C Flashcards

1
Q

C2

A

Command and control

Servers that are centrally placed the hold control
instructions for illicitly managed hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CA

A

Certificate Authority

This entity issues certificates. After verifying them, and
is the center of trust in PKI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CAC

A

Common Access Card

A form of identification with photograph, barcode,
RFID and cryptographic storage of private key
information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CAPTCHA

A

Completely Automated Public Turing to Tell
Computers and Humans Apart

This is intended to prevent rogue automated attempts at
access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CAR

A

Corrective Action Report

A document generated when the defect or error has been
detected that has the goal of eliminating a reoccurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CASB

A

Cloud Access Security
Broker

A software resource place between users and cloud
applications that monitors and enforces policy-based
access to cloud resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CBC

A

Cipher Block Chaining

Each plaintext block is XORed (see XOR) with the
immediately previous ciphertext block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CBT

A

Computer-Based Training

Courseware or lessons that are delivered via a computer,
commonly used for at home and corporate training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CCMP

A

Counter-Mode/CBC-Mac Protocol

Each plaintext block is XORed (see XOR) with the
immediately previous ciphertext block that includes a
message authentication code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CCTV

A

Closed-circuit Television

Allows monitoring and recording of activities in an
area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CER

A

Cross-over Error Rate

The point at which false acceptances are equal to false
rejection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CER

A

Certificate

A generic term for a document that facilitates
authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CERT

A

Computer Emergency Response Team

A multi-discipline group designated to handle IT
incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CFB

A

Cipher Feedback

A mode of operation for a block cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Chain of custody

A

Evidence control and management

The documentation of handling and protection of
evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CHAP

A

Challenge Handshake Authentication Protocol

Commonly used by routers and has several derivatives
in use by Microsoft for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CIO

A

Chief Information Officer

The most senior official in an organization responsible
for the information technology and systems that support
enterprise.

18
Q

CIRT

A

Computer Incident Response Team

A group that investigates and resolves IT security
problems.

19
Q

CIS

A

Center for Internet Security

Its mission is to identify develop, promote, and lead the
world with regard to best practices for cybersecurity
solutions.

20
Q

CMP

A

Change Management Policy

An organizational process designed to facilitate making
changes to organizational resources in such a way that
they are identifiable, auditable, and orderly.

21
Q

CMS

A

Content Management System

These are applications that facilitate the creation,
editing, publishing and archival of web pages and
content.

22
Q

CN

A

Common Name

An identifying name that may be applied to a directory
resource, such as a user, server, or other object.

23
Q

COOP

A

Continuity of Operations Plan

Ensuring that vital and primary mission essential
functions continue to run, even in the face of
emergencies.

24
Q

COPE

A

Corporate Owned, Personally Enabled

Smart phones owned by the organization, but approved
for personal use.

25
CP
Contingency Planning Procedures to follow in the event of a catastrophic incident, even though it may be unlikely.
26
CRC
Cyclical Redundancy Check An error checking code, used in digital technology primarily to identify accidental changes to data.
27
Crimeware
Cyber theft A class of malware that automates malicious activity.
28
CRL
Certificate Revocation List This is maintained by a certificate authority to identify certificates associated with compromised or lost private keys.
29
CSO
Chief Security Officer This official is responsible for development, oversight, mitigation and other risk strategies.
30
CSP
Cloud Service Provider An organization that provides IaaS, PaaS or SaaS to an array of customers. An organization that provides cloud-based access to infrastructure, storage and/or applications.
31
CSA
Cloud Security Alliance A nonprofit organization that promotes best practices in security for cloud-based computing.
32
CSIRT
Computer Security Incident Response Team Information technology personnel whose purpose is to prevent, manage and coordinate actions about security incidents.
33
CSR
Certificate Signing Request Created by an applicant seeking to gain a certificate from an authority.
34
CSRF
Cross-site Request Forgery An attack wherein a message is spoofed from a user to a trusted site.
35
CSU
Channel Service Unit A connecting device used to link an organization to telco-based T-services
36
CTO
Chief Technology Officer The executive person tasked with identifying useful technology, IT strategies and partnerships.
37
CTOS
Centralized terminal operating system. Legacy management.
38
CTR
Counter This form of encryption is used by AES to perform streaming encryption.
39
CVE
Common Vulnerabilities and Exposures A database of known and published software flaws that may impact security that is managed by MITRE.
40
CVSS
Common Vulnerability Scoring System An empirical scheme for rating vulnerability severity based upon specific aspects of the vulnerability, environment, and nature of threats.
41
CYOD
# Choose Your Own Device In this mode of control and acquisition, an employee chooses a device from a company provided list. Ownership may be personal or organization.