Acronyms Flashcards

(165 cards)

1
Q

BCP

A

Business Continuity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CCTV

A

Closed Circuit Television

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CBK

A

Common Body of Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIA

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIRT

A

Computer Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CSIRT

A

Computer Security Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DoS

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CISO

A

Chief Information Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CRO

A

Chief Risk Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DPD

A

Data Protection Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISO

A

International Standard Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CISSP

A

Certified Information System Security Professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

EU

A

European Union

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ICT

A

Information and Communication Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PIPEDA

A

Personal Information Protection and Electronic Documents Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

HIPAA

A

Health Insurance Portability and Accountability Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DPD

A

Data Protection Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

GLBA

A

Gramm-Leach-Bliley Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

PCI SSC

A

Payment Card Industry Security Standards Council

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

QSA

A

Qualified Security Assessor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

GRC

A

Governance, Risk Management, and Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

FISMA

A

Federal Information Security Management Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

WIPO

A

World Intellectual Property Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

BSA

A

Business Software Alliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
IDC
International Data Corporation
33
EULA
End User License Agreement
34
ITAR
International Traffic In Arms Regulations
35
EAR
Export Administration Regulations
36
ECCN
Export Control Classification Number
37
RFID
Radio Frequency Identification
38
VOIP
Voice Over Internet Protocol
39
OECD
Organization for Economic Cooperation and Development
40
VERIS
Vocabulary for Event Recording and Incident Sharing
41
VCDB
VERIS Community Database
42
ECS
Electronic Communication Service
43
ENISA
European Union Agency for Network and Information Security
44
DPA
Data Protection Agency
45
ICO
Information Commissioner's Office
46
ECS
Electronic Communications Service
47
PECR
Privacy and electronic communications regulations
48
FSGO
Federal Sentencing Guidelines for Organizations Outline.
49
NYSE
New York Stock Exchange
50
FDA
Food and Drug Administration
51
FTC
Federal Trade Commission
52
ATF
Bureau of Alcohol, Tobacco, Firearms and Explosives
53
IRS
Internal Revenue Service
54
DoL
Department of Labor
55
SPA
Software Publishers Association
56
BSA
Business Software Alliance
57
IAB
Internet Activities Board
58
CEI
Computer Ethics Institute
59
NCCV
National Conference on Computing and Values
60
NCERC
National Computer Ethics and Responsibilities Campaign
61
NCSA
National Computer Security Association
62
BC
Business Continuity
63
DR
Disaster Recovery
64
SPOF
Single Point of Failure
65
BIA
Business Impact Analysis
66
NIST
National Institute of Standards and Technology
68
ISSO
Information Systems Security Officer
69
DRP
Disaster Recovery Plan
70
RoR
Rate of Return
72
ITGI
IT Governance Institute
79
SDLC
Software Development Life Cycle
81
MTD
Maximum Tolerable Downtime
84
RTO
Recovery Time Objective
85
TCP/IP
Transmission Control Protocol / Internet Protocol
86
ICMP
Internet Control Message Protocol
87
IGMP
Internet Group Management Protocol
88
FTP
File Transfer Protocol | application layer protocol
89
SNMP
Simple Network Management Protocol (application layer protocol)
90
SMTP
Simple Mail Transfer Protocol | application layer protocol
91
TFTP
Trivial File Transfer Protocol | application layer protocol
92
ASCII
( presentation layer service)
93
