BPA Computer Security Acronyms

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/551

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

552 Terms

1
New cards
3DES (Triple Data Encryption Standard)
A symmetric algorithm used to encrypt data and provide confidentiality. It is a block cipher that encrypts data in 64-bit blocks.
2
New cards
AAA (authentication, authorization, and accounting)
a security framework used to control access to computer resources within a network by verifying user identity (authentication), defining what actions they are allowed to perform (authorization), and keeping a record of their activity (accounting)
3
New cards
ABAC (Attribute Based Access Control)
access control model in which access is based on attributes (of a person, a resource, or an environment)
4
New cards
acceptable use policies
A document that states constraints and practices that users must agree to follow to have access to a corporate network.
5
New cards
ACL (Access Control List)
A set of data (user names, passwords, time and date, IP address, MAC address, etc.) that is used to control access to a resource such as a computer, file, or network.
6
New cards
AD (Active Directory)
The centralized directory database that contains user account information and security for the entire group of computers on a network. In microsoft
7
New cards
AES256 Advanced Encryption Standards 256bit
a highly secure symmetric encryption algorithm where the encryption key is 256 bits long, considered one of the most robust encryption methods currently available, widely used to protect sensitive data like financial information and classified government data due to its exceptional security level; essentially, "256-bit" indicates the size of the key used to encrypt and decrypt data, making it extremely difficult to crack without the correct key.
8
New cards
AH Authentication Header
In the context of IPSec, a type of encryption that provides authentication of the IP packet's data payload through public key techniques.
9
New cards
AIS (Automated Indicator Sharing)
DHS and CISA free program
10
New cards
Enables organizations to share and receive machine-readable cyber threat indicators (CTIs) and defensive measures (DMs) in real-time
11
New cards
Useful to monitor and defend networks against known threats
12
New cards
ALE (Annualized Loss Expectancy)
The expected loss for a year. It is used to measure risk with ARO (annual rate of occurrence) and SLE (single loss expectancy) in a quantitative risk assessment. The calculation is SLE x ARO = ALE.
13
New cards
Anti Virus (AV)
Software that stops known malware. It's crucial for catching viruses before they can cause trouble.
14
New cards
AP (Access Point)
A device or software that
15
New cards
facilitates communication and provides
16
New cards
enhanced security to wireless devices.
17
New cards
API (Application Programming Interface)
Software definition that describes operating system calls for application software; conventions defining how a service is invoked.
18
New cards
APT - Advanced Persistent Threat:
A bad actor, usually state-sponsored or nation-state group, which uses sophisticated techniques for their criminality. APTs can remain undetected for some time.
19
New cards
APT (Advanced Persistent Threat)
An attacker's ability to obtain, maintain, and diversify access to network systems using exploits and malware.
20
New cards
ARO (Annualized Rate of Occurrence)
The number of times a loss is expected to occur in a year. It is used to measure risk with ALE and SLE in a quantitative risk assessment.
21
New cards
ARP (Address Resolution Protocol)
A communications protocol that resolves IP
22
New cards
addresses to MAC addresses.
23
New cards
ASLR (Address Space Layout Randomization)
a security method that involves shifting the contents of memory around to make tampering difficult
24
New cards
ASP (Active Server Pages)
A type of web application architecture that is presented later in the track
25
New cards
ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge)
a framework developed by MITRE that documents the common behaviors and methods used by cyber attackers, providing a standardized way for security professionals to understand and categorize attacker tactics and techniques across different attack stages, allowing for better threat modeling and defense strategies against them.
26
New cards
AUP (Acceptable Use Policy)
A Set of rules and guidelines that are set up to regulate Internet use and to protect the user.
27
New cards
Banner Grabbing
A method used to gain information about a remote system. It identifies the operating system and other details on the remote system.
28
New cards
bash (Bourne again shell)
A command shell and scripting language for Unix-like systems. bastion host A server typically found in a DMZ that is configured to provide a single service to reduce the possibility of compromise.
29
New cards
Bayesian filtering
Spam filtering software that analyzes every word in an email and determines how frequently a word occurs in order to determine if it is spam.
30
New cards
BCP (Business Continuity Planning)
details how a company recovers and restores critical business operations and systems after a disaster or extended disruption
31
New cards
BGP (Border Gateway Protocol)
A path-vector protocol used by ISPs to establish routing
32
New cards
between one another.
