AP
A networking hardware device that allows other wi-fi devices to connect to a wired network
AP=Access Point
BYOD
the practice of allowing employees of an organization to bring their own computers, smartphones, or other devices for work purposes.
BYOD=Bring Your Own Device
CN
The characteristic value within a distinguished name (DN)
CN=Common Name
DEP
A security feature included in modern operating systems that marks areas of memory as either "executable" or "non-executable", and only allows data that is "executable".
DEP=Data Execution Prevention
ERP
The integrated management of main business processes, often in real time and mediated by software and technology.
ERP=Enterprise Resource Planning
AI
Computer systems able to perform tasks that normally require human intelligence.
AI=Artificial Intelligence
BGP
A standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems on the internet.
BGP=Border Gateway Protocol
CERT
Expert group that handles computer security incidents.
CERT=Computer Emergency Response Team
DES
A symmetric key algorithm for the encryption of digital data.
DES=Data Encryption Standard
ESSID
The logical network name used in an extended service set (ESS). ESSID is often synonymous with SSID.
ESSID=Extended Service Set Identifier
AAA
Framework used to control and track access within a computer network.
AAA= Authentication, Authorization, and Accounting
A sequence of characters that uniquely names a wireless local area network.
BSSID= Basic Service Set Identifier
CVSS
Open industry standard for assessing the severity of computer system security vulnerabilities.
CVSS=Common Vulnerabilities Scoring System
DRP
A written plan for recovering one or more information systems at an alternate facility in response to a major hardware or software failure or destruction of facilities.
DRP=Disaster Recovery Plan
EDR
A cybersecurity technology that continually monitors an "endpoint" to mitigate malicious cyber threats.
EDR=Endpoint Detection and Response
ASLR
A computer security technique involved in preventing exploitation of memory corruption vulnerabilities.
ASLR= Address Space Layout Randomization
BPDU
A data message transmitted across a local area network to detect loops in network topologies.
BPDU=Bridge Protocol Data Unit
CBC
A mode of operation for a block cipher- one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block.
CBC=Cipher Block Chaining
DMARC
An essential first line of defense against phishing emails and similar cyberattacks
DMARC=Domain Message Authentication Reporting and Conformance
ECC
A public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys
ECC=Elliptic Curve Cryptography
AES256
Process of concealing plain text data using the AES algorithm and an AES key length of 256 bits.
AES256=Advanced Encryption Standards 256bit
BASH
A command line interface that administrators of Unix and Linux operating system distributions use heavily.
BASH=Bourne Again Shell
CHAP
An authentication protocol used to validate users originally used by Point-to-Point protocol.
CHAP= Challenge Handshake Authentication Protocol
DHE
A mathematical method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as conceived by Ralph Merkle and named after Whitfield Diffie and Martin Hellman.
DHE=Diffie-Hellman Ephemeral
ECDHE
An anonymous key agreement protocol that allows two parties, each having an elliptic curve public-private key pair, to establish a shared secret over an insecure channel.
ECDHE=Elliptic-curve Diffie-Hellman Ephemeral