Acronyms Flashcards

(324 cards)

1
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3DES

A

Triple Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES-256

A

Advanced Encryption Standards 256-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AI

A

Artificial intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AIS

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BPDU
Bridge Protocol Data Unit
26
BYOD
Bring Your Own Device
27
CA
Certificate Authority
28
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart CAR
29
CAR
Corrective Action Report
30
CASB
Cloud Access Security Broker
31
CBC
Cipher Block Chaining
32
CCMP
Counter Mode/CBC-MAC Protocol
33
CCTV
Closed-circuit Television
34
CERT
Computer Emergency Response Team
35
CFB
Cipher Feedback
36
CHAP
Challenge Handshake Authentication Protocol
37
CIA
Confidentiality, Integrity, Availability
38
CIO
Chief Information Officer
39
CIRT
Computer Incident Response Team
40
CMS
Content Management System
41
COBO
Corporate-owned, Business-only
42
COOP
Continuity of Operation Planning
43
COPE
Corporate Owned, Personally Enabled
44
CP
Contingency Planning
45
CRC
Cyclical Redundancy Check
46
CRL
Certificate Revocation List
47
CSO
Chief Security Officer
48
CSP
Cloud Service Provider
49
CSR
Certificate Signing Request
50
CSRF
Cross-site Request Forgery
51
CSU
Channel Service Unit
52
CTM
Counter Mode
53
CTO
Chief Technology Officer
54
CVE
Common Vulnerability Enumeration
55
CVSS
Common Vulnerability Scoring System
56
CYOD
Choose Your Own Device
57
DAC
Discretionary Access Control
58
DBA
Database Administrator
59
DDoS
Distributed Denial of Service
60
DEP
Data Execution Prevention
61
DES
Digital Encryption Standard
62
DHCP
Dynamic Host Configuration Protocol
63
DHE
Diffie-Hellman Ephemeral
64
DKIM
DomainKeys Identified Mail
65
DLL
Dynamic Link Library
66
DLP
Data Loss Prevention
67
DMARC
Domain Message Authentication Reporting and Conformance
68
DNAT
Destination Network Address Translation
69
DNS
Domain Name System
70
DNSSEC
Domain Name System Security Extensions
71
DoS
Denial of Service
72
DPO
Data Privacy Officer
73
DRP
Disaster recovery plan
74
DSA
Digital Signature Algorithm
75
DSL
Digital Subscriber Line
76
EAP
Extensible Authentication Protocol
77
ECB
Electronic Code Book
78
ECC
Elliptic Curve Cryptography
79
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
80
ECDSA
Elliptic Curve Digital Signature Algorithm
81
EDR
Endpoint Detection and Response
82
EFS
Encrypted File System
83
ERP
Enterprise Resource Planning
84
ESN
Electronic Serial Number
85
ESP
Encapsulated Security Payload
86
EULA
End User License Agreement
87
FACL
File System Access Control List
88
FDE
Full Disk Encryption
89
FIM
File Integrity Management
90
FPGA
Field Programmable Gate Array
91
FRR
False Rejection Rate
92
FTP
File transfer protocol
93
FTPS
Secured File Transfer Protocol
94
GCM
Galois Counter Mode
95
GDPR
General Data Protection Regulation
96
GPG
Gnu Privacy Guard
97
GPO
Group Policy Object
98
GPS
Global positioning system
99
GPU
Graphics Processing Unit
100
GRE
Generic Routing Encapsulation
101
HA
High Availability
102
HDD
Hard Disk Drive
103
HIDS
Host-based Intrusion Detection System
104
HIPS
Host-based Intrusion Prevention System
105
HMAC
Hashed Message Authentication Code
106
HOTP
HMAC-based One-time Password
107
HSM
Hardware Security Module
108
HTML
Hypertext Markup Language
109
HTTP
Hypertext Transfer Protocol
110
HTTPS
Hypertext Transfer Protocol Secure
111
HVAC
Heating, Ventilation Air Conditioning IaaS Infrastructure as a Service
112
IaC
Infrastructure as Code
113
IAM
Identity and Access Management
114
ICMP
Internet Control Message Protoco
115
ICS
Industrial Control Systems
116
IDEA
International Data Encryption Algorithm
117
IDF
Intermediate Distribution Frame
