Acronyms Flashcards

1
Q

3DES

A

Triple Data Encryption Standard

A symmetric-key block cipher that applies the Data Encryption Standard algorithm three times to each data block for increased security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

Core principles in network security and access control, where Authentication verifies users, Authorization determines their permissions, and Accounting tracks their actions for auditing purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based Access Control

A security model where access rights are granted based on attributes associated with the user, resource, and environment, allowing for granular control over access permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

A list of permissions attached to an object that specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. In the context of network security, ACLs are commonly used to control traffic entering or leaving a network based on criteria such as IP addresses, protocols, and ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AD

A

Active Directory

A centralized database that stores and manages network resources, such as user accounts, computers, and devices, in a Windows domain network, facilitating authentication, authorization, and directory services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard

A widely-used symmetric encryption algorithm for securing sensitive data, commonly employed in various security protocols and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES256

A

Advanced Encryption Standards 256bit

Advanced Encryption Standard with a key size of 256 bits, which is a widely used symmetric encryption algorithm offering strong security for protecting sensitive data in various applications and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AH

A

Authentication Header

A protocol used in IPsec (Internet Protocol Security) that provides authentication and integrity protection for IP packets, ensuring data origin authentication and integrity verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AI

A

Artificial Intelligence

The simulation of human intelligence processes by machines, typically computer systems, including learning, problem-solving, and decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AIS

A

Automated Indicator Sharing

A system for exchanging cybersecurity threat indicators and defensive measures between organizations in real-time to enhance collective defense capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ALE

A

Annualized Loss Expectancy

A calculation used to estimate the potential financial loss to a system or organization due to a security breach or incident over the course of a year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AP

A

Access Point

A device that allows wireless devices to connect to a wired network using Wi-Fi technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

API

A

Application Programming Interface

A set of protocols, tools, and definitions that allows different software applications to communicate and interact with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

APT

A

Advanced Persistent Threat

A sophisticated, prolonged cyberattack launched by skilled adversaries with the intention of gaining unauthorized access to a network or system over an extended period while remaining undetected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARO

A

Annualized Rate of Occurence

The estimated frequency at which a specific threat is expected to occur within a year, aiding in risk assessment and mitigation strategies in cybersecurity contexts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP

A

Address Resolution Protocol

A networking protocol used to map IP addresses to MAC addresses within a local network, facilitating communication between devices on the same subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASLR

A

Address Space Layout Randomization

A security technique that randomizes the memory addresses used by system processes, making it harder for attackers to predict the location of specific code or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ASP

A

Active Server Pages

A legacy web technology used to create dynamic web pages by embedding server-side scripts within HTML to generate content dynamically based on user interactions or database queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ATT&CK

A

Adversarial Tactics, Techniques,
and Common Knowledge

A framework used to understand and classify cyber threats and attacks, helping security professionals anticipate, prevent, and respond to various security incidents effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AUP

A

Acceptable Use Policy

A set of rules and guidelines outlining the proper and permitted uses of an organization’s technology resources by its employees or users, typically addressing security concerns and acceptable behaviors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AV

A

Antivirus

Software designed to detect, prevent, and remove malicious software, such as viruses, worms, and Trojan horses, from computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BASH

A

Bourne Again Shell

A command-line interpreter used in Unix-like operating systems, offering enhanced functionality over the original Bourne Shell with features like command-line editing and job control, often utilized in cybersecurity for scripting and automation tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BCP

A

Business Continuity Planning

The development of strategies and procedures to ensure an organization can continue operating during and after a disaster or disruption, aiming to minimize downtime and maintain critical functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BGP

A

Border Gateway Protocol

A standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

BIA

A

Business Impact Analysis

A process used to identify and prioritize potential impacts on business operations to ensure continuity and resilience in the face of disruptions or disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

BIOS

A

Basic Input / Output System

Firmware used to perform hardware initialization during the booting process and provides runtime services for operating systems and programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

BPA

A

Business Partnership Agreement

A formal document outlining terms and conditions between business entities, often concerning collaboration, sharing resources, or joint ventures, relevant to security considerations within the business environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

BPDU

A

Bridge Protocol Data Unit

A message exchanged between switches in a spanning tree network to detect loops and select the best paths, ensuring network efficiency and preventing broadcast storms.

29
Q

BSSID

A

Basic Service Set Identifier

30
Q

BYOD

A

Bring Your Own Device

A policy allowing employees to use personal devices for work purposes, posing security challenges due to potential vulnerabilities and lack of control over these devices within an organizational network.

31
Q

CA

A

Certificate Authority

An entity responsible for issuing digital certificates that verify the identity of individuals, systems, or organizations in a public key infrastructure (PKI) environment.

32
Q

CAPTCHA

A

Completely Automated Public Turing
Test to Tell Computers and Humans Apart

A challenge-response test used to distinguish between humans and automated bots, typically implemented in online forms to prevent automated spam or abuse.

33
Q

CAR

A

Corrective Action Report

A document used to detail corrective measures taken to address security incidents or vulnerabilities identified during security assessments or audits, ensuring mitigation and improvement of security measures.

34
Q

CASB

A

Cloud Access Security Broker

A tool or service that helps organizations ensure security policies are enforced as data and applications move between on-premises environments and the cloud, offering visibility, compliance, and security controls.

35
Q

CBC

A

Cipher Block Chaining

A mode of operation for block ciphers in which each plaintext block is XORed with the previous ciphertext block before encryption, enhancing security through diffusion and preventing identical blocks of plaintext from producing the same ciphertext.

