Acronyms Flashcards
(175 cards)
AE
Authenticated Encryption
AES
Advanced Encryption Standard
AK
Authentication Key
API
Application Programming Interface
APT
Advanced Persistent Threat
ASA
Adaptive Security Appliance
AVT
Advanced Volatile Threat`
BCP
Business Continuity Plan
C2 or C&C
Command and Control
Refers to the communication channel used by attackers to remotely control compromised systems within a network. It allows threat actors to issue commands, exfiltrate data, and coordinate malicious activities like botnet attacks.
It’s basically the evil HQ radio line to their army of hacked machines. 📡💀💻
CHAP
Challenge-Handshake Authentication Protocol
CIA
Confidentiality
Integrity
Availability
CIO
Chief Information Officer
A company officer with the primary responsibility of managing information technology assets and procedures.
CIRT / CSIRT / CERT
Computer Incident Response Team
Computer Security Incident Response Team
Computer Emergency Response Team
Team with responsibility for incident response. The CSIRT must have expertise across a number of business domains (IT, HR, legal, and marketing, for instance).
CSO
Chief Security Officer
Typically, the job title of the person with overall responsibility for information assurance and systems security.
CTO
Chief Technology Officer
A company officer with the primary role of making effective use of new and emerging computing platforms and innovations.
DBMS
Database Management System
DDF
Data Decryption Field
DEK
Data Encryption Key
DES
Data Encryption Standard
DevOps
Development and Operations
A combination of software development and systems operations, and refers to the practice of integrating one discipline with the other.
DevSecOps
Development and Security and Operations
A combination of software development, security operations, and systems operations, and refers to the practice of integrating each discipline with the others.
DSA
Digital Signature Algorithm
DRA
Data Recovery Agent
DRP
Disaster Recovery Plan