Acronyms (Page 2) - Reverse Flashcards
A policy that sets out the rules and guidelines for the proper use of an organization’s information technology.
AUP
Acceptable Use Policy
Software designed to detect and destroy computer viruses.
AV
Antivirus
A Unix shell and command language.
BASH
Bourne Again Shell
The process involved in creating a system of prevention and recovery from potential threats to a company.
BCP
Business Continuity Planning
The protocol used to route information across the internet.
BGP
Border Gateway Protocol
A process that identifies and evaluates the potential effects of natural and man-made events on business operations.
BIA
Business Impact Analysis
Firmware used to perform hardware initialization during the booting process and to provide runtime services for operating systems and programs.
BIOS
Basic Input/Output System
A contract between parties who have agreed to share resources to undertake a specific, mutually beneficial project.
BPA
Business Partners Agreement
A type of network message that is transmitted by a local area network (LAN) bridge.
BPDU
Bridge Protocol Data Unit
A policy that allows employees to bring personally owned devices to their workplace and use those devices to access company information and applications.
BYOD
Bring Your Own Device
An entity that issues digital certificates for use by other parties.
CA
Certificate Authority
A type of challenge-response test used in computing to determine whether the user is human.
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
A report that outlines the corrective actions necessary to rectify a detected non-conformance.
CAR
Corrective Action Report
On-premises or cloud-based security policy enforcement points placed between cloud service consumers and cloud service providers.
CASB
Cloud Access Security Broker
A mode of operation for a block cipher that provides confidentiality but not message integrity.
CBC
Cipher Block Chaining