33
New cards
BIA (Business Impact Analysis)
A systematic activity that identifies organizational risks and determines their effect on ongoing, mission critical operations.
34
New cards
BIND
helps prevent DNS poisining
35
New cards
BIOS (basic input/output system)
Firmware that can control much of a computer's input/output functions, such as communication with the keyboard and the monitor.
36
New cards
BOTNET - Robot Network
A group of connected computers controlled by software.
37
New cards
BPA (Business Partnership Agreement)
A legally binding contract that defines the rules for a business partnership
38
New cards
Outlines ownership stakes, responsibilities, and decision-making
39
New cards
Helps clarify roles and avoid confusion
40
New cards
Helps manage risks by anticipating and planning for them
41
New cards
Helps document what happens if there are financial issues or a disaster
42
New cards
BPDU (Bridge Protocol Data Unit)
A type of network message that transmits STP information between switches.
43
New cards
Bring Your Own Device (BYOD)
Lets users securely access company systems and data from their personal devices. Convenience meets security!
44
New cards
BSSID (basic service set identifier)
The BSSID is the
45
New cards
MAC address of the wireless access
46
New cards
point (AP).
47
New cards
CAPTCHA - Automated Public Turing Test to Tell Computers and Humans Apart
A response test used to determine whether a user is a human or not.
48
New cards
CAR (Corrective Action Report)
A report used to document actions taken to correct an event, incident, or outage.
49
New cards
CASB (Cloud Access Security Broker)
Ensures secure access to cloud apps and keeps an eye on unsanctioned activities.
50
New cards
CASB (Cloud Access Security Broker)
Software that sits between
51
New cards
cloud service users and cloud
52
New cards
applications to monitor all activity
53
New cards
and enforce security policies.
54
New cards
CBC (Cipher Block Chaining)
A mode of operation used for encryption that effectively converts a block cipher into a stream cipher. It uses an IV for the first block and each subsequent block is combined with the previous block.
55
New cards
CBT (computer-based training)
A method of education that allows people to learn at their own pace, using specially designed interactive software.
56
New cards
CCMP (Counter Mode CBC-MAC Protocol)
A mode of operation for block ciphers that allows for authenticated encryption
57
New cards
CEH - Certified Ethical Hacker:
A certified and skilled individual who knows how to look for vulnerabilities and weaknesses in systems using the same tools as a bad actor would. CEHs are also often referred to as penetration testers - or pentester.
58
New cards
CERT - Computer Emergency Response Team
A group of security experts responsible for incidents and reporting.
59
New cards
CERT (Computer Emergency Response Team)
A group of experts that respond to security incidents. Also known as CIRT, SIRT, or IRT.
60
New cards
Certified in Risk and Information Systems Control (CRISC)
demonstrates your IT risk management expertise. By taking a proactive approach, you will learn how to enhance your organization's business resilience, deliver stakeholder value and optimize risk management across the enterprise.
61
New cards
Certified Information Security Manager (CISM)
is sponsored by ISACA. It is an international examination that is designed for leaders in security who oversee the security programs of organizations
62
New cards
Certified Information Systems Auditor (CISA)
The CISA designation identifies those professionals possessing IT audit, control, and security skills. Generally, CISAs will perform IT audits to evaluate the accounting information system's internal control design and effectiveness.
63
New cards
Certified Information Systems Security Professional (CISSP)
a globally recognized cybersecurity certification that demonstrates a professional's ability to design, implement, and manage a comprehensive cybersecurity program across various domains like risk management, asset security, network security, and identity access management, signifying a high level of expertise in the field; it is offered by the International Information Systems Security Certification Consortium (ISC)².
64
New cards
CFB (Cipher Feedback)
Converts cipher block into a bit stream and then encrypt and decrypt each bit at a time. This method is defined as self-synchronising.
65
New cards
CHAP
66
New cards
Challenge Handshake Authentication Protocol
An encrypted remote-access
67
New cards
authentication method that enables
68
New cards
connections from any authentication method requested by the server, except for PAP and SPAP unencrypted authentication.
69
New cards
CHAP (Challenge Handshake Authentication Protocol)
An encrypted remote-access
70
New cards
authentication method that enables
71
New cards
connections from any authentication method requested by the server, except for PAP and SPAP unencrypted authentication.
