Acronyms Flashcards

(105 cards)

1
Q

AAA

A

Authentication, Authentication, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AH

A

Authentication Header(for IP packets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AIS

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ALE

A

Annualized Loss Expectancy (risk metric for the year)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

APT

A

Advanced Persistent Threat (prolonged cyber attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARO

A

Annual Rate of Occurrence (how often a risk may occur)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP

A

Address Resolution Protocol (map IP address to physical MAC address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ASLR

A

Address Space Layout Randomization (randomize memory addresses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ATT&CK

A

Adversarial Tactics, Technologies, and Common Knowledge (knowledge base used by professionals)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AUP

A

Acceptable Use Policy (rules for using the services)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AV

A

Anti Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BASH

A

Borne Again Shell (command line interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BCP

A

Business Continuity Planning (plan to continue business during disaster)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BIA

A

Business Impact Analysis (potential effect of operation pause)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BIOS

A

Basic Input/Output System (initiates hardware components/loads operating system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BPA

A

Business Partners Agreement (contract between two or more orgs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BPDU

A

Bridge Protocol Data Unit (decides best path for network travel)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CA

A

Certificate Authority (org to verify public keys)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CAPTCHA

A

Completely Automated Public Turning Test to Tell Computers and Humans Apart (bot detection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CAR
Corrective Action Report (doc to identify and resolve issues)
26
CASB
Cloud Access Security Broker (in-between prog to monitor and enforce)
27
CBC
Cipher Block Chain (mode of op for block chain)
28
CCMP
Counter Mode/CBC-MAC Protocol (encrypt protocol used for WiFi)
29
CCTV
Closed Circuit Television
30
CERT
Computer emergency response Team
31
CIA
Confidentiality, Integrity, Availability
32
CIO
Chief Information Officer (exec of it strats)
33
CIRT
Computer Incident response Team
34
CMS
Content Management System
35
COOP
Continuity of Operational Planning (strat for crit functions during a disaster)
36
COPE
Corporate Owned, Personally Enabled
37
CP
Contingency Planning
38
CRC
Cyclical Redundancy Check (error detecting code for trans and storage)
39
CRL
Certificate Revocation List(list of revoked certs)
40
CSO
Chief Security Officer
41
CSP
Cloud Service Provider
42
CSR
Certificate Signing Request(text sent to CA when applying for cert)
43
CSRF
Cross-site Request Forgery (user giving account info with fake site)
44
CSU
Channeling Services Unit (connecting equip to digital circuit)
45
CTM
Counter Mode (block cipher to stream cipher)
46
CTO
Chief technology Officer
47
CVE
Common Vulnerability Enumeration (syst to name cyber events)
48
CVSS
Common Vulnerability Scoring System (1-10 score for vulnerabilities)
49
CYOD
Chose Your Own Device
50
DAC
Discretionary Access Control (owner says who can see/edit)
51
DBA
Database Administrator
52
DDOS
Distributed Denial of Service (multiple attacks to flood a target)
53
DEP
Data Execution Prevention (stops data ex in certain regions of memory)
54
DES
Digital Encryption Standard (symmetric key algorithm)
55
DHCP
Dynamic Host Configuration Protocol (prot to asign IP addresses and net settings)
56
DHE
Diffie - Hellman Ephemeral (key exchange alg for public channel)
57
DKIM
Domain Keys Identified Mail (email auth method)
58
DLL
Dynamic Link Library (file of code/data for multi programs)
59
60
DLP
Data Loss Prevention
61
DMARC
Domain Message Authentication Reporting and Conformance (email auth protocol)
62
DNAT
Destination Network Address Translation (NAT used to modify IP address destination)
63
DNS
Domain Name System (sys to translate from name to IP address)
64
DOS
Denial of Service (disrupt service)
65
DPO
Data Privacy Officer
66
DRP
Disaster Recover Plan
67
DSA
Digital Signature Algorithm
68
DSL
Digital Subscriber Line (internet over copper phone line)
69
EAP
Extensible Authentication Protocol (multiple auth methods)
70
ECB
Electronic Code Block (block chain of fixed size blocks encrypted with same key)
71
ECC
Elliptic Curve Cryptography (public key crypt based on algebraic structure of elliptic curve)
72
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
73
ECDSA
Elliptic Curve Digital Signature Algorithm
74
EFS
Encrypted File System (Microsoft Windows ecrypt)
75
ESN
Electric Serial Number (unique mobile device no.)
76
ESP
Encapsulated Security Payload (protocol in IPsec)
77
FACL
File System Access Control List (defines perms for files)
78
FDE
Full Disk Encryption (encypt hard drive or storage disk)
79
FIM
File Integrity Management
80
FPGA
Field Programmable Gate Array (IC configured after manufacturing for specific task)
81
FRR
False Rejection Rate (metric in bio sys for % of incorrect rejects)
82
FTPS
File Transfer Protocol Secured
83
84
GDRP
General Data Protection Regulation (EU data protection law)
85
GPG
Gnu Privacy Guard (open source encryption tool)
86
GPO
Group Policy Object (config active directory settings)
87
GPS
Global Positioning System
88
GPU
Graphics Processing Unit (graphics card)
89
GRE
Generic Routing Encapsulation (protocol for containing network layers)
90
HA
High Availability (always available)
91
HDD
Hard Disk Drive
92
HIDS
Host-based Intrusion Detection System (single device monitoring)
93
HIPS
Host-based Intrusion Prevention System (detects and precents)
94
HOTP
HMAC-based One-Time Password (alg to generate one time password)
95
HSM
Hardware Security Modem (device for crypt keys)
96
HTML
Hyper-texted Markup Language
97
HTTP
Hyper-text Transfer Protocol
98
HVAC
Heating, Ventilation Air Conditioning
99
IaaS
Infrastructure as a Service
100
IaC
Infrastructure as Code (code rather than manual)
101
IAM
Identity and Access Management
102
ICMP
Internet Control Message Protocol
103
ICS
Industrial Control Systems
104
105