Day 2 Flashcards
Firmware based initialization code for booting a system.
The now deprecated initial program sets for computer.
BIOS
Basic Input/Output System
Technology commonly used to communicate with small devices at modest speeds over a short range with low security requirements.
Bluetooth
802.15
The orderly planning for and management of threats and incidents to an organization.
BCP
Business Continuity Plan
Routing protocol for routing exterior traffic between autonomous systems/organizations.
BGP
Border Gateway Protocol
The insertion of malicious computer instructions into the RAM of a host to accomplish denial of service or injecting shellcode.
BO
Buffer overflow
This outlines the goals and responsibilities between entities pursuing a common work product.
BPA
Business Partners Agreement
This protocol is used to identify efficient paths and loops in a switched network.
BPDU
Bridge Protocol Data Unit
This is the MAC address that a wireless device is attached to.
BSSID
Basic Service Set IDentifier
Discovers a hash or encrypted secret by attempting all combinations and permutations.
Brute force
Brute force attack
The organization compensates the individual for use of their phone in organizational activities.
BYOD
Bring Your Own Device
Servers that are centrally placed the hold control instructions for illicitly managed hosts.
C2
Command and control
This entity issues certificates. After verifying them, and is the center of trust in PKI.
CA
Certificate Authority
A form of identification with photograph, barcode, RFID and cryptographic storage of private key information.
CAC
Common Access Card
This is intended to prevent rogue automated attempts at access.
CAPTCHA
Completely Automated
Public Turing to Tell
Computers and Humans
Apart
A document generated when the defect or error has been detected that has the goal of eliminating a reoccurrence.
CAR
Corrective Action Report