click below
click below
Normal Size Small Size show me how
Security + Acronums
Acronums a - c
| Question | Answer |
|---|---|
| AAA | Authentication, Authorization, and Accounting. AAA protocols are used in remote access systems. For example, TACACS+ is an AAA protocol that uses multiple challenges and responses during a session. Authentication verifies a user’s identification. |
| ACE | Access control list. In a firewall, an ACL identifies traffic that is allowed or blocked based on IP addresses, networks, ports, and some protocols (using the protocol ID). |
| AES | Advanced Encryption Standard. A symmetric algorithm used to encrypt data and provide confidentiality. AES is quick, highly secure, and used in a wide assortment of cryptography schemes. It includes key sizes of 128 bits, 192 bits, or 256 bits. |
| AES256 | Advanced Encryption Standard 256 bit. AES sometimes includes the number of bits used in the encryption keys and AES256 uses 256-bit encryption keys. |
| ALE | Annualized loss expectancy. Used to measure risk with annualized rate of occurrence (ARO) and single loss expectancy (SLE). The ALE identifies the total amount of loss expected for a given risk. The calculation is SLE x ARO = ALE. |
| AP | Access point (wireless)APs provide access to a wired network to wireless clients. |
| ARO | Annualized rate of occurrence. Used to measure risk with annualized loss expectancy (ALE) and single loss expectancy (SLE). The ARO identifies how many times a loss is expected to occur in a year. The calculation is SLE x ARO = ALE. |
| ARP | Address Resolution Protocol. Resolves IP addresses to MAC addresses. ARP poisoning attacks can redirect traffic through an attacker’s system by sending false MAC address updates. |
| AUP | Acceptableuse policy. An AUP defines proper system usage. It will often describe the purpose of computer systems and networks, how users can access them, and the responsibilities of users when accessing the systems. |
| BCP | Business continuity plan. A plan that helps an organization predict and plan for potential outages of critical services or functions. |
| BIOS | Basic Input/Output System. A computer’s firmware used to manipulate different settings such as the date and time, boot drive, and access password. |
| BOTS | An automated program or system used to perform one or more tasks.Botnet activity often includes hundreds of outbound connections, and some botnets use Internet Relay Chat (IRC) channels. |
| CA | Certificate Authority. An organization that manages, issues, and signs certificates and is part of a PKI. |
| CAC | Common Access Card. A specialized type of smart card used by United States Department of Defense.includes photo identification and provides confidentiality, integrity, authentication, and non-repudiation |
| CAN | An encryption protocol based on AES used with WPA2 for wireless security. It is more secure then TKIP, used with the original release of WPA. |
| CCTV | Closed-circuit television. This is a detective control that provides video surveillance. |
| CERT | Computer Emergency Response Team. A group of experts that respond to security incidents. Also known as CIRT, SIRT, or IRT. |
| CIA | Confidentiality, integrity, and availability. These three form the security triad. |
| CIRT | Computer Incident Response Team. A group of experts that respond to security incidents. Also known as CERT, SIRT, or IRT. |
| COOP | —Continuity of Operations Plan. A COOP site provides an alternate location for operations after a critical outage. |
| Coop Hot site: | A hot site includes personnel, equipment, software, and communications capabilities of the primary site with all the data up to date. A hot site can take over for a failed primary site within an hour. |
| Coop Cold Site | A cold site will have power and connectivity needed for COOP activation, but little else. |
| Coop Warm site | A warm site is a compromise between a hot site and a cold site. |
| CRC | Certification Revocation List. A list of certificates that have been revoked. Certificates are commonly revoked if they are compromised. The certificate authority (CA) that issued the certificate publishes a CRL, and a CRL is public. |