Acronyms A-E Flashcards

1
Q

AAA

A

Authentication, Authorization, and Accounting

A security framework that ensures only authorized individuals are able to access resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ABAC

A

Attribute Based Access Control

Evaluates attributes to determine the access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL

A

Access Control List

A list of rules that specifies which users or systems are granted or denied access to a particular object or system resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Advanced Encryption Standard

A specification for the encryption of electronic data established by NIST in 2001, much stronger than DES and triple DES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AIS

A

Automated Indicator Sharing

A service provided by CISA that enables real-time exchange of cyber threat indicators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APT

A

Advanced Persistent Threat

A type of cyber attack where an unauthorized user gains access to a system and remains undetected for an extended period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ARP

A

Address Resolution Protocol

A protocol used to map an IP address to a physical MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ASLR

A

Address Space Layout Randomization

A technique used to prevent attackers from exploiting vulnerabilities by randomizing key data areas in memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BCP

A

Business Continuity Planning

A strategy for ensuring an organization’s ability to prevent or recover from significant disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BDPU Guard?

A

Bridge Protocol Data Units Guard

A feature that defends the layer 2 STP topology against BDPU-related threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BIA

A

Business Impact Analysis

Identifies the operational and financial impacts resulting from the disruption of business functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BIOS

A

Basic Input/Output System

Software stored on a memory chip that instructs the computer on basic functions like booting and hardware configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BLOB

A

Binary Large Object Storage

Used by cloud providers as a database for large amounts of text or binary data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BPA

A

Business Partnership Agreement

Agreement between two companies outlining contributions, responsibilities, and profit sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BYOD

A

Bring Your Own Device

A policy that allows employees to use personal devices to access company resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CA

A

Certificate Authority

A trusted entity that issues digital certificates to verify identities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CAC

A

Common Access Card

A smart card used as standard identification for Active Duty United States Defense personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CASB.

A

Cloud Access Security Broker

Software/hardware that enforces security policies between users and cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CAPTCHA

A

Completely Automated Public Turing test to tell Computers and Humans Apart

A challenge-response test used to distinguish between human and automated users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CBC

A

Cipher Block Chaining

A mode of operation for a block cipher where a sequence of bits are encrypted as a single unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CER

A

Certificate

Security files provided by a Certificate Authority to help verify the authenticity of a website.

22
Q

CHAP

A

Challenge Handshake Authentication Protocol

A challenge-response identity authentication protocol that does not expose a password.

23
Q

CIA

A

Confidentiality, Integrity, and Availability

Known collectively as the CIA triad.

24
Q

CIRT

A

Computer Incident Response Team

A team responsible for responding to and mitigating cyber security incidents.

25
Q

COPE

A

Corporate-Owned, Personally-Enabled

A policy allowing employees to use company-owned devices for personal use.

26
Q

CRC

A

Cyclic Redundancy Check

A mathematical algorithm used to detect errors in data transmission.

27
Q

CRL

A

Certificate Revocation List

The first phase of checking if a certificate is valid.

28
Q

CSA

A

Cloud Security Alliance

A non-profit organization that provides resources to help Cloud Security Providers.

29
Q

CSRF

A

Cross-Site Request Forgery

A web security vulnerability that allows an attacker to induce users to perform unintended actions.

30
Q

CSO

A

Chief Security Officer

A senior-level executive responsible for overseeing an organization’s security program.

31
Q

CSP

A

Cloud Service Provider

A third-party company that provides scalable computing resources over a network.

32
Q

CSR

A

Certificate Signing Request

A request made by a user or device to a certificate authority for a digital certificate.

33
Q

CSV

A

Comma Separated Values

A file format used to store data in a table-like format.

34
Q

CVE

A

Common Vulnerabilities and Exposure

A list of vulnerabilities created by MITRE.

35
Q

CVSS

A

Common Vulnerabilities Scoring System

A ranking of vulnerabilities and their severity.

36
Q

CYOD

A

Choose Your Own Device

A policy where the company has a set of devices for employees to choose for work.

37
Q

DAC

A

Discretionary Access Control

Restricting access to objects based on the identity of the subject.

38
Q

DDoS

A

Distributed Denial of Service

A cyber attack using multiple systems to flood a target server with traffic.

39
Q

DES

A

Data Encryption Standard

A symmetric-key block cipher that is now considered insecure.

40
Q

DHCP

A

Dynamic Host Configuration Protocol

A protocol used to automatically assign IP addresses and other network settings.

41
Q

DMZ

A

Demilitarized Zone

A network segment isolated from the internal network for public-facing services.

42
Q

DNS

A

Domain Name System

A system that translates domain names into IP addresses.

43
Q

DoS

A

Denial of Service

A cyber attack that overwhelms a server with traffic, causing unavailability.

44
Q

DPO

A

Data Protection Officer

Ensures that the organization is protecting personal data according to legislation.

45
Q

DRP

A

Disaster Recovery Plan

Preparing for any type of disaster that could occur.

46
Q

EAP

A

Extensible Authentication Protocol

An architectural framework providing extensibility for authentication methods.

47
Q

EFS

A

Encrypting File System

A feature in Windows allowing files and folders to be encrypted using a user’s public key.

48
Q

EMI

A

Electromagnetic Interference

Interference caused by electromagnetic waves that disrupt electronic devices.

49
Q

EMP

A

Electromagnetic Pulse

A burst of electromagnetic radiation that can damage electronic devices.

50
Q

ESP

A

Encapsulating Security Payload

A protocol in IPSec responsible for the CIA triad of security.

51
Q

ALE

A

Annualized Loss Expectancy - a metric used to estimate the potential financial loss an organization could experience from a specific cyber security threat over a year

52
Q

ARO

A

Annual Rate of Occurrence - the estimated frequency or likelihood of a specific security incident happening within a given year