Day 3 Reversed Flashcards
CHAP
Challenge Handshake Authentication Protocol
Commonly used by routers and has several derivatives in use by Microsoft for authentication.
CIO
Chief Information Officer
The most senior official in an organization responsible for the information technology and systems that support enterprise.
CIRT
Computer Incident Response Team
A group that investigates and resolves IT security problems.
CIS
Center for Internet Security
Its mission is to identify develop, promote, and lead the world with regard to best practices for cybersecurity solutions.
CMP
Change Management Policy
An organizational process designed to facilitate making changes to organizational resources in such a way that they are identifiable, auditable, and orderly.
CMS
Content Management System
These are applications that facilitate the creation, editing, publishing and archival of web pages and content.
CN
Common Name
An identifying name that may be applied to a directory resource, such as a user, server, or other object.
COOP
Continuity of Operations Plan
Ensuring that vital and primary mission essential functions continue to run, even in the face of emergencies.
COPE
Corporate Owned, Personally Enabled
Smart phones owned by the organization, but approved for personal use.
CP
Contingency Planning
Procedures to follow in the event of a catastrophic incident, even though it may be unlikely.
CRC
Cyclical Redundancy Check
An error checking code, used in digital technology primarily to identify accidental changes to data.
Crimeware
Cyber Theft
A class of malware that automates malicious activity.
CRL
Certificate Revocation List
This is maintained by a certificate authority to identify certificates associated with compromised or lost private keys.
CSO
Chief Security Officer
This official is responsible for development, oversight, mitigation and other risk strategies.
CSP
Cloud Service Provider
An organization that provides Iaas, PaaS or Iaas to an array of customers.
CSA
Cloud Security Alliance
A nonprofit organization that promotes best practices in security for cloud-based computing.
CSIRT
Computer Security Incident Response Team
Information technology personnel whose purpose is to prevent, manage and coordinate actions about security incidents.
CSO
Chief Security Officer
An executive position in charge of policy and programs to reduce risk in an organization.
CSP
Cloud Service Provider
An organization that provides cloud-based access to infrastructure, storage and/or applications.
CSR
Certificate Signing Request
Created by an applicant seeking to gain a certificate from an authority.
CSRF
Cross-Site Request Forgery
An attack wherein a message is spoofed from a user to a trusted site.
CSU
Channel Service Unit
A connecting device used to link an organization to telco-based T-services.
CTO
Chief Technology Officer
The executive person tasked with identifying useful technology, IT strategies and partnerships.
CTOS
Centralized Terminal Operating System
Legacy management.
CTR
Counter
This form of encryption is used by AES to perform streaming encryption.
CVE
Common Vulnerabilities and Exposures
A database of known and published software flaws that may impact security that is managed by MITRE.