Acronyms A-E Flashcards
AAA
Authentication, Authorization, and Accounting
A security framework that ensures only authorized individuals are able to access resources.
ABAC
Attribute Based Access Control
Evaluates attributes to determine the access.
ACL
Access Control List
A list of rules that specifies which users or systems are granted or denied access to a particular object or system resource.
AES
Advanced Encryption Standard
A specification for the encryption of electronic data established by NIST in 2001, much stronger than DES and triple DES.
AIS
Automated Indicator Sharing
A service provided by CISA that enables real-time exchange of cyber threat indicators.
APT
Advanced Persistent Threat
A type of cyber attack where an unauthorized user gains access to a system and remains undetected for an extended period.
ARP
Address Resolution Protocol
A protocol used to map an IP address to a physical MAC address.
ASLR
Address Space Layout Randomization
A technique used to prevent attackers from exploiting vulnerabilities by randomizing key data areas in memory.
BCP
Business Continuity Planning
A strategy for ensuring an organization’s ability to prevent or recover from significant disruptions.
BDPU Guard?
Bridge Protocol Data Units Guard
A feature that defends the layer 2 STP topology against BDPU-related threats.
BIA
Business Impact Analysis
Identifies the operational and financial impacts resulting from the disruption of business functions.
BIOS
Basic Input/Output System
Software stored on a memory chip that instructs the computer on basic functions like booting and hardware configuration.
BLOB
Binary Large Object Storage
Used by cloud providers as a database for large amounts of text or binary data.
BPA
Business Partnership Agreement
Agreement between two companies outlining contributions, responsibilities, and profit sharing.
BYOD
Bring Your Own Device
A policy that allows employees to use personal devices to access company resources.
CA
Certificate Authority
A trusted entity that issues digital certificates to verify identities.
CAC
Common Access Card
A smart card used as standard identification for Active Duty United States Defense personnel.
CASB.
Cloud Access Security Broker
Software/hardware that enforces security policies between users and cloud services.
CAPTCHA
Completely Automated Public Turing test to tell Computers and Humans Apart
A challenge-response test used to distinguish between human and automated users.
CBC
Cipher Block Chaining
A mode of operation for a block cipher where a sequence of bits are encrypted as a single unit.
CER
Certificate
Security files provided by a Certificate Authority to help verify the authenticity of a website.
CHAP
Challenge Handshake Authentication Protocol
A challenge-response identity authentication protocol that does not expose a password.
CIA
Confidentiality, Integrity, and Availability
Known collectively as the CIA triad.
CIRT
Computer Incident Response Team
A team responsible for responding to and mitigating cyber security incidents.
COPE
Corporate-Owned, Personally-Enabled
A policy allowing employees to use company-owned devices for personal use.
CRC
Cyclic Redundancy Check
A mathematical algorithm used to detect errors in data transmission.
CRL
Certificate Revocation List
The first phase of checking if a certificate is valid.
CSA
Cloud Security Alliance
A non-profit organization that provides resources to help Cloud Security Providers.
CSRF
Cross-Site Request Forgery
A web security vulnerability that allows an attacker to induce users to perform unintended actions.
CSO
Chief Security Officer
A senior-level executive responsible for overseeing an organization’s security program.
CSP
Cloud Service Provider
A third-party company that provides scalable computing resources over a network.
CSR
Certificate Signing Request
A request made by a user or device to a certificate authority for a digital certificate.
CSV
Comma Separated Values
A file format used to store data in a table-like format.
CVE
Common Vulnerabilities and Exposure
A list of vulnerabilities created by MITRE.
CVSS
Common Vulnerabilities Scoring System
A ranking of vulnerabilities and their severity.
CYOD
Choose Your Own Device
A policy where the company has a set of devices for employees to choose for work.
DAC
Discretionary Access Control
Restricting access to objects based on the identity of the subject.
DDoS
Distributed Denial of Service
A cyber attack using multiple systems to flood a target server with traffic.
DES
Data Encryption Standard
A symmetric-key block cipher that is now considered insecure.
DHCP
Dynamic Host Configuration Protocol
A protocol used to automatically assign IP addresses and other network settings.
DMZ
Demilitarized Zone
A network segment isolated from the internal network for public-facing services.
DNS
Domain Name System
A system that translates domain names into IP addresses.
DoS
Denial of Service
A cyber attack that overwhelms a server with traffic, causing unavailability.
DPO
Data Protection Officer
Ensures that the organization is protecting personal data according to legislation.
DRP
Disaster Recovery Plan
Preparing for any type of disaster that could occur.
EAP
Extensible Authentication Protocol
An architectural framework providing extensibility for authentication methods.
EFS
Encrypting File System
A feature in Windows allowing files and folders to be encrypted using a user’s public key.
EMI
Electromagnetic Interference
Interference caused by electromagnetic waves that disrupt electronic devices.
EMP
Electromagnetic Pulse
A burst of electromagnetic radiation that can damage electronic devices.
ESP
Encapsulating Security Payload
A protocol in IPSec responsible for the CIA triad of security.
ALE
Annualized Loss Expectancy - a metric used to estimate the potential financial loss an organization could experience from a specific cyber security threat over a year
ARO
Annual Rate of Occurrence - the estimated frequency or likelihood of a specific security incident happening within a given year