118
IdP
Identity Provider
119
IDS
Intrusion Detection System
120
IEEE
Institute of Electrical and Electronics Engineers
121
IKE
Internet Key Exchange
122
IM
Instant Messaging
123
IMAP
Internet Message Access Protocol
124
IoC
Indicators of Compromise
125
loT
Internet of Things
126
IP
Internet Protocol
127
IPS
Intrusion Prevention System
128
IPSec
Internet Protocol Security
129
IR
Incident Response
130
IRC
Internet Relay Chat
131
IRP
Incident Response Plan
132
ISO
International Standards Organization
133
ISSO
Information Systems Security Officer
134
IV
Initialization Vector
135
KDC
Key Distribution Center
136
KEK
Key Encryption Key
137
L2TP
Layer 2 Tunneling Protocol
138
LAN
Local Area Network
139
LDAP
Lightweight Directory Access Protocol
140
LEAP
Lightweight Extensible Authentication Protocol
141
MaaS
Monitoring as a Service
142
MAC
Mandatory Access Control/Media Access Control/Message Authentication Code
143
MAN
Metropolitan Area Network
144
MBR
Master Boot Record
145
MD5
Message Digest 5
146
MDF
Main Distribution Frame
147
MDM
Mobile Device Management
148
MFA
Multifactor Authentication
149
MFD
Multifunction Device
150
MFP
Multifunction Printer
151
ML
Machine Learning
152
MMS
Multimedia Message Service
153
MOA
Memorandum of Agreement
154
MOU
Memorandum of Understanding
155
MPLS
Multi-protocol Label Switching
156
MSA
Master Service Agreement
157
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
158
MSP
Managed Service Provider
159
MSSP
Managed Security Service Provider
160
MTBF
Mean Time Between Failures
161
MTTF
Mean Time to Failure
162
MTTR
Mean Time to Recover
163
MTU
Maximum Transmission Unit
164
NAC
Network Access Contro
165
NAT
Network Address Translation
166
NDA
Non-Disclosure Agreement
167
NFC
Near Field Communication
168
NGFW
Next-generation Firewall
169
NIDS
Network-based Intrusion Detection System
170
NIPS
Network-based Intrusion Prevention System
171
NIST
National Institute of Standards & Technology
172
NTFS
New Technology File System
173
NTLM
New Technology LAN Manager
174
NTP
Network Transfer Protocol
175
OAUTH
Open Authorization
176
OCSP
Online Certificate Status Protocol
177
OID
Object Identifier
178
OS
Operating System
179
OSINT
Open-source Intelligence
180
OSPF
Open Shortest Path First
181
OT
Operational Technology
182
OTA
Over the Air
183
OVAL
Open Vulnerability Assessment Language
184
P12
PKCS #12
185
P2P
Peer to Peer
186
PaaS
Platform as a Service
187
PAC
Proxy Auto Configuration
188
PAM
Privileged Access Management/Pluggable Authentication Modules
189
PAP
Password Authentication Protocol
190
PAT
Port Address Translation
191
PBKDF2
Password-based Key Derivation Function 2
192
PBX
Private Branch Exchange
193
PCAP
Packet Capture
194
PCI DSS
Payment Card Industry Data Security Standard
195
PDU
Power Distribution Unit
196
PEAP
Protected Extensible Authentication Protocol
197
PED
Personal Electronic Device
198
PEM
Privacy Enhanced Mail
199
PFS
Perfect Forward Secrecy
200
PGP
Pretty Good Privacy
201
PHI
Personal Health Information
202
PII
Personally Identifiable Information
203
PIV
Personal Identity Verification
204
PKCS
Public Key Cryptography Standards
205
PKI
Public Key Infrastructure
206
POP
Post Office Protocol
207
POTS
Plain Old Telephone Service
208
PPP
Point-to-Point Protocol
209
PPTP
Point-to-Point Tunneling Protocol
210
PSK
Pre-shared Key
211
PTZ
Pan-tilt-zoom
212
PUP
Potentially Unwanted Program
213
RA
Recovery Agent/ Registration Authority
214
RACE
research and Development in Advanced Communications Technologies in Europe
215
RAD
Rapid Application Development
216
RADIUS
Remote Authentication Dial-in User Service
217
RAID
Redundant Array of Inexpensive Disks
218
RAS
Remote Access Server
219
RAT
Remote Access Trojan
220
RBAC
Role-based Access Control/ Rule-based Access Control
