Acronyms Flashcards

(54 cards)

1
Q

16 CI infrastructure

A

16 critical infrastructure sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACFCS

A

Association of Certified Financial Crime Specialists

Worldwide organization for private and public sector professionals working in financial crime disciplines; information sharing network for financial crime intelligence; offers member training products and service; awards CFCS certification to qualified candidates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active defense

A

Includes attribution (finding out who is attacking and how), prevention (stopping attacks before they go too far), and retribution (“hacking back”) to defend systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AFME

A

Association for Financial Markets in Europe

Trade group representing global European banks and other significant capital market players. Advocate on behalf of European banks for constructive EU policy development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APT

A

Advanced Persistent Attack

A series of cyber attacks targeting a specific entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APWG

A

Anti-Phishing Working Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BoE

A

Central bank of the U.K.

Manages the nation’s currency and financial system

Mission to maintain financial and monetary stability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

C3

A

Critical infrastructure Cyber Community

Pronounced C-cubed

US-CERT’s voluntary program to assist the enhancement of critical infrastructure cyber security and promote the adoption of NIST Cybersecurity framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CARMA

A

Cyber security Assessment and Risk Management Approach

Provide an outline of sector-wide risks for different categories of cyber critical infrastructure to help the owners/operators assess, prioritize, and manage cyber risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CAT (FFIEC)

A

Cybersecurity Assessment Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CBEST

A

Intelligence led penetration testing methodology/process; firmly encouraged by the UK regulators (BoE/PRA) for all critical UK financial institutions to perform this testing process to assess potential vulnerabilities in their systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CDT

A

Center for Democracy and Technology

Team of experts with deep knowledge of issues pertaining to the Internet, privacy, security, technology, and intellectual property; team members come from academia, private enterprise, government, and the non-profit worlds to translate complex policy into action; advocate for laws, corporate policies, and technology tools that protect the privacy of Internet users, and place stronger legal controls on government surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CEH

A

Certified Ethical Hacker (or Hacking)

A skilled professional who knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of the target system(s). The CEH credential offered by the EC-Council certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CERT

A

Computer Emergency Response Team

Expert groups that handle computer security incidents; there are many different CERTs (ex: for different countries) that operate independently but may coordinate on certain security incidents; also called CSIRTs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CFCS certification

A

Certified Financial Crime Specialist certification

Awarded by the ACFCS to professionals in the financial crime field who pass an exam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CFPB

A

Consumer Financial Protection Bureau

Organization established by Congress to protect consumers by carrying out federal consumer financial laws; they write rules, supervise companies, and enforce federal consumer financial protection laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Chamber of Commerce

A

World’s largest business organization for US businesses; advocates for US business and the growth of the economy; develop and implement policies on major issues affecting business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CI

A

Critical Infrastructure

The assets, systems, and networks, whether physical or virtual, so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof; there are 16 CI Industry Sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CIA

A

Central Intelligence Agency

Civilian foreign intelligence agency of the USG tasked with gathering, processing, and analyzing national security information from around the world; reports to the DNI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CIIA

A

Critical Infrastructure Information Act of 2002

Enacted as part of the Homeland Security Act of 2002; created a framework that enables members of the private sector and others to voluntarily submit sensitive information regarding the Nation’s CIKR to DHS with the assurance that the information, if it satisfies certain requirements, will be protected from public disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CIIP

A

Critical Information Infrastructure Protection

Term used in the EU to describe initiatives for the protection and resilience of CI; ENISA has a CIIP and Resilience Unit, which is responsible for assisting national EU agencies and private sector organizations develop strong, proactive strategies for protection, response, and recovery from cyber security attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CIKR

A

Critical Infrastructure and Key Resources

refers to the assets of the US essential to the nation’s security, public health and safety, economic vitality, and way of life.

23
Q

CINS

A

Critical Infrastructure Notification System

FS-ISAC’s notification system, which allows FS-ISAC to send cyber threat alerts to multiple recipients around the globe near-simultaneously

24
Q

CIP

A

Critical Infrastructure Protection

A concept that relates to the preparedness and response to serious incidents involving national critical infrastructure

