1.0 Acronyms Flashcards

1
Q

3DES

A

Triple Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES256

A

Advanced Encryption Standards 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BAC

A

Business Availability Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BPDU

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CAC
Common Access Card
26
CAN
Controller Area Network
27
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
28
CAR
Corrective Action Report
29
CBC
Cipher Block Chaining
30
CCMP
Counter-Mode/CBC-Mac Protocol
31
CCTV
Closed-circuit Television
32
CER
Certificate
33
CERT
Computer Emergency Response Team
34
CFB
Cipher Feedback
35
CHAP
Challenge Handshake Authentication Protocol
36
CIO
Chief Information Officer
37
CIRT
Computer Incident Response Team
38
CMS
Content Management System
39
COOP
Continuity of Operations Plan
40
COPE
Corporate Owned, Personally Enabled
41
CP
Contingency Planning
42
CRC
Cyclical Redundancy Check
43
CRL
Certificate Revocation List
44
CSO
Chief Security Officer
45
CSP
Cloud Service Provider
46
CSR
Certificate Signing Request
47
CSRF
Cross-site Request Forgery
48
CSU
Channel Service Unit
49
CTM
Counter-Mode
50
CTO
Chief Technology Officer
51
CTR
Click Through rate
52
CYOD
Choose Your Own Device
53
DAC
Discretionary Access Control
54
DBA
Database Administrator
55
DDoS
Distributed Denial of Service
56
DEP
Data Execution Prevention
57
DER
Distinguished Encoding Rules
58
DES
Digital Encryption Standard
59
DHCP
Dynamic Host Configuration Protocol
60
DHE
Data-Handling Electronics
61
DHE
Diffie-Hellman Ephemeral
62
DLL
Dynamic Link Library
63
DLP
Data Loss Prevention
64
DMZ
Demilitarized Zone
65
DNAT
Destination Network Address Transaction
66
DNS
Domain Name Service (Server)
67
DoS
Denial of Service
68
DRP
Disaster Recovery Plan
69
DSA
Digital Signature Algorithm
70
DSL
Digital Subscriber Line
71
DSU
Data Service Unit
72
EAP
Extensible Authentication Protocol
73
ECB
Electronic Code Book
74
ECC
Elliptic Curve Cryptography
75
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
76
ECDSA
Elliptic Curve Digital Signature Algorithm
77
EFS
Encrypted File System
78
EMI
Electromagnetic Interference
79
EMP
Electro Magnetic Pulse
80
ERP
Enterprise Resource Planning
81
ESN
Electronic Serial Number
82
ESP
Encapsulated Security Payload
83
FACL
File System Access Control List
84
FDE
Full Disk Encryption
85
FRR
False Rejection Rate
86
FTP
File Transfer Protocol
87
FTPS
Secured File Transfer Protocol
88
GCM
Galois Counter Mode
89
GPG
Gnu Privacy Guard
90
GPO
Group Policy Object
91
GPS
Global Positioning System
92
GPU
Graphic Processing Unit
93
GRE
Generic Routing Encapsulation
94
HA
High Availability
95
HDD
Hard Disk Drive
96
HIDS
Host-based Intrusion Detection System
97
HIPS
Host-based Intrusion Prevention System
98
HMAC
Hashed Message Authentication Code
99
HOTP
HMAC-based One-Time Password
100
HSM
Hardware Security Module
101
HTML
Hypertext Markup Language
102
HTTP
Hypertext Transfer Protocol
103
HTTPS
Hypertext Transfer Protocol over SSL/TLS
104
HVAC
Heating, Ventilation and Air Conditioning
105
IaaS
Infrastructure as a Service
106
ICMP
Internet Control Message Protocol
107
ICS
Industrial Control Systems
108
ID
Identification
109
IDEA
International Data Encryption Algorithm
