE

A

Full Disk Encryption: Encryption at the hardware level.

77
Q

FIM

A

File Integrity Management: A technology that monitors and reports changes in files, often used in IT security.

77
Q

FPGA

A

Field Programmable Gate Array: An integrated circuit designed to be configured by a customer or a designer after manufacturing.

78
Q

FRR

A

False Rejection Rate: In biometric security systems, the measure of the likelihood that the biometric security system will incorrectly reject an access attempt by an authorized user.

78
Q

FTP

A

File Transfer Protocol: A standard network protocol used for the transfer of computer files between a client and server on a computer network.

78
Q

FTPS

A

Secured File Transfer Protocol: An extension of FTP that adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols.

78
Q

GCM

A

Galois Counter Mode: A mode of operation for symmetric key cryptographic block ciphers that has been widely adopted because of its efficiency and performance.

78
Q

GDPR

A

General Data Protection Regulation: A regulation in EU law on dat a protection and privacy in the European Union and the European Economic Area.

78
Q

GPG

A

Gnu Privacy Guard: A free software re-implementation of the OpenPGP standard as defined by RFC4880, which allows you to encrypt and sign your data and communications.

78
Q

GPO

A

Group Policy Object: A feature of Windows that provides centralized management and configuration of operating systems, applications, and users’ settings in an Active Directory environment.

79
Q

GPS

A

Global Positioning System: A satellite-based radio navigation system owned by the United States government and operated by the United States Space Force.

79
Q

GPU

A

Graphics Processing Unit: A specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device.

79
Q

GRE

A

Generic Routing Encapsulation: A tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links or point-to-multipoint links over an Internet Protocol network.

79
Q
A
80
Q
A
80
Q
A
81
Q
A
82
Q
A
83
Q
A
84
Q
A
85
Q
A
86
Q
A
87
Q
A
88
Q
A