Day 3 Flashcards
Commonly used by routers and has several derivatives in use by Microsoft for authentication.
CHAP
Challenge Handshake Authentication Protocol
The most senior official in an organization responsible for the information technology and systems that support enterprise.
CIO
Chief Information Officer
A group that investigates and resolves IT security problems.
CIRT
Computer Incident Response Team
Its mission is to identify develop, promote, and lead the world with regard to best practices for cybersecurity solutions.
CIS
Center for Internet Security
An organizational process designed to facilitate making changes to organizational resources in such a way that they are identifiable, auditable, and orderly.
CMP
Change Management Policy
These are applications that facilitate the creation, editing, publishing and archival of web pages and content.
CMS
Content Management System
An identifying name that may be applied to a directory resource, such as a user, server, or other object.
CN
Common Name
Ensuring that vital and primary mission essential functions continue to run, even in the face of emergencies.
COOP
Continuity of Operations Plan
Smart phones owned by the organization, but approved for personal use.
COPE
Corporate Owned, Personally Enabled
Procedures to follow in the event of a catastrophic incident, even though it may be unlikely.
CP
Contingency Planning
An error checking code, used in digital technology primarily to identify accidental changes to data.
CRC
Cyclical Redundancy Check
A class of malware that automates malicious activity.
Crimeware
Cyber theft
This is maintained by a certificate authority to identify certificates associated with compromised or lost private keys.
CRL
Certificate Revocation List
This official is responsible for development, oversight, mitigation and other risk strategies.
CSO
Chief Security Officer
An organization that provides Iaas, PaaS or Iaas to an array of customers.
CSP
Cloud Service Provider