110
IDF
Intermediate Distribution Frame
111
IdP
Identity Provider
112
IDS
Intrusion Detection System
113
IEEE
Institute of Electrical and Electronic Engineers
114
IKE
Internet Key Exchange
115
IM
Instant Messaging
116
IMAP4
Internet Message Access Protocol v4
117
IoT
Internet of Things
118
IP
Internet Protocol
119
IPSec
Internet Protocol Security
120
IR
Incident Response
121
IR
Infrared
122
IRC
Internet Relay Chat
123
IRP
Incident Response Plan
124
ISA
Interconnection Security Agreement
125
ISP
Internet Service Provider
126
ISSO
Information Systems Security Officer
127
ITCP
IT Contingency Plan
128
IV
Initialization Vector
129
KDC
Key Distribution Center
130
KEK
Key Encryption Key
131
L2TP
Layer 2 Tunneling Protocol
132
LAN
Local Area Network
133
LDAP
Lightweight Directory Access Protocol
134
LEAP
Lightweight Extensible Authentication Protocol
135
MaaS
Monitoring as a Service
136
MAC (File security)
Mandatory Access Control
137
MAC (OSI Layer 2 protocol)
Media Access Control
138
MAC (Messaging)
Message Authentication Code
139
MAN
Metropolitan Area Network
140
MBR
Master Boot Record
141
MD5
Message Digest 5
142
MDF
Main Distribution Frame
143
MFD
Multi-function Device
144
MITM
Man-in-the-Middle
145
MMS
Multimedia Message Service
146
MOA
Memorandum of Agreement
147
MOU
Memorandum of Understanding
148
MPLS
Multi-protocol Label Switching
149
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
150
MSP
Managed Service Provider
151
MTBF
Mean Time Between Failures
152
MTTF
Mean Time to Failure
153
MTTR
Mean Time to Recover or Mean Time to Repair
154
MTU
Maximum Transmission Unit
155
NAC
Network Access Control
156
NAT
Network Address Translation
157
NDA
Non-disclosure Agreement
158
NFC
Near Field Communication
159
NIDS
Network-based Intrusion Detection System
160
NIPS
Network-based Intrusion Prevention System
161
NIST
National Institute of Standards & Technology
162
NTFS
New Technology File System
163
NTLM
New Technology LAN Manager
164
NTP
Network Time Protocol
165
OAUTH
Open Authorization
166
OCSP
Online Certificate Status Protocol
167
OID
Object Identifier
168
OS
Operating System
169
OTA
Over The Air
170
OVAL
Open Vulnerability Assessment Language
171
P12
PKCS #12
172
P2P
Peer to Peer
173
PaaS
Platform as a Service
174
PAC
Proxy Auto Configuration
175
PAM
Pluggable Authentication Modules
176
PAP
Password Authentication Protocol
177
PAT
Port Address Translation
178
PBKDF2
Password-based Key Derivation Function 2
179
PBX
Private Branch Exchange
180
PCAP
Packet Capture
181
PEAP
Protected Extensible Authentication Protocol
182
PED
Personal Electronic Device
183
PEM
Privacy-enhanced Electronic Mail
184
PFS
Perfect Forward Secrecy
185
PFX
Personal Exchange Format
186
PGP
Pretty Good Privacy
187
PHI
Personal Health Information
188
PII
Personally Identifiable Information
189
PIV
Personal Identity Verification
190
PKI
Public Key Infrastructure
191
POP
Post Office Protocol
192
POTS
Plain Old Telephone Service
193
PPP
Point-to-Point Protocol
194
PPTP
Point-to-Point Tunneling Protocol
195
PSK
Pre-shared Key
196
PTZ
Pan-Tilt-Zoom
197
RA
Recovery Agent
198
RA
Registration Authority
199
RAD
Rapid Application Development
200
RADIUS
Remote Authentication Dial-in User Server
201
RAID
Redundant Array of Inexpensive Disks
