Acronyms A-E Flashcards

(52 cards)

1
Q

AAA

A

Authentication, Authorization, and Accounting

A security framework that ensures only authorized individuals are able to access resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ABAC

A

Attribute Based Access Control

Evaluates attributes to determine the access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL

A

Access Control List

A list of rules that specifies which users or systems are granted or denied access to a particular object or system resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Advanced Encryption Standard

A specification for the encryption of electronic data established by NIST in 2001, much stronger than DES and triple DES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AIS

A

Automated Indicator Sharing

A service provided by CISA that enables real-time exchange of cyber threat indicators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APT

A

Advanced Persistent Threat

A type of cyber attack where an unauthorized user gains access to a system and remains undetected for an extended period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ARP

A

Address Resolution Protocol

A protocol used to map an IP address to a physical MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ASLR

A

Address Space Layout Randomization

A technique used to prevent attackers from exploiting vulnerabilities by randomizing key data areas in memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BCP

A

Business Continuity Planning

A strategy for ensuring an organization’s ability to prevent or recover from significant disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BDPU Guard?

A

Bridge Protocol Data Units Guard

A feature that defends the layer 2 STP topology against BDPU-related threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BIA

A

Business Impact Analysis

Identifies the operational and financial impacts resulting from the disruption of business functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BIOS

A

Basic Input/Output System

Software stored on a memory chip that instructs the computer on basic functions like booting and hardware configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BLOB

A

Binary Large Object Storage

Used by cloud providers as a database for large amounts of text or binary data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BPA

A

Business Partnership Agreement

Agreement between two companies outlining contributions, responsibilities, and profit sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BYOD

A

Bring Your Own Device

A policy that allows employees to use personal devices to access company resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CA

A

Certificate Authority

A trusted entity that issues digital certificates to verify identities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CAC

A

Common Access Card

A smart card used as standard identification for Active Duty United States Defense personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CASB.

A

Cloud Access Security Broker

Software/hardware that enforces security policies between users and cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CAPTCHA

A

Completely Automated Public Turing test to tell Computers and Humans Apart

A challenge-response test used to distinguish between human and automated users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CBC

A

Cipher Block Chaining

A mode of operation for a block cipher where a sequence of bits are encrypted as a single unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CER

A

Certificate

Security files provided by a Certificate Authority to help verify the authenticity of a website.

22
Q

CHAP

A

Challenge Handshake Authentication Protocol

A challenge-response identity authentication protocol that does not expose a password.

23
Q

CIA

A

Confidentiality, Integrity, and Availability

Known collectively as the CIA triad.

24
Q

CIRT

A

Computer Incident Response Team

A team responsible for responding to and mitigating cyber security incidents.

25
COPE
Corporate-Owned, Personally-Enabled ## Footnote A policy allowing employees to use company-owned devices for personal use.
26
CRC
Cyclic Redundancy Check ## Footnote A mathematical algorithm used to detect errors in data transmission.
27
CRL
Certificate Revocation List ## Footnote The first phase of checking if a certificate is valid.
28
CSA
Cloud Security Alliance ## Footnote A non-profit organization that provides resources to help Cloud Security Providers.
29
CSRF
Cross-Site Request Forgery ## Footnote A web security vulnerability that allows an attacker to induce users to perform unintended actions.
30
CSO
Chief Security Officer ## Footnote A senior-level executive responsible for overseeing an organization's security program.
31
CSP
Cloud Service Provider ## Footnote A third-party company that provides scalable computing resources over a network.
32
CSR
Certificate Signing Request ## Footnote A request made by a user or device to a certificate authority for a digital certificate.
33
CSV
Comma Separated Values ## Footnote A file format used to store data in a table-like format.
34
CVE
Common Vulnerabilities and Exposure ## Footnote A list of vulnerabilities created by MITRE.
35
CVSS
Common Vulnerabilities Scoring System ## Footnote A ranking of vulnerabilities and their severity.
36
CYOD
Choose Your Own Device ## Footnote A policy where the company has a set of devices for employees to choose for work.
37
DAC
Discretionary Access Control ## Footnote Restricting access to objects based on the identity of the subject.
38
DDoS
Distributed Denial of Service ## Footnote A cyber attack using multiple systems to flood a target server with traffic.
39
DES
Data Encryption Standard ## Footnote A symmetric-key block cipher that is now considered insecure.
40
DHCP
Dynamic Host Configuration Protocol ## Footnote A protocol used to automatically assign IP addresses and other network settings.
41
DMZ
Demilitarized Zone ## Footnote A network segment isolated from the internal network for public-facing services.
42
DNS
Domain Name System ## Footnote A system that translates domain names into IP addresses.
43
DoS
Denial of Service ## Footnote A cyber attack that overwhelms a server with traffic, causing unavailability.
44
DPO
Data Protection Officer ## Footnote Ensures that the organization is protecting personal data according to legislation.
45
DRP
Disaster Recovery Plan ## Footnote Preparing for any type of disaster that could occur.
46
EAP
Extensible Authentication Protocol ## Footnote An architectural framework providing extensibility for authentication methods.
47
EFS
Encrypting File System ## Footnote A feature in Windows allowing files and folders to be encrypted using a user's public key.
48
EMI
Electromagnetic Interference ## Footnote Interference caused by electromagnetic waves that disrupt electronic devices.
49
EMP
Electromagnetic Pulse ## Footnote A burst of electromagnetic radiation that can damage electronic devices.
50
ESP
Encapsulating Security Payload ## Footnote A protocol in IPSec responsible for the CIA triad of security.
51
ALE
Annualized Loss Expectancy - a metric used to estimate the potential financial loss an organization could experience from a specific cyber security threat over a year
52
ARO
Annual Rate of Occurrence - the estimated frequency or likelihood of a specific security incident happening within a given year