Cyber Security Acronyms

Ace your homework & exams now with Quizwiz!

Corrective Action Report

CAR

Counter-Mode/CBC-Mac Protocol

CCMP

Closed-circuit television

CCTV

Computer Emergency Response Team

CERT

Challenge Handshake Authentication Protocol

CHAP

Chief Information Officer

CIO

Computer Incident Response Team

CIRT

Continuity of Operation Planning

COOP

Contingency Planning

CP

Cyclical Redundancy Check

CRC

Certification Revocation List

CRL

Control Status Register

CSR

Channel Service Unit

CSU

Chief Technology Officer

CTO

Completely Automated Public Turing Test to Tell Computers and Humans Apart

CAPTCHA

Triple Digital Encryption Standard

3DES - symmetric-key block cipher, which applies the Data Encryption Standard (DES) cipher algorithm 3 times to each data block.

Authentication, Authorization, and Accounting

AAA - provides a way of identifying a user, typically by having the user enter a valid user name and valid password before access is granted (authentication);determines whether the user has the authority to issue such commands(authorization) ;is carried out by logging of session statistics and usage information and is used for authorization control, billing, trend analysis, resource utilization, and capacity planning activities (accounting)

Access Control List

ACL - is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects

Advanced Encryption Standard

AES

Advanced Encryption Standards 256bit

AES256

Authentication Header

AH

Annualized Loss Expectancy

ALE

Access Point

AP

Application Programming Interface

API

Annualized Rate of Occurrence

ARO

Address Resolution Protocol

ARP

Application Service Provider

ASP

Acceptable Use Policy

AUP

Business Availability Center

BAC

Business Continuity Planning

BCP

Business Impact Analysis

BIA

Basic Input / Output System

BIOS

Business Partners Agreement

BPA

Bring Your Own Device

BYOD

Certificate Authority

CA

Common Access Card

CAC

Controller Area Network

CAN

Discretionary Access Control

DAC

Database Administrator

DBA

Distributed Denial of Service

DDOS

Data Execution Prevention

DEP

Digital Encryption Standard

DES

Dynamic Host Configuration Protocol

DHCP

Diffie-Hellman Ephemeral

DHE

Data-Handling Electronics

DHE -

Dynamic Link Library

DLL

Data Loss Prevention

DLP

Demilitarized Zone

DMZ

Destination Network Address Transaction

DNAT

Domain Name Service (Server)

DNS

Denial of Service

DOS

Disaster Recovery Plan

DRP

Digital Signature Algorithm

DSA

Digital Subscriber line

DSL

Data Service Unit

DSU

Extensible Authentication Protocol

EAP

Elliptic Curve Cryptography

ECC

Elliptic Curve Diffie-Hellman Ephemeral

ECDHE

Encrypted File System

EFS

Electromagnetic Interference

EMI

Electronic Serial Number

ESN

Encapsulated Security Payload

ESP

File System Access Control List

FACL

Full Disk Encryption

FDE

File Transfer Protocol

FTP

File Transfer Protocol Secured

FTPS

Gnu Privacy Guard

GPG

Group Policy Object

GPO

Global Positioning System

GPS

Graphic Processing Unit

GPU

Generic Routing Encapsulation

GRE

Hard Disk Drive

HDD

Host Based Intrusion Detection System

HIDS

Host Based Intrusion Prevention System

HIPS

Hashed Message Authentication Code

HMAC

HMAC based One Time Password

HOTP

Hardware Security Module

HSM

HyperText Markup Language

HTML

Hypertext Transfer Protocol

HTTP

Hypertext Transfer Protocol over SSL

HTTPS

Heating, Ventilation Air Conditioning

HVAC

Internet Control Message Protocol

ICMP

Identification

ID

Intrusion Detection System

IDS

Internet Key Exchange

IKE

Instant messaging

IM

Internet Message Access Protocol v4

IMAP4

Internet Protocol

IP

Internet Protocol Security

IPSEC

Incident Response

IR

Internet Relay Chat

IRC

Incident Response Procedure

IRP

Interconnection Security Agreement

ISA

Internet Service Provider

ISP

Information Systems Security Officer

ISSO

IT Contingency Plan

ITCP

Initialization Vector

IV

Infrastructure as a Service

IaaS

Just a Bunch of Disks

JBOD

Key Distribution Center

KDC


Related study sets

Palabras que empiezan por la letra A

View Set

Pharm chapter 13 drugs for sleep

View Set

MRU4.3: Does the Equilibrium Model Work

View Set

Federal Fair Credit Reporting Act ( FCRA )

View Set

Chapter 4-Internal Analysis: Resources, Capabilities, and Core Competencies

View Set