202
RAS
Remote Access Server
203
RAT
Remote Access Trojan
204
RBAC
Role-based Access Control
205
RBAC
Rule-based Access Control
206
RC4
Rivest Cipher version 4
207
RFID
Radio Frequency Identifier
208
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
209
ROI
Return on Investment
210
RPO
Recovery Point Objective
211
RSA
Rivest, Shamir, & Adleman
212
RTBH
Remotely Triggered Black Hole
213
RTO
Recovery Time Objective
214
RTOS
Real-time Operating System
215
RTP
Real-time Transport Protocol
216
S/MIME
Secure/Multipurpose Internet Mail Extensions
217
SaaS
Software as a Service
218
SAML
Security Assertions Markup Language
219
SAN
Storage Area Network
220
SAN
Subject Alternative Name
221
SCADA
System Control and Data Acquisition
222
SCAP
Security Content Automation Protocol
223
SCEP
Simple Certificate Enrollment Protocol
224
SCSI
Small Computer System Interface
225
SDK
Software Development Kit
226
SDLC
Software Development Life Cycle
227
SDLM
Software Development Life Cycle Methodology
228
SDN
Software Defined Network
229
SED
Self-encrypting Drive
230
SEH
Structured Exception Handler
231
SFTP
Secured File Transfer Protocol
232
SHA
Secure Hashing Algorithm
233
SHTTP
Secure Hypertext Transfer Protocol
234
SIEM
Security Information and Event Management
235
SIM
Subscriber Identity Module
236
SLA
Service Level Agreement
237
SLE
Single Loss Expectancy
238
SMS
Short Message Service
239
SMTP
Simple Mail Transfer Protocol
240
SMTPS
Simple Mail Transfer Protocol Secure
241
SNMP
Simple Network Management Protocol
242
SOAP
Simple Object Access Protocol
243
SoC
System on Chip
244
SPIM
Spam over Internet Messaging
245
SQL
Structured Query Language
246
SRTP
Secure Real-Time Protocol
247
SSD
Solid State Drive
248
SSH
Secure Shell
249
SSL
Secure Sockets Layer
250
SSO
Single Sign-on
251
STP
Shielded Twisted Pair
252
TACACS+
Terminal Access Controller Access Control System Plus
253
TCP/IP
Transmission Control Protocol/Internet Protocol
254
TGT
Ticket Granting Ticket
255
TKIP
Temporal Key Integrity Protocol
256
TLS
Transport Layer Security
257
TOTP
Time-based One-time Password
258
TPM
Trusted Platform Module
259
TSIG
Transaction Signature
260
UAT
User Acceptance Testing
261
UAV
Unmanned Aerial Vehicle
262
UDP
User Datagram Protocol
263
UEFI
Unified Extensible Firmware Interface
264
UPS
Uninterruptable Power Supply
265
URI
Uniform Resource Identifier
266
URL
Universal Resource Locator
267
USB
Universal Serial Bus
268
USB OTG
USB On The Go
269
UTM
Unified Threat Management
270
UTP
Unshielded Twisted Pair
271
VDE
Virtual Desktop Environment
272
VDI
Virtual Desktop Infrastructure
273
VLAN
Virtual Local Area Network
274
VLSM
Variable Length Subnet Masking
275
VM
Virtual Machine
276
VoIP
Voice over IP
277
VPN
Virtual Private Network
278
VTC
Video Teleconferencing
279
WAF
Web Application Firewall
280
WAP
Wireless Access Point
281
WEP
Wired Equivalent Privacy
282
WIDS
Wireless Intrusion Detection System
283
WIPS
Wireless Intrusion Prevention System
284
WORM
Write Once Read Many
285
WPA
WiFi Protected Access
286
WPA2
WiFi Protected Access 2
287
WPS
WiFi Protected Setup
288
WTLS
Wireless TLS
289
XML
Extensible Markup Language
290
XOR
Exclusive Or
291
XSRF
Cross-site Request Forgery
292
XSS
Cross-site Scripting