Acronyms (Page 4) - Reverse Flashcards
An executive-level position in a company or other entity whose occupant is focused on scientific and technological issues within an organization.
CTO
Chief Technology Officer
A list of publicly disclosed cybersecurity vulnerabilities.
CVE
Common Vulnerability Enumeration
A free and open industry standard for assessing the severity of a computer system security vulnerabilities.
CVSS
Common Vulnerability Scoring System
A corporate policy that permits employees to choose which devices they use for work purposes.
CYOD
Choose Your Own Device
A type of access control defined by the Access Control List (ACL) where access rights are assigned to users by the system (or system’s administrators).
DAC
Discretionary Access Control
A person who uses specialized software to store and organize data.
DBA
Database Administrator
A type of cyber-attack where multiple compromised computer systems attach a target, such as a server, website, or other network resource, and cause a denial of service for users of the targeted resource.
DDoS
Distributed Denial of Service
A security feature that can help prevent damage to your computer from viruses and other security threats.
DEP
Data Execution Prevention
A previously dominant algorithm for the encryption of electronic data.
DES
Digital Encryption Standard
A network management protocol used on IP networks whereby a server dynamically assigns an IP address and other network configuration parameters to each device on a network.
DHCP
Dynamic Host Configuration Protocol
A method of securely exchanging cryptographic keys over a public channel.
DHE
Diffie-Hellman Ephemeral
An email authentication method designed to detect forged sender addresses in emails.
DKIM
DomainKeys Identified Mail
A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
DLP
Data Loss Prevention
A feature of Windows and other operating systems that allows multiple software programs to share the same functionality.
DLL
Dynamic Link Library
An email authentication protocol designed to give email domain owners the ability to protect their domain from unauthorized use, commonly known as email spoofing.
DMARC
Domain Message Authentication Reporting and Conformance