Acronyms Flashcards
BCP
Business Continuity Plan
CCTV
Closed Circuit Television
CBK
Common Body of Knowledge
CIA
Confidentiality, Integrity, Availability
CIRT
Computer Incident Response Team
CSIRT
Computer Security Incident Response Team
DoS
Denial of Service
CISO
Chief Information Security Officer
CRO
Chief Risk Officer
DPD
Data Protection Directive
ISO
International Standard Organization
CISSP
Certified Information System Security Professional
EU
European Union
ICT
Information and Communication Technology
PIPEDA
Personal Information Protection and Electronic Documents Act
HIPAA
Health Insurance Portability and Accountability Act
DPD
Data Protection Directive
GLBA
Gramm-Leach-Bliley Act
PCI SSC
Payment Card Industry Security Standards Council
QSA
Qualified Security Assessor
GRC
Governance, Risk Management, and Compliance
FISMA
Federal Information Security Management Act
WIPO
World Intellectual Property Organization
BSA
Business Software Alliance
IDC
International Data Corporation
EULA
End User License Agreement
ITAR
International Traffic In Arms Regulations
EAR
Export Administration Regulations
ECCN
Export Control Classification Number
RFID
Radio Frequency Identification
VOIP
Voice Over Internet Protocol
OECD
Organization for Economic Cooperation and Development
VERIS
Vocabulary for Event Recording and Incident Sharing
VCDB
VERIS Community Database
ECS
Electronic Communication Service
ENISA
European Union Agency for Network and Information Security
DPA
Data Protection Agency
ICO
Information Commissioner’s Office
ECS
Electronic Communications Service
PECR
Privacy and electronic communications regulations
FSGO
Federal Sentencing Guidelines for Organizations Outline.
NYSE
New York Stock Exchange
FDA
Food and Drug Administration
FTC
Federal Trade Commission
ATF
Bureau of Alcohol, Tobacco, Firearms and Explosives
IRS
Internal Revenue Service
DoL
Department of Labor
SPA
Software Publishers Association
BSA
Business Software Alliance
IAB
Internet Activities Board
CEI
Computer Ethics Institute
NCCV
National Conference on Computing and Values
NCERC
National Computer Ethics and Responsibilities Campaign
NCSA
National Computer Security Association
BC
Business Continuity
DR
Disaster Recovery
SPOF
Single Point of Failure
BIA
Business Impact Analysis
NIST
National Institute of Standards and Technology
ISSO
Information Systems Security Officer
DRP
Disaster Recovery Plan
RoR
Rate of Return
ITGI
IT Governance Institute
SDLC
Software Development Life Cycle
MTD
Maximum Tolerable Downtime
RTO
Recovery Time Objective
TCP/IP
Transmission Control Protocol / Internet Protocol
ICMP
Internet Control Message Protocol
IGMP
Internet Group Management Protocol
FTP
File Transfer Protocol
application layer protocol
SNMP
Simple Network Management Protocol (application layer protocol)
SMTP
Simple Mail Transfer Protocol
application layer protocol
TFTP
Trivial File Transfer Protocol
application layer protocol
ASCII
( presentation layer service)
EBCDIC
Extended Binary–Coded Decimal Interchange Mode (presentation layer service)
TIFF
Tagged image file format
presentation layer service
JPEG
(Presentation layer service)
MPEG
Motion pictures experts group
Presentation layer service
MIDI
Musical instrument digital interface
presentation layer service
NFS
Network file system
Session layer protocol
NetBIOS
(Session layer protocol)
SQL
(Session Layer Protocol)
RPC
Remote Procedure Call
session layer protocol
TCP
(Transport layer protocol )
UDP
User Datagram Protocol
Transport layer protocol
SSL
Secure Sockets Layer
transport layer protocol
SPX
Sequenced package exchange
transport layer protocol
MTU
Maximum Transmission Unit
IP
Internet Protocol
Network layer protocol
ICMP
(Network layer protocol)
IGMP
(network layer protocol)
RIP v1 and v2
(Network layer protocol)
OSPF v1 and v2
Open shortest path first
Network layer protocol
MTBF
Mean time between failures
RPO
Recovery point objective
The point in time that the disaster recovery planner will attempt to recover to.
FCRA
Fair credit reporting act
EEOC
Equal employment opportunity commission
NIST
National Institute of standards and technology
COSO
Committee of sponsoring organizations of the Treadway commission
COBIT
Control objectives for information and related technology
ITAF
IT assurance framework
BMIS
Business model for information security
ISACA
Information systems audit and control association
CRAMM
CCTA risk analysis and management method
FRAP
Facilitated risk analysis process
SOMAP
Security officers management and analysis project
VAR
Value at Risk
SLE
Single loss expectancy
Defined as the difference between the original value and the remaining value of an asset after a single exploit.
SLE = Asset value (in $) x Exposure Factor
(Loss due to successful threat exploit, as a percentage)
ARO
Annualized rate of occurrence.
An estimate of how often a threat will be successful and exploiting a vulnerability over the period of a year.
ALE
Annualized loss expectancy
Is a product of the yearly estimate for the exploit and the loss in value of an asset after a single occurrence
ALE = SLE x ARO
LAFE
Local annual frequency estimate
SAFE
Standard annual frequency estimate
NOS
Network Operating System
DNS
Domain Name System
NAT
network address translation
PAT
Port address translation
NAPT
Network address port translation
MTU
Maximum Transmission Unit
BGP
Border Gateway Protocol
OSPF
Open Shortest Path First
IPX
Internetwork Packet Exchange
RIP
Routing Information Protocol
LLC
Logical Link Control
ARP
Address Resolution Protocol
RARP
Reverse Address Resolution Protocol
PPP
Point to point protocol
SLIP
Serial Line Internet Protocol
FECN
Forward explicit congestion notification
BECN
Backward explicit congestion Notification
LMI
Local management interface
SDLC
Synchronous data link control
SNA
System network architecture
HDLC
High-level datalink control
NRM
Normal response mode
ARM
Asynchronous response mode
ABM
Asynchronous balanced mode
LAPB
Link access procedure, balanced
ISDN
Integrated services digital network
BRI
Basic rate interface
PRI
Primary rate interface
DSL
Digital subscriber line
ADSL
Asymmetric DSL
RDSL
Rate adaptive DSL
HDSL
Hi rate DSL
IDSL
ISDN DSL
VDSL
Very high data rate DSL
SDSL
Symmetric DSL
CMTS
Cable modem transmission system
AH
Authentication Header
ESP
Encapsulating security payload
IKE
Internet key exchange
3DES
Triple data encryption standard
SA
Security association
MS-CHAP
Microsoft challenge authentication protocol
GRE
Generic routing encapsulation
PPTP
Point-to-point tunneling protocol
PAC
Point to point tunneling protocol access concentrator
SKIP
Simple key management protocol for IP
DES
Data encryption standard
SSL
Secure sockets layer
IETF
Internet engineering task force
TLS
Transport layer security
SET
Secure electronic transaction
MIME
Multipurpose Internet mail extension
PGP
Pretty good privacy