Abbreviations Flashcards

(68 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Open Shortest Path First/OSPF

A

a link‑state interior routing protocol that builds a full network topology map and computes the shortest‑path routes using Dijkstra’s algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Operational Technology/OT

A

hardware and software that monitor or control physical devices, processes, and industrial infrastructure (e.g., SCADA, PLCs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Over the Air/OTA

A

wireless delivery of software updates, configuration changes, or data to devices (cellular, Wi‑Fi, Bluetooth, satellite, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Open Vulnerability Assessment Language/OVAL

A

an XML‑based, community‑driven standard for encoding system configuration, patch, and vulnerability information for automated security testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PKCS #12/P12

A

a binary container format that stores a private key together with its associated X.509 certificate chain, usually protected by a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Peer to Peer/P2P

A

a decentralized network architecture where each node can act as both client and server, sharing resources directly with other peers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Platform as a Service/PaaS

A

a cloud service model that provides a managed runtime environment, development tools, and infrastructure so developers can deploy applications without managing servers or OS layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Proxy Auto Configuration/PAC

A

a JavaScript file (proxy.pac) that browsers evaluate to determine dynamically which HTTP/HTTPS proxy to use for each requested URL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Privileged Access Management/PAM (Privileged Access Management)

A

a set of policies, processes, and technologies that control, monitor, and audit the use of privileged accounts (admin, root, service accounts).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pluggable Authentication Modules/PAM (Pluggable Authentication Modules)

A

a modular authentication framework (primarily on Linux/Unix) that stacks and configures multiple authentication methods (e.g., pam_unix, pam_ldap).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Password Authentication Protocol/PAP

A

a simple, clear‑text authentication method used in PPP and early Wi‑Fi that transmits usernames and passwords without encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port Address Translation/PAT

A

a variant of NAT that maps many private IP addresses to a single public IP address, distinguishing flows by using different source ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Password‑Based Key Derivation Function 2/PBKDF2

A

a key‑stretching algorithm that repeatedly applies a pseudorandom function (e.g., HMAC‑SHA‑256) to a password and salt to produce a derived cryptographic key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Private Branch Exchange/PBX

A

an on‑premises telephone switching system that routes internal calls and connects to the public PSTN or VoIP networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Packet Capture/PCAP

A

a file format (commonly .pcap) that stores raw network packets captured by tools such as Wireshark or tcpdump for later analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Payment Card Industry Data Security Standard/PCI DSS

A

a set of 12 high‑level requirements (with many sub‑requirements) that organizations handling cardholder data must implement to protect that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Power Distribution Unit/PDU

A

a rack‑mounted hardware device that distributes electrical power to multiple outlets and may provide monitoring, switching, or metering functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Protected Extensible Authentication Protocol/PEAP

A

an EAP method that tunnels a second‑factor authentication (e.g., MS‑CHAP v2) inside a TLS‑protected channel, providing mutual authentication without exposing credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Personal Electronic Device/PED

A

any handheld or portable electronic gadget owned or used by an individual (smartphone, tablet, laptop, wearable, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Privacy Enhanced Mail/PEM

A

a text‑based encoding (Base64 with header/footer) for representing cryptographic objects such as X.509 certificates, private keys, or CSRs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Perfect Forward Secrecy/PFS

A

a property of key‑exchange protocols (e.g., Diffie‑Hellman, ECDHE) whereby compromise of long‑term private keys does not enable decryption of past encrypted sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Pretty Good Privacy/PGP

A

an encryption program and open standard (OpenPGP) that provides end‑to‑end confidentiality, integrity, and authentication using a hybrid of symmetric and asymmetric cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Personal Health Information/PHI

