Acronyms (Page 5) - Reverse Flashcards
A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
DoS
Denial of Service
A role within a company or organization responsible for ensuring that the company complies with data protection laws.
DPO
Data Privacy Officer
A structured approach with policies and procedures for responding to an unplanned incident and recovering critical systems.
DRP
Disaster Recovery Plan
A standard for digital signatures.
DSA
Digital Signature Algorithm
A family of technologies that provide internet access by transmitting digital data over the wires of a local telephone network.
DSL
Digital Subscriber Line
An authentication framework frequently used in wireless networks and Point-to-Point connections.
EAP
Extensible Authentication Protocol
An approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.
ECC
Elliptic Curve Cryptography
A mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value.
ECB
Electronic Code Book
A variant of the Diffie-Hellman algorithm that uses elliptic curve cryptography.
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
A cryptographic algorithm used by Bitcoin to ensure that funds can only be spent by their rightful owners.
ECDSA
Elliptic Curve Digital Signature Algorithm
A cybersecurity technology that addresses the need for continuous monitoring and response to advanced threats.
EDR
Endpoint Detection and Response
A feature of some versions of Microsoft Windows that provides filesystem-level encryption.
EFS
Encrypted File System
Business process management software that allows an organization to use a system of integrated applications to manage the business and automate many back office functions.
ERP
Enterprise Resource Planning
A unique identification number embedded by manufacturers on a microchip in wireless phones.
ESN
Electronic Serial Number
A component of IPsec used for providing confidentiality, along with some authentication and integrity, to the data.
ESP
Encapsulated Security Payload
A data structure, most often associated with Microsoft Windows and NTFS, that controls access to files and folders.
FACL
File System Access Control List
Encryption at the hardware level.
FDE
Full Disk Encryption