Acronyms "B & C" Flashcards
1
Q
- BASH (Bourne Again Shell)
A
- Powerful UNIX shell and command language
- Used to issue commands that get executed, which can also be turned into shell scripts
- Often used for automation
2
Q
- BCP (Business Continuity Planning)
A
- Plan used to create processes and systems of both prevention and recovery to deal with threats that a company faces
- This plan outlines how a business can continue delivering products and services if crap hits the fan
3
Q
- BIA (Business Impact Analysis)
A
- Used to predict the consequences a business would face if there were to be a disruption
4
Q
- BGP (Border Gateway Protocol)
A
- The postal service of the Internet
- BGP finds the best route for data to travel to reach its destination
5
Q
- BIOS (Basic Input/Output System)
A
- Firmware that performs hardware initialization when systems are booting up, and to provide runtime services for the OS and programs
- First software to run when you power on a device
6
Q
- BPA (Business Partnership Agreement)
A
- Defines a contract between two or more parties as to how a business should run
7
Q
- BYOD (Bring Your Own Device)
A
- When employees use personal devices to connect to their organization’s networks and access work-related systems
8
Q
- CA (Certificate Authority)
A
- An organization that validates the identities of entities through cryptographic keys by issuing digital certificates
- If you check the padlock on this website (next to the domain name), you’ll see that it says “Connection is secure” and then you can click on “Certificate is valid”
9
Q
- CAC (Common Access Card)
A
- Smart card for active-duty personnel
10
Q
- CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
A
- These are the “problems/puzzles” you have to solve from time to time to make sure that you are not a robot
- Typically used for forms to defend against bots
11
Q
- CAR (Corrective Action Report)
A
- Lists defects that need to be rectified
12
Q
- CASB (Cloud Access Security Broker)
A
- Acts as an intermediary between the cloud and on-premises
- Monitors all activity
- Enforces security policies
13
Q
- CBC (Cipher Block Chaining)
A
- a mode of operation for a block cipher – one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block.
- uses what is initialization vector (IV)
14
Q
- CBT (Computer-based Training)
A
computer training
15
Q
- CCMP (Counter-Mode/CBC-Mac Protocol)
A
- Encryption protocol designed for Wireless LAN products
16
Q
- CCTV (Closed-Circuit Television)
A
- a television system in which the video signals are transmitted from one or more cameras by cable to a restricted set of monitors.
17
Q
- CERT (Computer Emergency Response Team)
A
a group of experts who respond to cybersecurity incidents
18
Q
- CHAP (Challenge Handshake Authentication Protocol)
A
- Authenticates a user or network host to an authenticating entity
- Provides protection against replay attacks
- Requires that both the client and server know the plaintext of the secret, but it’s never sent over the network
19
Q
- CIO (Chief Information Officer)
A
- CIO (Chief Information Officer)
20
Q
- CIRT (Computer Incident Response Team)
A
- CIRT (Computer Incident Response Team)
21
Q
- CIS (Center for Internet Security)
A
- CIS (Center for Internet Security)
22
Q
- CMS (Content Management System)
A
- ie: something like WordPress
23
Q
- COOP (Continuity of Operation Planning)
A
a federal initiative to plan to address how critical operations will continue under a broad range of circumstances.
COOP planning fosters recovery and survival in and after emergency situations.
24
Q
- COPE (Corporate Owned Personal Enabled)
A
- Organization provides its employees with mobile computing devices
25
Q
- CP (Contingency Planning)
A
- CP (Contingency Planning)
26
Q
- CRC (Cyclical Redundancy Check)
A
- Used to detect accidental changes in digital networks and storage devices
27
Q
- CRL (Certificate Revocation List)
A
- List of digital certificates that have been revoked by the issuing certificate authority (CA)
28
Q
- CSO (Chief Security Officer)
A
- CSO (Chief Security Officer)
29
Q
- CSP (Cloud Service Provider)
A
Entity that provides infrastructure for cloud services. AWS, GCP, Azure
30
Q
- CSR (Certificate Signing Request)
A
- Contains information that the Certificate Authority (CA) will use to create your certificate
- Contains the public key for which the certificate should be issued, and other identifying information
31
Q
- CSRF (Cross-Site Request Forgery)
A
- Unauthorized actions are performed on behalf of a legitimate user
32
Q
- CSU (Channel Service Unit)
A
- a digital communication device that is used to connect a digital line to a digital device.
- can be used to link local area networks (LANs) into a wide area network (WAN) using telecommunications carrier services
33
Q
- CTM (Counter-Mode)
A
- Converts a block cipher into a stream cipher
- Combines an IV with a counter and uses the result to encrypt each plaintext block
34
Q
- CTO (Chief Technology Officer)
A
- CTO (Chief Technology Officer)
35
Q
- CVE (Common Vulnerabilities and Exposures)
A
- CVE (Common Vulnerabilities and Exposures)
- Common cyber security threats and how they occur
36
Q
- CVSS (Common Vulnerability Scoring System)
A
- CVSS (Common Vulnerability Scoring System)
- The threat level scoring system for CVE’s
37
Q
- CYOD (Choose Your Own Device)
A
- Employee can choose a company-assigned device from a limited number of options