3DES
Triple Data Encryption Standard
AAA
Authentication, Authorization, and Accounting
00:05
01:14
ABAC
Attribute-based Access Control
ACL
Access Control List
AD
Active Directory
AES
Advanced Encryption Standard
AES256
Advanced Encryption Standards 256...
ATT&CK - Answer Adversarial Tactics, Techniques, and Common Knowledge
AUP - Answer Acceptable Use Policy
AV - Answer Antivirus
BASH - Answer Bourne Again Shell
,BCP - Answer Business Continuity Planning
BGP - Answer Border Gateway Protocol
BIA - Answer Business Impact Analysis
BIOS - Answer Basic Input/Output System
BPA - Answer Business Partnership Agreement
BPDU - Answer Bridge Protocol Data Unit
BSSID - Answer Basic Service Set Identifier
BYOD - Answer Bring Your Own Device
CA - Answer Certificate Authority
CAPTCHA - Answer Completely Automated Public Turing Test to Tell Computers and
Humans Apart
CAR - Answer Corrective Action Report
CASB - Answer Cloud Access Security Broker
CBC - Answer Cipher Block Chaining
CBT - Answer Computer-based Training
CCMP - Answer Counter-Mode/CBC-MAC Protocol
CCTV - Answer Closed-Circuit Television
CERT - Answer Computer Emergency Response Team
CFB - Answer Cipher Feedback
CHAP - Answer Challenge-Handshake Authentication Protocol
CIO - Answer Chief Information Officer
CIRT - Answer Computer Incident Response Team
CIS - Answer Center for Internet Security
, CMS - Answer Content Management System
CN - Answer Common Name
COOP - Answer Continuity of Operations Planning
COPE - Answer Corporate-owned Personally Enabled
CP - Answer Contingency Planning
CRC - Answer Cyclic Redundancy Check
CRL - Answer Certificate Revocation List
CSA - Answer Cloud Security Alliance
CSIRT - Answer Computer Security Incident Response Team
CSO - Answer Chief Security Officer
CSP - Answer Cloud Service Provider
CSR - Answer Certificate Signing Request
CSRF - Answer Cross-Site Request Forgery
CSU - Answer Channel Service Unit
CTM - Answer Counter-Mode
CTO - Answer Chief Technology Officer
CVE - Answer Common Vulnerabilities and Exposures
CVSS - Answer Common Vulnerability Scoring System
CYOD - Answer Choose Your Own Device
DAC - Answer Discretionary Access Control
DBA - Answer Database Administrator
DDoS - Answer Distributed Denial-of-Service
DEP - Answer Data Execution Prevention
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller EvaTee. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.