25
CIPAC
Critical Infrastructure Partnerships Advisory Council DHS council to facilitate interaction between government entities and CI owners/operators
26
CISA
Cyber security Information Sharing Act of 2015 The reincarnation of CISPA; was passed by the Senate Intelligence Committee; was designed to encourage the sharing of data between private companies and the government to prevent and respond to cyber threats; still privacy concerns working against the bill (people believe it is a surveillance bill in disguise because it would allow for the sharing of personal data that goes beyond cyber security threats)
27
CISCP
Critical Infrastructure Cyber Information Sharing & Collaboration Program Run by DHS; information sharing and collaboration between DHS and its critical infrastructure partners; CISCP shares near-real-time threat incident, and vulnerability information; key focus is to establish a community of trust between the Federal Government and critical infrastructure entities and to leverage those relationships to better understand cyber threats and improve the network defense of the entire community
28
CISO
Chief Information Security Officer The senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are protected
29
CISPA
Cyber Intelligence Sharing and Protection Act A proposed amendment to the National Security Act of 1947; would allow for the sharing of Internet traffic information between the US government and technology and manufacturing companies; the stated aim of the bill is to help the US government investigate cyber threats and ensure the security of networks against cyber attacks; however, there are concerns about privacy and civil liberties surrounding CISPA; was never passed
30
CISSP
Certified Information Systems Security Professional You can earn this professional certification through ISC2
31
CNDA
Certified Network Defense Architect Similar to CEH, but for government agencies only (certification offered by UC-Council)
32
CNI
Critical National Infrastructure Same thing as CI (Critial Infrastructure)
33
CNO
Computer Network Operations Deliberate actions taken to leverage and optimize computer networks to improve human endeavor and enterprise (in private sector organizations, for example) or, in warfare, to gain information superiority and deny the enemy this enabling capability; the NSA enables CNOs to give the U.S. and out allies an advantage over potential threats
34
ConOps
Concept of Operations A` document describing the characteristics of a proposed system from the viewpoint of an individual who will use that system, used to describe the system to all stakeholders
35
CPMI
Committee on Payments and Market Infrastructures Promotes the safety and efficiency of payment, clearing, settlement and related arrangements, thereby supporting financial stability and the wider economy; monitors and analyses developments in these arrangements; serves as a forum for central bank cooperation in related oversight, policy and operational matters, including the provision of central bank services; sets standards that aim to strengthen regulation, policy, and practices regarding such arrangements worldwide
36
CPNI
Centre for the Protection of National Infrastructure UL authority; provides expert security advice to CI owners and operators; involved in R&D; have relationships with both private and public sector partners
37
CRADA
Cooperative Research and Development Agreement An agreement between a government agency and a private company or university to work together on research and development (example: JPMC signed a CRADA with the IOW to share cyber security and threat information)
38
CRR
Cyber Resilience Reviews Reviews that measure the cyber security capabilities of an organization using CSET and CARMA; run by DHS's CSEP
39
CS&C
Office of Cybersecurity and Communications DHS office within the NPPD; works to prevent or minimize disruptions to critical information infrastructure in order to protect the public, the economy, and government services; works to protect the .gov and .com domains; is the SSA for the Communications and IT sectors; reports consistent with the NRF
40
CSA
Cyber Security Alliance Partnership of companies where members collaborate on customer-focused solutions, experiments, and end-to-end systems integration pilot programs to help provide early threat detection, protection, and multi-layer self-healing capabilities to solve customers’ difficult problems and meet future challenges; run by Lockheed Martin
41
CSA SG
Cyber Security Agency Singapore Government agency that develops and oversees the nation's cyber security strategy; mission to protect critical infrastructure; promotes cyber security awareness through public outreach
42
CSEP
Cyber Security Evaluation Program The DHS program that performs CRRs
43
CSET
Cyber Security Evaluation Tool Systematic and repeatable evaluation process used in CRRs to assess the posture of ICS networks
44
CSIAC
Cyber Security & Information Systems Information Analysis Center A DoD IAC sponsored by the DACS, IATAC, and MSIAC; performs the BCO functions necessary to fulfill the mission and objectives applicable to the DoD RDT&E needs; activities include collection, analysis, synthesizing/processing, and dissemination of STI
45
CSIRT
Computer Security Incident Response Team Another name for CERTs
46
CSIS
Center for Strategic and International Studies
47
CSOC
Cyber Security Operations Center The center where an organization's networks are monitored with advanced analytical processes to determine, confine, and destroy any cyber threats
48
CSP
Commercial Service Providers An entity that supplies the system and services needed to provide back-office infrastructure for a business (internet, network, and communications service providers)
49
CSS
Central Security Service Service that promotes full partnership between the NSA and the cryptologic elements of the U.S. armed forces; provides timely and accurate cryptologic support, knowledge, and assistance to the military cryptologic community; (NSA and CSS are combined)
50
CTI
Cyber Threat Indicator Defined in CISA as "information that is necessary to describe or identify” any “attribute of a cyber security threat” so long as disclosure of the underlying attribute is not otherwise legally prohibited. This includes information about malicious reconnaissance patterns, methods for defeating security controls, security vulnerabilities, and the actual or potential harm caused by an incident. However, something that “describe[s]” an “attribute” of a “threat” could be interpreted so broadly as to include personally identifiable information (PII) or the content of private online communications, that is not actually needed to detect or protect against that threat.
51
CTIC
CyberPoint Technology Innovation Center
52
Cyber UCG, CUCG
Partner of the NCCIC; is comprised of senior and staff-level representatives from federal departments and agencies, state and local governments, and private sector CI stakeholders
53
CybOX
Cyber Observable eXpression Standardized outline for the specification, capture, characterization, and communication of events or stateful properties that are observable in all system and network operations; aims to provide a common structure and content type for addressing cyber observables across a wide range of use cases to improve consistency and interoperability; effort led by DHS Office of Cyber security and Communications, NCCIC, and US-CERT
54
DACS
Data and Analysis Center for Software IAC chartered to collect, analyze, and disseminate information relating to the software domain; serves as an information broker that identifies resources that exist within the global community and making those resources available to the software community via their website, technical reports/journals, and a variety of services offered free of charge