A

any individually identifiable health information protected under regulations such as HIPAA (medical records, treatment details, lab results).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Personally Identifiable Information/PII
any data that can be used to uniquely identify, contact, or locate a specific individual (name, SSN, biometric data, etc.).
26
Personal Identity Verification/PIV
a U.S. federal government smart‑card standard (NIST 800‑78) that provides strong, multifactor authentication for federal employees and contractors.
27
Public Key Cryptography Standards/PKCS
a family of RSA‑originated specifications (e.g., PKCS #1, #7, #12) that define formats and protocols for public‑key encryption, signatures, and key management.
28
Public Key Infrastructure/PKI
a set of policies, procedures, hardware, software, and standards that enable creation, management, distribution, use, storage, and revocation of digital certificates and public‑key encryption.
29
Post Office Protocol/POP
an application‑layer protocol (most commonly POP3) used by email clients to retrieve messages from a mail server, typically deleting them from the server after download.
30
Plain Old Telephone Service/POTS
the traditional analog voice‑only telephone service delivered over the public switched telephone network (circuit‑switched PSTN).
31
Point-to-Point Protocol/PPP
a data link layer protocol used to encapsulate network layer packets over direct serial links (e.g., dial‑up, PPPoE) and provide authentication, compression, and error detection.
32
Point-to-Point Tunneling Protocol/PPTP
a legacy VPN protocol that encapsulates PPP frames inside GRE tunnels and encrypts them with MPPE; widely considered insecure today.
33
Pre‑shared Key/PSK
a symmetric secret (password or passphrase) configured in advance on both ends of a secure communication channel (e.g., Wi‑Fi WPA‑PSK).
34
Pan‑tilt‑zoom/PTZ
a type of camera that can be remotely rotated horizontally (pan), vertically (tilt), and optically magnified (zoom) for flexible surveillance coverage.
35
Potentially Unwanted Program/PUP
software that, while not outright malicious, exhibits unwanted behavior such as ad injection, unwanted toolbars, or excessive data collection.
36
Recovery Agent/RA
an entity (person or service) authorized to recover encrypted data (e.g., a Data Recovery Agent for EFS) when the original key is unavailable.
37
Registration Authority/RA
a trusted entity that validates identities and issues digital certificates on behalf of a Certificate Authority (CA).
38
RACE (Research and Development in Advanced Communications Technologies in Europe)/RACE
a former European Union research program (early 1990s) that funded projects on advanced telecommunications and networking technologies.
39
Rapid Application Development/RAD
a software development approach that emphasizes quick prototyping, iterative feedback, and minimal planning to accelerate delivery of functional applications.
40
Remote Authentication Dial‑in User Service/RADIUS
a client‑server protocol that provides centralized authentication, authorization, and accounting (AAA) for network access (e.g., Wi‑Fi, VPN).
41
Redundant Array of Inexpensive Disks/RAID
a storage virtualization technology that combines multiple physical disks into logical units to improve performance, fault tolerance, or both.
42
Remote Access Server/RAS
a server (often a VPN concentrator or dial‑in server) that provides remote users with access to an internal network.
43
Remote Access Trojan/RAT
malware that creates a backdoor on a compromised host, allowing an attacker to control the system remotely and exfiltrate data.
44
Role‑based Access Control/RBAC
an authorization model that assigns permissions to roles rather than individuals; users acquire privileges by being assigned to roles.
45
Rule‑based Access Control/RBAC
an access‑control model that grants or denies access based on a set of predefined rules or policies (often expressed as if‑then statements).
46
Rivest Cipher version 4/RC4
a stream cipher designed by Ron Rivest, historically used in TLS and WEP but now considered insecure due to biased outputs.
47
Remote Desktop Protocol/RDP
Microsoft’s proprietary protocol for providing graphical remote‑desktop access to Windows computers over a network.
48
Radio‑Frequency Identification/RFID
a technology that uses radio waves to automatically identify and track tags attached to objects, animals, or people.
49
RACE Integrity Primitives Evaluation Message Digest/RIPEMD
a family of cryptographic hash functions (RIPEMD‑128, RIPEMD‑160, etc.) developed under the RACE project.
50
Return on Investment/ROI
a financial metric that evaluates the efficiency or profitability of an investment, calculated as (gain – cost) / cost.
51
Recovery Point Objective/RPO
the maximum tolerable amount of data loss measured in time; it defines how far back in time a system must be restored after a disruption.
52
Rivest, Shamir, & Adleman/RSA
a widely used public‑key cryptosystem for encryption, digital signatures, and key exchange, based on the mathematical difficulty of factoring large integers.
53
Remotely Triggered Black Hole/RTBH
a network‑traffic‑filtering technique in which a router is instructed (often via BGP) to drop traffic destined for a specific IP prefix, effectively null‑routing malicious traffic.
54
Recovery Time Objective/RTO
the maximum acceptable length of time that a business process or IT service can be unavailable after a disruption before causing unacceptable impact.
55
Real‑time Operating System/RTOS
an operating system designed to process data and respond to events within strict timing constraints, guaranteeing deterministic behavior.
56
Real‑time Transport Protocol/RTP
a network protocol that delivers audio and video over IP networks with minimal latency, typically used with VoIP and streaming media.
57
Secure/Multipurpose Internet Mail Extensions/S‑MIME
an IETF standard for encrypting and digitally signing MIME‑encoded email messages, providing confidentiality and authentication.
58
Software as a Service/SaaS
a cloud‑delivery model in which applications are hosted by a provider and accessed by customers over the Internet, with the provider managing the underlying infrastructure.
59
Simultaneous Authentication of Equals/SAE
the password‑authenticated key‑exchange (PAKE) used in WPA3 for mutual authentication and forward secrecy between Wi‑Fi stations and access points.
60
Security Assertions Markup Language/SAML
an XML‑based framework for exchanging authentication and authorization assertions between an identity provider and a service provider (single sign‑on).
61
Storage Area Network/SAN
a dedicated high‑speed network (usually Fibre Channel or iSCSI) that provides block‑level storage access to servers, appearing as locally attached disks.
62
Subject Alternative Name/SAN
an X.509 certificate extension that allows a single certificate to secure multiple domain names, IP addresses, or other identifiers.
63
Secure Access Service Edge/SASE
a network architecture that converges cloud‑delivered wide‑area networking (SD‑WAN) with security services (firewall‑as‑a‑service, CASB, ZTNA) at the edge.
64
Supervisory Control and Data Acquisition/SCADA
a control‑system architecture used in industrial, utility, and infrastructure environments to monitor and control remote equipment.
65
Security Content Automation Protocol/SCAP
a suite of specifications (including CVE, CPE, CVSS, XCCDF, OVAL) that standardizes the format and exchange of security configuration and vulnerability data.
66
Simple Certificate Enrollment Protocol/SCEP
an automated protocol that allows network devices to request and obtain X.509 certificates from a Certificate Authority.Software‑defined Wide Area Network/SD‑WAN
67
Software Development Kit/SDK
a collection of tools, libraries, documentation, and sample code that enables developers to create applications for a specific platform or service.
68
Software Development Lifecycle/SDLC
the structured process of planning, creating, testing, and maintaining software, encompassing phases such as requirements, design, implementation, verification, and maintenance.Software Development Lifecycle Methodology/SDLM