Day 3 Flashcards
Commonly used by routers and has several derivatives in use by Microsoft for authentication.
CHAP
Challenge Handshake Authentication Protocol
The most senior official in an organization responsible for the information technology and systems that support enterprise.
CIO
Chief Information Officer
A group that investigates and resolves IT security problems.
CIRT
Computer Incident Response Team
Its mission is to identify develop, promote, and lead the world with regard to best practices for cybersecurity solutions.
CIS
Center for Internet Security
An organizational process designed to facilitate making changes to organizational resources in such a way that they are identifiable, auditable, and orderly.
CMP
Change Management Policy
These are applications that facilitate the creation, editing, publishing and archival of web pages and content.
CMS
Content Management System
An identifying name that may be applied to a directory resource, such as a user, server, or other object.
CN
Common Name
Ensuring that vital and primary mission essential functions continue to run, even in the face of emergencies.
COOP
Continuity of Operations Plan
Smart phones owned by the organization, but approved for personal use.
COPE
Corporate Owned, Personally Enabled
Procedures to follow in the event of a catastrophic incident, even though it may be unlikely.
CP
Contingency Planning
An error checking code, used in digital technology primarily to identify accidental changes to data.
CRC
Cyclical Redundancy Check
A class of malware that automates malicious activity.
Crimeware
Cyber theft
This is maintained by a certificate authority to identify certificates associated with compromised or lost private keys.
CRL
Certificate Revocation List
This official is responsible for development, oversight, mitigation and other risk strategies.
CSO
Chief Security Officer
An organization that provides Iaas, PaaS or Iaas to an array of customers.
CSP
Cloud Service Provider
A nonprofit organization that promotes best practices in security for cloud-based computing.
CSA
Cloud Security Alliance
Information technology personnel whose purpose is to prevent, manage and coordinate actions about security incidents.
CSIRT
Computer Security Incident Response Team
An executive position in charge of policy and programs to reduce risk in an organization.
CSO
Chief Security Officer
An organization that provides cloud-based access to infrastructure, storage and/or applications.
CSP
Cloud Service Provider
Created by an applicant seeking to gain a certificate from an authority.
CSR
Certificate Signing Request
An attack wherein a message is spoofed from a user to a trusted site.
CSRF
Cross-site Request Forgery
A connecting device used to link an organization to telco-based T-services
CSU
Channel Service Unit
The executive person tasked with identifying useful technology, IT strategies and partnerships.
CTO
Chief Technology Officer
Legacy management.
CTOS
Centralized terminal operating system.
This form of encryption is used by AES to perform streaming encryption.
CTR
Counter
A database of known and published software flaws that may impact security that is managed by MITRE.
CVE
Common Vulnerabilities and Exposures