72
New cards
CIO - Chief Information Officer
A senior-level title given to an individual responsible for managing and implementing within the information technology and computer systems.
73
New cards
CIO (Chief Information Officer)
responsible for overseeing every aspect of an organization's information resource.
74
New cards
CIRT (Computer Incident Response Team)
a team that is responsible for dealing with major security incidents
75
New cards
CISA - Certified Information Systems Auditor
:A certified individual responsible for implementing an audit strategy for information systems.
76
New cards
CISA - Cybersecurity and Infrastructure Security Agency:
CISA is the Nation's risk advisor, working with partners to defend against today's threats and collaborating to build more secure and resilient infrastructure for the future.
77
New cards
CISO - Chief Information Security Officer:
Senior-level executive responsible for an organization's data and information security. Furthermore, ensuring technologies and information assets are protected.
78
New cards
CISSP - Certified Information Systems Security Professional:
This certification covers the fundamentals of cybersecurity. Individuals that are CISSPs are considered extremely knowledgeable in the cybersecurity field. This certification is offered by ISC(2).
79
New cards
CMMC - Cybersecurity Maturity Model Certification
:Unified standard for implementing cybersecurity across the defense industrial base.
80
New cards
CMS (Content Management System)
Allows it's users to edit, delete and manage the content of a website from a visual interface.
81
New cards
CN (Common Name)
An X500 attribute expressing a host or user name, also used as the subject identifier for a digital certificate.
82
New cards
Community string
A string used for authentication in SNMP. The public community string is used for read-only searches, whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption for the strings as well as other improvements and options.
83
New cards
Content Secure Policy (CSP)
Protects against code injection attacks and other malicious content on trusted web pages.
84
New cards
COO - Chief Operating Officer:
A high-ranking, senior-level executive, usually second in command. COOs are responsible for overseeing day-to-day operations.
85
New cards
COOP (Continuity of Operations Planning)
A collection of processes that enable an organization to maintain normal business operations in the face of an adverse event. See also business continuity plan.
86
New cards
COPE (Corporate Owned, Personally Enabled)
A mobile device deployment model. The organization purchases and issues devices to employees.
87
New cards
CP (Contingency Planning)
Plans for contingencies in the event of a disaster to keep an organization operational BCPs include contingency planning
88
New cards
CRC (Cyclic Redundancy Check)
An error detection method that can be applied to blocks of data, rather than individual words. Both the sender and receiver calculate EDC; if they match, the data is assumed to be valid.
89
New cards
CRL (Certificate Revocation List)
a public list that holds all the revoked certifications for a certain period of time
90
New cards
Cross Site Scripting (XSS)
An attack that injects scripts into a Web application server to direct attacks at clients.
91
New cards
CSA (Cloud Security Alliance)
Industry body providing security guidance to CSPs, including enterprise reference architecture and security controls matrix.
92
New cards
CSIRT (Computer Security Incident Response Team)
Computer Security Incident Response Team is an organization that receives reports of security breaches, conducts analyses of the reports and responds to the senders. It's a single point of contact in the US to report computer security breaches and security incidents.
93
New cards
CSO - Chief Security Officer:
A senior executive responsible for information security.
94
New cards
CSO (chief security officer)
responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses
95
New cards
CSP - Cloud Service Provider:
A third-party organization or company offering cloud-based platform, infrastructure, application or storage services.
96
New cards
CSP (Cloud Service Provider)
A vendor offering public cloud service models, such as PaaS, IaaS, or SaaS.
97
New cards
CSR (Certificate Signing Request)
A method of requesting a certificate from a CA. It starts by creating an RSA-based private/public key pair and then including the public key in the CSR.
98
New cards
CSRF (Cross Site Request Forgery)
An attack vector that tricks a web browser into executing an unwanted action in an application to which a user is logged in. Also known as XSRF, Sea Surf, or Session Riding.
99
New cards
CSU (Channel Service Unit)
A device used with T-carrier technology that provides termination for the digital signal and ensures connection integrity through error correction and line monitoring. Typically, a CSU is combined with a DSU in a single device, a CSU/DSU.
100
New cards
CTM (Counter Mode)
A mode of operation in cryptography for block ciphers.