Acronyms "B & C" Flashcards

1
Q
  • BASH (Bourne Again Shell)
A
  • Powerful UNIX shell and command language
    • Used to issue commands that get executed, which can also be turned into shell scripts
    • Often used for automation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • BCP (Business Continuity Planning)
A
  • Plan used to create processes and systems of both prevention and recovery to deal with threats that a company faces
    • This plan outlines how a business can continue delivering products and services if crap hits the fan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • BIA (Business Impact Analysis)
A
  • Used to predict the consequences a business would face if there were to be a disruption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • BGP (Border Gateway Protocol)
A
  • The postal service of the Internet

- BGP finds the best route for data to travel to reach its destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • BIOS (Basic Input/Output System)
A
  • Firmware that performs hardware initialization when systems are booting up, and to provide runtime services for the OS and programs
    • First software to run when you power on a device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • BPA (Business Partnership Agreement)
A
  • Defines a contract between two or more parties as to how a business should run
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • BYOD (Bring Your Own Device)
A
  • When employees use personal devices to connect to their organization’s networks and access work-related systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • CA (Certificate Authority)
A
  • An organization that validates the identities of entities through cryptographic keys by issuing digital certificates
    • If you check the padlock on this website (next to the domain name), you’ll see that it says “Connection is secure” and then you can click on “Certificate is valid”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • CAC (Common Access Card)
A
  • Smart card for active-duty personnel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
A
  • These are the “problems/puzzles” you have to solve from time to time to make sure that you are not a robot
    • Typically used for forms to defend against bots
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • CAR (Corrective Action Report)
A
  • Lists defects that need to be rectified
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • CASB (Cloud Access Security Broker)
A
  • Acts as an intermediary between the cloud and on-premises
    • Monitors all activity
    • Enforces security policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • CBC (Cipher Block Chaining)
A
  • a mode of operation for a block cipher – one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block.
  • uses what is initialization vector (IV)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • CBT (Computer-based Training)
A

computer training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • CCMP (Counter-Mode/CBC-Mac Protocol)
A
  • Encryption protocol designed for Wireless LAN products
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • CCTV (Closed-Circuit Television)
A
  • a television system in which the video signals are transmitted from one or more cameras by cable to a restricted set of monitors.
17
Q
  • CERT (Computer Emergency Response Team)
A

a group of experts who respond to cybersecurity incidents

18
Q
  • CHAP (Challenge Handshake Authentication Protocol)
A
  • Authenticates a user or network host to an authenticating entity
    • Provides protection against replay attacks
    • Requires that both the client and server know the plaintext of the secret, but it’s never sent over the network
19
Q
  • CIO (Chief Information Officer)
A
  • CIO (Chief Information Officer)
20
Q
  • CIRT (Computer Incident Response Team)
A
  • CIRT (Computer Incident Response Team)
21
Q
  • CIS (Center for Internet Security)
A
  • CIS (Center for Internet Security)
22
Q
  • CMS (Content Management System)
A
  • ie: something like WordPress
23
Q
  • COOP (Continuity of Operation Planning)
A

a federal initiative to plan to address how critical operations will continue under a broad range of circumstances.
COOP planning fosters recovery and survival in and after emergency situations.

24
Q
  • COPE (Corporate Owned Personal Enabled)
A
  • Organization provides its employees with mobile computing devices
25
Q
  • CP (Contingency Planning)
A
  • CP (Contingency Planning)
26
Q
  • CRC (Cyclical Redundancy Check)
A
  • Used to detect accidental changes in digital networks and storage devices
27
Q
  • CRL (Certificate Revocation List)
A
  • List of digital certificates that have been revoked by the issuing certificate authority (CA)
28
Q
  • CSO (Chief Security Officer)
A
  • CSO (Chief Security Officer)
29
Q
  • CSP (Cloud Service Provider)
A

Entity that provides infrastructure for cloud services. AWS, GCP, Azure

30
Q
  • CSR (Certificate Signing Request)
A
  • Contains information that the Certificate Authority (CA) will use to create your certificate
    • Contains the public key for which the certificate should be issued, and other identifying information
31
Q
  • CSRF (Cross-Site Request Forgery)
A
  • Unauthorized actions are performed on behalf of a legitimate user
32
Q
  • CSU (Channel Service Unit)
A
  • a digital communication device that is used to connect a digital line to a digital device.
  • can be used to link local area networks (LANs) into a wide area network (WAN) using telecommunications carrier services
33
Q
  • CTM (Counter-Mode)
A
  • Converts a block cipher into a stream cipher

- Combines an IV with a counter and uses the result to encrypt each plaintext block

34
Q
  • CTO (Chief Technology Officer)
A
  • CTO (Chief Technology Officer)
35
Q
  • CVE (Common Vulnerabilities and Exposures)
A
  • CVE (Common Vulnerabilities and Exposures)

- Common cyber security threats and how they occur

36
Q
  • CVSS (Common Vulnerability Scoring System)
A
  • CVSS (Common Vulnerability Scoring System)

- The threat level scoring system for CVE’s

37
Q
  • CYOD (Choose Your Own Device)
A
  • Employee can choose a company-assigned device from a limited number of options