Acronyms Flashcards

1
Q

AAA

A

Authentication, Authorization and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List, a list of permissions that defines who can access a system resource and what operations they can perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard, a cryptographic algorithm that encrypts and decrypts electronic data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ALE

A

Annualized Loss Expectancy, a metric used in cybersecurity to estimate the potential financial impact of a security threat over a year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AP

A

Access Point, refers to the security measures implemented on a wireless access point (AP) to protect a network from unauthorized access by preventing malicious users from connecting to a network through the wireless signal it broadcasts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

API

A

Application Protocol Interface, a software intermediary that allows applications to communicate with each other by exchanging information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

APT

A

Advanced Persistent Threat, a cyberattack that involves a stealthy intruder gaining unauthorized access to a computer network and remaining undetected for an extended period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ARO

A

Annualized Rate of Occurrence, the estimated probability of a specific cyber threat or risk happening within a given year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ARP

A

Address Resolution Protocol, a communication protocol that maps IP addresses to MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ASLR

A

Address Space Layout Randomization (ASLR), a security technique that protects operating systems from memory corruption vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BASH

A

Bourne Again Shell, a command-line interface primarily used on Linux and macOS systems, which is widely utilized by security professionals to automate tasks, analyze system logs, and perform various security operations due to its powerful scripting capabilities; essentially, it’s a critical tool for interacting with a system on a deeper level for security purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BCP

A

Business Continuity Planning, it helps to minimize the impact of a cyber attack on the organization’s operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BGP

A

Border Gateway Protocol, is the primary protocol for exchanging routing information on the internet, but it was not built with the security needed for today’s digital ecosystem. BGP has several vulnerabilities that can be exploited by malicious actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BIA

A

Business Impact Analysis, a structured process that helps businesses anticipate the consequences of disruptions to their operations and develop recovery strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BIOS

A

Basic Input/Output System, a program that runs on a computer’s motherboard to initialize hardware and load the operating system when the computer starts.

17
Q

BPA

A

Business Partners Agreement, is defined as the automation of complex business processes and functions beyond conventional data manipulation and record-keeping activities, usually through the use of advanced technologies.

18
Q

BYOD

A

Bring Your Own Device

19
Q

CA

A

Certificate Authority, an entity that issues, stores, and signs digital certificates to validate the identity of users, computers, and organizations.

20
Q

CAPTCHA

A

Completely Automated Public Turing Test to Tell Computers and Humans Apart. It’s a security measure that helps protect websites from spam and password decryption by verifying that a user is human.

21
Q

CAR

A

Corrective Action Report, is the protection of a vehicle’s electronic systems, software, data, and users from cyberattacks.

22
Q

CBC

A

Cipher Block Chaining, is a cryptographic method for encrypting and decrypting data that involves combining the plaintext of each block with the ciphertext of the previous block.

23
Q

COPE

A

Corporate Owned, Personally Enabled