Acronyms Flashcards
802.1x
A port-based authentication protocol. Wireless can use 802. lx. For example, WPA2
Enterprise mode uses an 802.lx server (implemented as a RADIUS server).
3DES
Triple Digital Encryption Standard. A symmetric algorithm used to encrypt data and provide
confidentiality. It is a block cipher that encrypts data in 64-bit blocks
AAA
Authentication, Authorization, and Accounting. AAA protocols are used in remote access
systems.
ACL
Access control list. Routers and packet-filtering firewalls perform basic filtering using an
ACL to control traffic based on networks, subnets, IP addresses, ports, and some protocols.
AES
Advanced Encryption Standard. A symmetric algorithm used to encrypt data and provide
confidentiality. AES is a block cipher and it encrypts data in 128-bit blocks.
ALE
Annual ( or annualized) loss expectancy. The ALE identifies the expected annual loss and is
used to measure risk with ARO and SLE in a quantitative risk assessment.
AP
Access point, short for wireless access point (WAP). APs provide access to a wired network to
wireless clients.
APT
Advanced persistent threat. A group that has both the capability and intent to launch
sophisticated and targeted attacks.
ARO
Annual ( or annualized) rate of occurrence. The ARO identifies how many times a loss is
expected to occur in a year and it is used to measure risk with ALE and SIB in a quantitative risk
assessment.
ARP
Address Resolution Protocol. Resolves 1Pv4 addresses to MAC addresses. ARP poisoning
attacks can redirect traffic through an attacker’s system by sending false MAC address updates.
AUP
Acceptable use policy. An AUP defines proper system usage. It will often describe the
purpose of computer systems and networks, how users can access them, and the responsibilities of
users when accessing the systems.
BCP
Business continuity plan. A plan that helps an organization predict and plan for potential
outages of critical services or functions. It includes disaster recovery elements that provide the steps
used to return critical functions to operation after an outage.
BIA
Business impact analysis. The BIA identifies systems and components that are essential to the
organization’s success. It identifies various scenarios that can impact these systems and components,
maximum downtime limits, and potential losses from an incident.
BPA
Business partners agreement. A written agreement that details the relationship between
business partners, including their obligations toward the partnership.
BYOD
Bring your own device. A policy allowing employees to connect personally owned devices,
such as tablets and smartphones, to a company network
CA
Certificate Authority. An organization that manages, issues, and signs certificates and is part of
a PK.I.
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart.
Technique used to prevent automated tools from interacting with a web site.
CCMP
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol. An
encryption protocol based on AES and used with WPA2 for wireless security.
CCTV
Closed-circuit television This is a detective control that provides video surveillance.
Video surveillance provides reliable proof of a person’s location and activity.
CERT
Computer Emergency Response Team A group of experts who respond to security incidents.
CHAP
Challenge Handshake Authentication Protocol. Authentication mechanism where a server
challenges a client.
CIRT
Computer Incident Response Team A group of experts who respond to security incidents.
COOP
Continuity of operations planning. Continuity of operations planning (COOP) sites provide
an alternate location for operations after a critical outage.
CRL
Certification revocation list. A list of certificates that a CA has revoked.
CSR
Certificate signing request. A method of requesting a certificate from a CA.
CVE
Common Vulnerabilities and Exposures (CVE). A dictionary of publicly known security
vulnerabilities and exposures.
DAC
Discretionary access control. An access control model where all objects have owners and
owners can modify permissions for the objects (files and folders).
DDOS
Distributed denial-of-service. An attack on a system launched from multiple sources
intended to make a computer’s resources or services unavailable to users.
DEP
Data Execution Prevention A security feature in some operating systems. It helps prevent an
application or service from executing code from a nonexecutable memory region
DES
Digital Encryption Standard. An older symmetric encryption standard used to provide
confidentiality. DES is a block cipher and it encrypts data in 64-bit blocks.
DHCP
Dynamic Host Configuration Protocol. A service used to dynamically assign TCP/IP
configuration information to clients.
DHE
Diffie-Hellman Ephemeral. An alternative to traditional Diffie-Hellman. Instead of using
static keys that stay the same over a long period, DHE uses ephemeral keys, which change for each
new session. Sometimes listed as EDH.
DLP
Data loss prevention A network-based DLP system can examine and analyze network traffic.
DMZ
Demilitarized zone. A buffer zone between the Internet and an internal network It allows
access to services while segmenting access to the internal network