SEC+ Acronyms Flashcards

(54 cards)

1
Q

GDPR

A

General Data Protection Regulation

Establishes personal data privacy enforcement and penalties for non-compliance and limits how an individual’s personal data can be shared. “Right to erasure.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PCI-DSS

A

Payment Card Industry Data Security Standard

Protects cardholder data and authentication data (storage, processing, and transmission).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PAN

A

Primary Account Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIS

A

Center for Internet Security

Non-profit that provides cyber defense guidance, best practices, advisories, alert levels, and configuration baseline guidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MS-ISAC

A

Multi-state information sharing and analysis center

provides historical cyber threat statistics, reports, incident response, and forensics to state and local U.S. governments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RMF

A

NIST Risk Management Framework

Overall framework for the U.S. federal government to manage organizational risk throughout the system development life cycle; focuses on security control selection, deployment, and auditing using a six-step model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSAE

A

Statement on Standards for Attestation Engagements

System and organization controls (SOC) reports examine an organization’s internal controls IRT security, availability, process integrity, confidentiality, etc. Current standard is SSAE 18.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CSA

A

Cloud Security Alliance

International organization that researches and developers best practices for cloud computing environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ISO

A

International Organization for Standardization

Publishes international standards and guidelines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NDA

A

Non-Disclosure Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CBT

A

Computer-based training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AUP

A

Acceptable Use Policy

Defines the conditions in which company resources may be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SLA

A

Service-level Agreement

A formal definition of a service provided to or by the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MSA

A

Measurements System Analysis

A method of determining the amount of variation and uncertainty that exists within a measurement process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EOL

A

End of Life

End of support for a product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EOSL

A

End of Service Life

Agreed-upon service is no longer offered by the service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MOU

A

Memorandum of Understanding

A less formal agreement of mutual goals between two or more organizations with a focus on partitioning of responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BPA

A

Business Partnership Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DPO

A

Data Protection Officer

Responsible for the care and protection of customer data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

PII

A

Personally Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

PHI

A

Personal Health Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IP

A

Intellectual Property

23
Q

SLE

A

Single Loss Expectancy

how much realizing a risk costs for one occurrence

24
Q

ALE

A

Annualized Loss Expectancy

how much realizing a risk costs per year

25
BCP
Business Continuity Planning the preventative and proactive strategic plan to mitigate disruptive incidents to business operations
26
BIA
Business Impact Analysis Management tool that helps determine the financial impact of business or organization changes
27
COOP
Continuity of operations plan
28
RPO
Recovery point objective acceptable loss (how much we are willing to lose)
29
RTO
Recovery time objective acceptable downtime (how much we can are okay being down - ie how long we’re okay being in the dark)
30
MTD
Maximum tolerable downtime the point of no return (if we are down longer than ___, then we won’t make it — ie the maximum time we can be in the dark)
31
MTBF
Mean time between failures anticipated time frame of operational longevity (ie how long a lightbulb will last)
32
MTTR
Mean time to repair anticipated time frame to return to operational status (ie how long it will take to replace the lightbulb)
33
“T.O.M.” | Security Control Categories
Technical Operational Managerial
34
DRP
Disaster recovery plan Detailed tactical plan for responding to disasters so core essential business process can be brought back online
35
ACL
Access Control List
36
IDS
Intrusion Detection System
37
“C.I.A.” | CIA Triad Model
Confidentiality Integrity Availability
38
TLS
Transport Layer Security
39
PRNG
Pseudo-random number generator
40
IV
Initialization Vector Random values used in conjunction with algorithms, applied to plain text data, the key, or the cypher text before encryption is completed.
41
PFS
Perfect Forward Secrecy Ephemeral Keys (Temporary session keys)
42
LSB
Least Significant Bit The bit to the far right; used in stenography
43
MAC | IRT Cryptography
Message Authentication Code Establishes message authenticity
44
HMAC
Hashed MAC (Message Authentication Code)
45
“C.3.2.B.R.A.I.D.S.”
Symmetric Algorithms ``` CAST-128/256 3DES 2 fish Blowfish RC4/6 AES IDEA DES, Serpent ```
46
CBC
Cipher block chaining Cipher text from the previous block is used as the IV (initialization vector) for the next block
47
GCM
Galois Counter Mode
48
“R.E.D.”
Asymmetric Algorithms Rivets, Shamir, Adleman Elliptic curve cryptography Difffie-Hellman
49
DH
Diffie-Hellman
50
RSA
Rivets, Shamir, & Adleman
51
ECC
Elliptic Curve Cryptography
52
PKI
Public Key Infrastructure Framework for provisioning, storing, and de-provisioning asymmetric keys
53
CTM
Counter Mode
54
CCM
Counter with CBC-MAC (Cipher Block Chaining - Message Authentication Code)