Acronyms Flashcards
AAA
Authentication, Authorization and Accounting
ACL
Access Control List, a list of permissions that defines who can access a system resource and what operations they can perform
AES
Advanced Encryption Standard, a cryptographic algorithm that encrypts and decrypts electronic data
ALE
Annualized Loss Expectancy, a metric used in cybersecurity to estimate the potential financial impact of a security threat over a year.
AP
Access Point, refers to the security measures implemented on a wireless access point (AP) to protect a network from unauthorized access by preventing malicious users from connecting to a network through the wireless signal it broadcasts.
API
Application Protocol Interface, a software intermediary that allows applications to communicate with each other by exchanging information.
APT
Advanced Persistent Threat, a cyberattack that involves a stealthy intruder gaining unauthorized access to a computer network and remaining undetected for an extended period.
ARO
Annualized Rate of Occurrence, the estimated probability of a specific cyber threat or risk happening within a given year.
ARP
Address Resolution Protocol, a communication protocol that maps IP addresses to MAC addresses.
ASLR
Address Space Layout Randomization (ASLR), a security technique that protects operating systems from memory corruption vulnerabilities.
AV
Antivirus
BASH
Bourne Again Shell, a command-line interface primarily used on Linux and macOS systems, which is widely utilized by security professionals to automate tasks, analyze system logs, and perform various security operations due to its powerful scripting capabilities; essentially, it’s a critical tool for interacting with a system on a deeper level for security purposes.
BCP
Business Continuity Planning, it helps to minimize the impact of a cyber attack on the organization’s operations.
BGP
Border Gateway Protocol, is the primary protocol for exchanging routing information on the internet, but it was not built with the security needed for today’s digital ecosystem. BGP has several vulnerabilities that can be exploited by malicious actors.
BIA
Business Impact Analysis, a structured process that helps businesses anticipate the consequences of disruptions to their operations and develop recovery strategies.
BIOS
Basic Input/Output System, a program that runs on a computer’s motherboard to initialize hardware and load the operating system when the computer starts.
BPA
Business Partners Agreement, is defined as the automation of complex business processes and functions beyond conventional data manipulation and record-keeping activities, usually through the use of advanced technologies.
BYOD
Bring Your Own Device
CA
Certificate Authority, an entity that issues, stores, and signs digital certificates to validate the identity of users, computers, and organizations.
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart. It’s a security measure that helps protect websites from spam and password decryption by verifying that a user is human.
CAR
Corrective Action Report, is the protection of a vehicle’s electronic systems, software, data, and users from cyberattacks.
CBC
Cipher Block Chaining, is a cryptographic method for encrypting and decrypting data that involves combining the plaintext of each block with the ciphertext of the previous block.
COPE
Corporate Owned, Personally Enabled