36
Q

CBT

A

Computer-based Training

A method of instruction delivery utilizing computer technology.

37
Q

CCMP

A

Counter-Mode/CBC-MAC Protocol

An encryption protocol used in Wi-Fi networks to provide confidentiality, integrity, and data origin authentication, particularly in the context of the WPA2 security standard.

38
Q

CCTV

A

Closed-Circuit Television

A system of video surveillance that uses cameras to monitor a specific area, typically for security purposes, with the footage being viewed on a limited set of monitors or devices within a closed system.

39
Q

CERT

A

Computer Emergency Response Team

A group responsible for coordinating responses to cybersecurity incidents within an organization or community, ensuring efficient and effective resolution of security threats and vulnerabilities.

40
Q

CFB

A

Cipher Feedback

A mode of operation for block ciphers where the output of the encryption of the previous block is XORed with the plaintext to generate the ciphertext for the current block, commonly used for stream ciphers and providing error propagation.

41
Q

CHAP

A

Challenge-Handshake Authentication Protocol

A network authentication protocol that validates the identity of a user by using a challenge-response mechanism, ensuring secure access to resources.

42
Q

CI/CD

A

Continuous Integration / Continuous Delivery

A software development practice where code changes are automatically integrated and delivered frequently, facilitating rapid and reliable software releases.

43
Q

CIO

A

Chief Information Officer

A senior executive responsible for overseeing the management and strategic implementation of an organization’s information technology infrastructure and policies.

44
Q

CIRT

A

Computer Incident Response Team

A group of experts responsible for managing and responding to cybersecurity incidents within an organization, aiming to minimize damage and restore normal operations swiftly.

45
Q

CIS

A

Center for Internet Security

A nonprofit organization that provides resources and guidance for cybersecurity best practices, often referenced in the context of security standards and benchmarks.

46
Q

CMDB

A

Configuration Management Database

A centralized database that stores information about the hardware and software components within an organization’s IT infrastructure, aiding in configuration management and tracking changes.

47
Q

CMS

A

Content Management System

A software application used to create, manage, and modify digital content, often used for websites, making content editing and publishing easier and more efficient.

48
Q

CN

A

Common Name

Refers to a component of X.509 certificates used to identify the entity associated with a public key, typically found in SSL/TLS certificates for web servers.

49
Q

COOP

A

Continuity of Operations Planning

Refers to the strategic process of ensuring essential functions can continue during and after a disaster, encompassing policies and procedures to maintain critical operations.

50
Q

COPE

A

Corporate-Owned Personally Enabled

Refers to a mobile device management strategy where organizations provide and manage the device while allowing users personal use within predefined parameters, often employed to balance security and user flexibility.

51
Q

CP

A

Contingency Planning

A proactive approach to identifying potential risks and creating strategies to mitigate and manage them effectively in the event of a disruption or disaster.

52
Q

CPU

A

Central Processing Unit

The primary component of a computer responsible for executing instructions and performing calculations, essentially acting as the brain of the system.

53
Q

CRC

A

Cyclic Redundancy Check

A method used to detect errors in data transmission by generating a unique checksum based on the data that can be recalculated at the receiving end to ensure data integrity.

54
Q

CRL

A

Certificate Revocation List

A record of digital certificates that have been revoked by the issuing certificate authority before their scheduled expiration date, typically due to security concerns or compromise.

55
Q

CSA

A

Cloud Security Alliance

A global organization focused on promoting best practices for securing cloud computing environments, providing guidance and resources for cloud security professionals.

56
Q

CSIRT

A

Computer Security Incident Response Team

A designated group responsible for coordinating and responding to cybersecurity incidents within an organization, ensuring effective incident management and mitigation strategies are in place.

57
Q

CSO

A

Chief Security Officer

The executive responsible for overseeing and implementing an organization’s security strategy, policies, and procedures to safeguard its assets and mitigate risks effectively.

58
Q

CSP

A

Cloud Service Provider

A company that offers cloud-based services, infrastructure, or platforms to businesses or individuals.

59
Q

CSR

A

Certificate Signing Request

A formal request sent to a Certificate Authority (CA) to apply a digital signature to a public key, typically used in SSL/TLS certificate issuance.

60
Q

CSRF

A

Cross-Site Request Forgery

An attack where an unauthorized command is executed on a user’s behalf without their consent, often exploiting the user’s active session on a trusted site.

61
Q

CSU

A

Channel Service Unit

A device that provides signal conversion and conditioning for data transmission over telecommunications lines, ensuring reliable communication between devices within a network.

62
Q

CTM

A

Counter-Mode

A cryptographic mode of operation that transforms a block cipher into a stream cipher, often used for encryption in wireless networks and VPNs, enhancing confidentiality and integrity.

63
Q

CTO

A

Chief Technology Officer

A senior executive responsible for overseeing the technological direction of a company, including strategies, innovations, and technical operations.

64
Q

CVE

A

Common Vulnerabilities and Exposure

A dictionary of publicly known information security vulnerabilities and exposures, providing standardized identifiers for tracking and sharing vulnerability information across different platforms and products, crucial for effective cybersecurity risk management and mitigation strategies.

65
Q

CVSS

A

Common Vulnerability Scoring System

A standardized method for assessing and scoring the severity of security vulnerabilities to help prioritize response efforts.

66
Q

CYOD

A

Choose Your Own Device

A policy that allows employees to select their preferred device from a list of approved options for work purposes, balancing user preference with organizational security and management considerations.

67
Q

DAC

A

Discretionary Access Control

A security model where access to resources is based on the discretion of the resource owner, allowing them to set access permissions for individual users or groups.

68
Q
A