221
RC4
Rivest Cipher version 4
222
RDP
Remote Desktop Protocol
223
RFID
Radio Frequency Identifier
224
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
225
ROI
Return on Investment
226
RPO
Recovery Point Objective
227
RSA
Rivest, Shamir, & Adleman
228
RTBH
Remotely Triggered Black Hole
229
RTO
Recovery Time Objective
230
RTOS
Real-time Operating System
231
RTP
Real-time Transport Protocol
232
S/MIME
Secure/Multipurpose Internet Mail Extensions
233
SaaS
Software as a Service
234
SAE
Simultaneous Authentication of Equals
235
SAML
Security Assertions Markup Language
236
SAN
Storage Area Network/Subject Alternative Name
237
SASE
Secure Access Service Edge
238
SCADA
Supervisory Control and Data Acquisition
239
SCAP
Security Content Automation Protocol
240
SCEP
Simple Certificate Enrollment Protocol
241
SD-WAN
Software-defined Wide Area Network
242
SDK
Software Development Kit
243
SDLC
Software Development Lifecycle
244
SDLM
Software Development Lifecycle Methodology
245
SDN
Software-defined Networking
246
SE
Linux Security-enhanced Linux
247
SED
Self-encrypting Drives
248
SEH
Structured Exception Handler
249
SFTP
Secured File Transfer Protocol
250
SHA
Secure Hashing Algorithm
251
SHTTP
Secure Hypertext Transfer Protocol
252
SIEM
Security Information and Event Management
253
SIM
Subscriber Identity Module
254
SLA
Service-level Agreement
255
SLE
Single Loss Expectancy
256
SMB
Server Message Block
257
SMS
Short Message Service
258
SMTP
Simple Mail Transfer Protocol
259
SMTPS
Simple Mail Transfer Protocol Secure
260
SNMP
Simple Network Management Protocol
261
SOAP
Simple Object Access Protocol
262
SOAR
Security Orchestration, Automation, Response
263
SoC
System on Chip
264
SOC
Security Operations Center
265
SOW
Statement of Work
266
SPF
Sender Policy Framework
267
SPIM
Spam over Internet Messaging
268
SQL
Structured Query Language
269
SQLi
SQL Injection
270
SRTP
Secure Real-Time Protocol
271
SSD
Solid State Drive
272
SSH
Secure Shell
273
SSL
Secure Sockets Layer
274
SSO
Single Sign-on
275
STIX
Structured Threat Information eXchange
276
SWG
Secure Web Gateway
277
TACACS+
Terminal Access Controller Access Control System
278
TAXII
Trusted Automated eXchange of Indicator Information
279
TCP/IP
Transmission Control Protocol/Internet Protoco
280
TGT
Ticket Granting Ticket
281
TKIP
Temporal Key Integrity Protocol
282
TLS
Transport Layer Security
283
TOC
Time-of-check
284
TOTP
Time-based One-time Password
285
TOU
Time-of-use
286
TPM
Trusted Platform Module
287
TTP
Tactics, Techniques, and Procedures
288
TSIG
Transaction Signature
289
UAT
User Acceptance Testing
290
UAV
Unmanned Aerial Vehicle
291
UBA
User Behavior Analytics
292
UDP
User Datagram Protocol
293
UEFI
Unified Extensible Firmware Interface
294
UEM
Unified Endpoint Management
295
UPS
Uninterruptible Power Supply
296
URI
Uniform Resource Identifier
297
URL
Universal Resource Locator
298
USB
Universal Serial Bus
299
USB OTG
USB On the Go
300
UTM
Unified Threat Management
301
UTP
Unshielded Twisted Pair
302
VBA
Visual Basic
303
VDE
Virtual Desktop Environment
304
VDI
Virtual Desktop Infrastructure
305
VLAN
Virtual Local Area Network
306
VLSM
Variable Length Subnet Masking
307
VM
Virtual Machine
308
VoIP
Voice over IP
309
VPC
Virtual Private Cloud
310
VPN
Virtual Private Network
311
VTC
Video Teleconferencing
312
WAF
Web Application Firewall
313
WAP
Wireless Access Point
314
WEP
Wired Equivalent Privacy
315
WIDS
Wireless Intrusion Detection System
316
WIPS
Wireless Intrusion Prevention System
317
WO
Work Order WPA Wi-Fi Protected Access
318
WPS
Wi-Fi Protected Setup
319
WTLS
Wireless TLS
320
XDR
Extended Detection and Response
321
XML
Extensible Markup Language
322
XOR
Exclusive Or
323
XSRF
Cross-site Request Forgery
324
XSS
Cross-site Scripting