EBCDIC
Extended Binary–Coded Decimal Interchange Mode (presentation layer service)
94
TIFF
Tagged image file format | presentation layer service
95
JPEG
(Presentation layer service)
96
MPEG
Motion pictures experts group | Presentation layer service
97
MIDI
Musical instrument digital interface | presentation layer service
98
NFS
Network file system | Session layer protocol
99
NetBIOS
(Session layer protocol)
100
SQL
(Session Layer Protocol)
101
RPC
Remote Procedure Call | session layer protocol
102
TCP
(Transport layer protocol )
103
UDP
User Datagram Protocol | Transport layer protocol
104
SSL
Secure Sockets Layer | transport layer protocol
105
SPX
Sequenced package exchange | transport layer protocol
106
MTU
Maximum Transmission Unit
107
IP
Internet Protocol | Network layer protocol
108
ICMP
(Network layer protocol)
109
IGMP
(network layer protocol)
110
RIP v1 and v2
(Network layer protocol)
111
OSPF v1 and v2
Open shortest path first | Network layer protocol
112
MTBF
Mean time between failures
113
RPO
Recovery point objective | The point in time that the disaster recovery planner will attempt to recover to.
114
FCRA
Fair credit reporting act
115
EEOC
Equal employment opportunity commission
116
NIST
National Institute of standards and technology
117
COSO
Committee of sponsoring organizations of the Treadway commission
118
COBIT
Control objectives for information and related technology
119
ITAF
IT assurance framework
120
BMIS
Business model for information security
121
ISACA
Information systems audit and control association
122
CRAMM
CCTA risk analysis and management method
123
FRAP
Facilitated risk analysis process
124
SOMAP
Security officers management and analysis project
125
VAR
Value at Risk
126
SLE
Single loss expectancy Defined as the difference between the original value and the remaining value of an asset after a single exploit. SLE = Asset value (in $) x Exposure Factor (Loss due to successful threat exploit, as a percentage)
127
ARO
Annualized rate of occurrence. | An estimate of how often a threat will be successful and exploiting a vulnerability over the period of a year.
128
ALE
Annualized loss expectancy Is a product of the yearly estimate for the exploit and the loss in value of an asset after a single occurrence ALE = SLE x ARO
129
LAFE
Local annual frequency estimate
130
SAFE
Standard annual frequency estimate
131
NOS
Network Operating System
132
DNS
Domain Name System
133
NAT
network address translation
134
PAT
Port address translation
135
NAPT
Network address port translation
136
MTU
Maximum Transmission Unit
137
BGP
Border Gateway Protocol
138
OSPF
Open Shortest Path First
139
IPX
Internetwork Packet Exchange
140
RIP
Routing Information Protocol
141
LLC
Logical Link Control
142
ARP
Address Resolution Protocol
143
RARP
Reverse Address Resolution Protocol
144
PPP
Point to point protocol
145
SLIP
Serial Line Internet Protocol
146
FECN
Forward explicit congestion notification
147
BECN
Backward explicit congestion Notification
148
LMI
Local management interface
149
SDLC
Synchronous data link control
150
SNA
System network architecture
151
HDLC
High-level datalink control
152
NRM
Normal response mode
153
ARM
Asynchronous response mode
154
ABM
Asynchronous balanced mode
155
LAPB
Link access procedure, balanced
156
ISDN
Integrated services digital network
157
BRI
Basic rate interface
158
PRI
Primary rate interface
159
DSL
Digital subscriber line
160
ADSL
Asymmetric DSL
161
RDSL
Rate adaptive DSL
162
HDSL
Hi rate DSL
163
IDSL
ISDN DSL
164
VDSL
Very high data rate DSL
165
SDSL
Symmetric DSL
166
CMTS
Cable modem transmission system
167
AH
Authentication Header
168
ESP
Encapsulating security payload
169
IKE
Internet key exchange
170
3DES
Triple data encryption standard
171
SA
Security association
172
MS-CHAP
Microsoft challenge authentication protocol
173
GRE
Generic routing encapsulation
174
PPTP
Point-to-point tunneling protocol
175
PAC
Point to point tunneling protocol access concentrator
176
SKIP
Simple key management protocol for IP
177
DES
Data encryption standard
178
SSL
Secure sockets layer
179
IETF
Internet engineering task force
180
TLS
Transport layer security
181
SET
Secure electronic transaction
182
MIME
Multipurpose Internet mail extension
183
PGP
Pretty good privacy