Acronyms Flashcards

1
Q

AAA

A

Authentication, Authorization, and Accounting: A framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List: A table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard: A symmetric encryption algorithm widely used across the glove to secure data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES-256

A

Advanced Encryption Standards 256-bit: A version of AES using 256-bit key size for encryption, providing a higher level of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AH

A

Authentication Header: A part of the IPsec protocol suite that provides authentication and integrity to the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AI

A

Artificial Intelligence: The simulation of human intelligence processes by machines, especially computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AIS

A

Automated Indicator Sharing: A system that allows the exchange of cyber threat indicators between the public and private sectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy: A risk management concept to estimate the monetary loss that can be expected for an asset due to a risk over a year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point: A networking hardware device that allows other Wi-Fi devices to connect to a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface: A set of functions and procedures allowing the creation of applications that access the features or data on an operating system, application, or other services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat: A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurrence: The expected frequency with which a specific event is likely to occur annually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol: A communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization: A computer security technique involved in preventing exploitation of memory corruption vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge: A knowledge base maintained by MITRE for listing and explaining cyber adversary behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AUP

A

Acceptable Use Policy: A policy that sets out the rules and guidelines for the proper use of an organization’s information technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AV

A

Antivirus: Software designed to detect and destroy computer viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BASH

A

Bourne Again Shell: A Unix shell and command language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BCP

A

Business Continuity Planning: The process involved in creating a system of prevention and recovery from potential threats to a company.

20
Q

BGP

A

Border Gateway Protocol: The protocol used to route information across the internet.

21
Q

BIA

A

Business Impact Analysis: A process that identifies and evaluate the potential effects of natural and man-made events on business operations.

22
Q

BIOS

A

Basic Input/Output System: Firmware used to perform hardware initialization during the booting process and to provide runtime services for operating systems and programs.

23
Q

BPA

A

Business Partners Agreement: A contract between parties who have agreed to share resources to undertake a specific, mutually beneficial project.

24
Q

BPDU

A

Bridge Protocol Data Unit: A type of network message that is transmitted by a local area network (LAN) bridge.

25
Q

BYOD

A

Bring Your Own Device: A policy that allows employees to bring personally owned devices to their workplace and use those devices to access company information and applications.

26
Q

CA

A

Certificate Authority: An entity that issues digital certificates for use by other parties.

27
Q

CAPTCHA

A

Completely Automated Public Turing Test to Tell Computers and Humans Apart: A type of challenge-response test used in computing to determine whether the user in human.

28
Q

CAR

A

Corrective Action Report: A report that outlines the corrective actions necessary to rectify a detected non-conformance.

29
Q

CASB

A

Cloud Access Security Broker: On-premises or cloud-based security policy enforcement points between cloud service consumers and cloud service providers.

30
Q

CBC

A

Cipher Block Chaining: A mode of operation for a block cipher that provides confidentiality but not message integrity.

31
Q

CCMP

A

Counter Mode/CBC-MAC Protocol: An encryption protocol used in Wi-Fi networks.

32
Q

CCTV

A

Closed-circuit Television: A TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.

33
Q

CERT

A

Computer Emergency Response Team: An expert group that handles computer security incidents.

34
Q

CFB

A

Cipher Feedback: a mode of operation for a block cipher.

35
Q

CHAP

A

Challenge Handshake Authentication Protocol: A type of authentication protocol used primarily to authenticate a user or network host to an authenticating entity.

36
Q

CIA

A

Confidentiality, Integrity, Availability: A model designed to guide policies for information security within an organization.

37
Q

CIO

A

Chief Information Officer: A job title commonly given to the most senior executive in an enterprise responsible for the information technology and computer systems that support enterprise goals.

38
Q

CIRT

A

Computer Incident Response Team: A service organization that is contacted when a security breach or other computer-related emergency occurs.

39
Q

CMS

A

Content Management System: Software that helps users create, manage, and modify content on a website without the need for specialized technical knowledge.

40
Q

COOP

A

Continuity of Operation Planning: A process by government agencies to ensure that critical functions continue during a wide range of emergencies, including localized acts of nature, accidents, and technological or attack-related emergencies.

41
Q

CP

A

Contingency Planning: A course of action designed to help an organization respond effectively to a significant future event or situation that may or may not happen.

42
Q

CRC

A

Certificate Redundancy Check: An error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.

43
Q

CRL

A

Certificate Revocation List: A list of digital certificates that have been revoked by the issuing certificate authority before their scheduled expiration date and should no longer be trusted.

44
Q

CSO

A

Chief Security Officer: A company executive responsible for the security of personnel, physical assets, and information in both physical and digital form.

45
Q
A