Acronyms Flashcards
AAA
Authentication, Authorization, and Accounting: A framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
ACL
Access Control List: A table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file.
AES
Advanced Encryption Standard: A symmetric encryption algorithm widely used across the glove to secure data.
AES-256
Advanced Encryption Standards 256-bit: A version of AES using 256-bit key size for encryption, providing a higher level of security.
AH
Authentication Header: A part of the IPsec protocol suite that provides authentication and integrity to the data.
AI
Artificial Intelligence: The simulation of human intelligence processes by machines, especially computer systems.
AIS
Automated Indicator Sharing: A system that allows the exchange of cyber threat indicators between the public and private sectors.
ALE
Annualized Loss Expectancy: A risk management concept to estimate the monetary loss that can be expected for an asset due to a risk over a year.
AP
Access Point: A networking hardware device that allows other Wi-Fi devices to connect to a wired network.
API
Application Programming Interface: A set of functions and procedures allowing the creation of applications that access the features or data on an operating system, application, or other services.
APT
Advanced Persistent Threat: A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.
ARO
Annualized Rate of Occurrence: The expected frequency with which a specific event is likely to occur annually.
ARP
Address Resolution Protocol: A communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.
ASLR
Address Space Layout Randomization: A computer security technique involved in preventing exploitation of memory corruption vulnerabilities.
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge: A knowledge base maintained by MITRE for listing and explaining cyber adversary behavior.
AUP
Acceptable Use Policy: A policy that sets out the rules and guidelines for the proper use of an organization’s information technology.
AV
Antivirus: Software designed to detect and destroy computer viruses.
BASH
Bourne Again Shell: A Unix shell and command language.
BCP
Business Continuity Planning: The process involved in creating a system of prevention and recovery from potential threats to a company.
BGP
Border Gateway Protocol: The protocol used to route information across the internet.
BIA
Business Impact Analysis: A process that identifies and evaluate the potential effects of natural and man-made events on business operations.
BIOS
Basic Input/Output System: Firmware used to perform hardware initialization during the booting process and to provide runtime services for operating systems and programs.
BPA
Business Partners Agreement: A contract between parties who have agreed to share resources to undertake a specific, mutually beneficial project.
BPDU
Bridge Protocol Data Unit: A type of network message that is transmitted by a local area network (LAN) bridge.
BYOD
Bring Your Own Device: A policy that allows employees to bring personally owned devices to their workplace and use those devices to access company information and applications.
CA
Certificate Authority: An entity that issues digital certificates for use by other parties.
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart: A type of challenge-response test used in computing to determine whether the user in human.
CAR
Corrective Action Report: A report that outlines the corrective actions necessary to rectify a detected non-conformance.
CASB
Cloud Access Security Broker: On-premises or cloud-based security policy enforcement points between cloud service consumers and cloud service providers.
CBC
Cipher Block Chaining: A mode of operation for a block cipher that provides confidentiality but not message integrity.
CCMP
Counter Mode/CBC-MAC Protocol: An encryption protocol used in Wi-Fi networks.
CCTV
Closed-circuit Television: A TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
CERT
Computer Emergency Response Team: An expert group that handles computer security incidents.
CFB
Cipher Feedback: a mode of operation for a block cipher.
CHAP
Challenge Handshake Authentication Protocol: A type of authentication protocol used primarily to authenticate a user or network host to an authenticating entity.
CIA
Confidentiality, Integrity, Availability: A model designed to guide policies for information security within an organization.
CIO
Chief Information Officer: A job title commonly given to the most senior executive in an enterprise responsible for the information technology and computer systems that support enterprise goals.
CIRT
Computer Incident Response Team: A service organization that is contacted when a security breach or other computer-related emergency occurs.
CMS
Content Management System: Software that helps users create, manage, and modify content on a website without the need for specialized technical knowledge.
COOP
Continuity of Operation Planning: A process by government agencies to ensure that critical functions continue during a wide range of emergencies, including localized acts of nature, accidents, and technological or attack-related emergencies.
CP
Contingency Planning: A course of action designed to help an organization respond effectively to a significant future event or situation that may or may not happen.