Acronyms Flashcards
(322 cards)
AAA
Authentication, Authorization, and Accounting: Framework for managing user access and maintaining activity logs.
ACL
Access Control List: A list of rules used to control network traffic and access to system resources based on permissions.
AES
Advanced Encryption Standard: A symmetric encryption algorithm used to secure data with key sizes of 128, 192, or 256 bits.
AES-256
Advanced Encryption Standard 256-bit: Utilizes a 256-bit key for encrypting data, offering high levels of security.
AH
Authentication Header: Part of the IPsec protocol suite used to authenticate data packets.
AI
Artificial Intelligence: Systems or machines that simulate human intelligence to perform tasks.
AIS
Automated Indicator Sharing: CISA’s service that facilitates real-time sharing of cyber threat indicators.
ALE
Annualized Loss Expectancy: The expected monetary loss for an asset due to risk over a one-year period.
AP
Access Point: Device that allows wireless devices to connect to a wired network.
API
Application Programming Interface: A set of protocols and tools for building software and integrating different systems securely.
APT
Advanced Persistent Threat: A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected.
ARO
Annualized Rate of Occurrence: The estimated frequency at which a threat is expected to occur annually.
ARP
Address Resolution Protocol: Resolves IP addresses to MAC addresses within a local network.
ASLR
Address Space Layout Randomization: Security technique that randomly arranges the memory addresses to prevent buffer overflow attacks.
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge: A knowledge base developed by MITRE for describing adversary behavior in cyberattacks.
AUP
Acceptable Use Policy: Defines how an organization’s IT resources may be used to ensure security and compliance.
Authentication
Protocol: A method of verifying the identity of a user or device before granting access to resources.
AV
Antivirus: Software designed to detect, prevent, and remove malicious software from systems.
BASH
Bourne Again Shell: A popular command-line interface and scripting language in Linux environments.
BCP
Business Continuity Planning: Process of creating systems of prevention and recovery to deal with potential threats.
BGP
Border Gateway Protocol: Routing protocol used to exchange routing information between autonomous systems on the internet.
BIA
Business Impact Analysis: Process that determines the effects of disruption to business operations.
BIOS
Basic Input/Output System: Firmware that initializes hardware during the booting process of a computer.
BPA
Business Partners Agreement: A legal agreement outlining responsibilities and obligations between business partners.