Acronyms A-E Flashcards
(52 cards)
AAA
Authentication, Authorization, and Accounting
A security framework that ensures only authorized individuals are able to access resources.
ABAC
Attribute Based Access Control
Evaluates attributes to determine the access.
ACL
Access Control List
A list of rules that specifies which users or systems are granted or denied access to a particular object or system resource.
AES
Advanced Encryption Standard
A specification for the encryption of electronic data established by NIST in 2001, much stronger than DES and triple DES.
AIS
Automated Indicator Sharing
A service provided by CISA that enables real-time exchange of cyber threat indicators.
APT
Advanced Persistent Threat
A type of cyber attack where an unauthorized user gains access to a system and remains undetected for an extended period.
ARP
Address Resolution Protocol
A protocol used to map an IP address to a physical MAC address.
ASLR
Address Space Layout Randomization
A technique used to prevent attackers from exploiting vulnerabilities by randomizing key data areas in memory.
BCP
Business Continuity Planning
A strategy for ensuring an organization’s ability to prevent or recover from significant disruptions.
BDPU Guard?
Bridge Protocol Data Units Guard
A feature that defends the layer 2 STP topology against BDPU-related threats.
BIA
Business Impact Analysis
Identifies the operational and financial impacts resulting from the disruption of business functions.
BIOS
Basic Input/Output System
Software stored on a memory chip that instructs the computer on basic functions like booting and hardware configuration.
BLOB
Binary Large Object Storage
Used by cloud providers as a database for large amounts of text or binary data.
BPA
Business Partnership Agreement
Agreement between two companies outlining contributions, responsibilities, and profit sharing.
BYOD
Bring Your Own Device
A policy that allows employees to use personal devices to access company resources.
CA
Certificate Authority
A trusted entity that issues digital certificates to verify identities.
CAC
Common Access Card
A smart card used as standard identification for Active Duty United States Defense personnel.
CASB.
Cloud Access Security Broker
Software/hardware that enforces security policies between users and cloud services.
CAPTCHA
Completely Automated Public Turing test to tell Computers and Humans Apart
A challenge-response test used to distinguish between human and automated users.
CBC
Cipher Block Chaining
A mode of operation for a block cipher where a sequence of bits are encrypted as a single unit.
CER
Certificate
Security files provided by a Certificate Authority to help verify the authenticity of a website.
CHAP
Challenge Handshake Authentication Protocol
A challenge-response identity authentication protocol that does not expose a password.
CIA
Confidentiality, Integrity, and Availability
Known collectively as the CIA triad.
CIRT
Computer Incident Response Team
A team responsible for responding to and mitigating cyber security incidents.