Day 2 Reversed Flashcards
BIOS
Basic Input/Output System
Firmware based initialization code for booting a system.
The now deprecated initial program sets for computer.
Bluetooth
802.15
Technology commonly used to communicate with small devices at modest speeds over a short range with low security requirements.
BCP
Business Continuity Plan
The orderly planning for and management of threats and incidents to an organization.
BGP
Border Gateway Protocol
Routing protocol for routing exterior traffic between autonomous systems/organizations.
BO
Buffer Overflow
The insertion of malicious computer instructions into the RAM of a host to accomplish denial of service or injecting shellcode.
BPA
Business Partners Agreement
This outlines the goals and responsibilities between entities pursuing a common work product.
BPDU
Bridge Protocol Data Unit
This protocol is used to identify efficient paths and loops in a switched network.
BSSID
Basic Service Set IDentifier
This is the MAC address that a wireless device is attached to.
Brute Force
Brute Force Attack
Discovers a hash or encrypted secret by attempting all combinations and permutations.
BYOD
Bring Your Own Device
The organization compensates the individual for use of their phone in organizational activities.
C2
Command and Control
Servers that are centrally placed the hold control instructions for illicitly managed hosts.
CA
Certificate Authority
This entity issues certificates. After verifying them, and is the center of trust in PKI.
CAC
Common Access Card
A form of identification with photograph, barcode, RFID and cryptographic storage of private key information.
CAPTCHA
Completely Automated Public Turing to Tell Computers and Humans Apart
This is intended to prevent rogue automated attempts at access.
CAR
Corrective Action Report
A document generated when the defect or error has been detected that has the goal of eliminating a reoccurrence.
CASB
Cloud Access Security Broker
A software resource place between users and cloud applications that monitors and enforces policy-based access to cloud resources.
CBC
Cipher Block Chaining
Each plaintext block is XORed (see XOR) with the immediately previous ciphertext block.
CBT
Computer-Based Training
Courseware or lessons that are delivered via a computer, commonly used for at home and corporate training.
CCMP
Counter-Mode/CBC-Mac Protocol
Each plaintext block is XORed (see XOR) with the immediately previous ciphertext block that includes a message authentication code.
CCTV
Closed-Circuit Television
Allows monitoring and recording of activities in an area.
CER
The point at which false acceptances are equal to false rejection.
Cross-Over Error Rate
CER
A generic term for a document that facilitates authentication.
Certificate
CERT
Computer Emergency Response Team
A multi-discipline group designated to handle IT incidents.
CFB
Cipher Feedback
A mode of operation for a block cipher.
Chain Of Custody
Evidence Control and Management
The documentation of handling and protection of evidence.