Abbreviations Flashcards
Learn the abbreviations for the terms
XSS
Cross site scripting
Enables attackers to inject client side scripts into webpages viewed by other users
PHP
Hypertext Pre-processor
RCE
Remote Code Execution
C2
Command and control
KDC
Key Distribution Centre
TGT
Ticket Granting Ticket
AS-REQ
Authentication Service Request
AS-REP
Authentication Service Reply
SAM
Security Account Manager
LLMNR
Local Link Multicast Name Resolution
RCE
Remote Code Execution
RFI
Remote File Inclusion
3DES
Triple Digital Encryption Standard
AAA
Authentication, Authorisation and Accounting
ACL
Access Control List
AES
Advancce Encryption Standard
AES256
Advance Encryption standards 256bit
AH
Authentication Header
ALE
Authorised Loss Expectancy
AP
Access Point
API
Application Programming Interface
APT
Advance Persistent Threat
ASP
Application Service Provider
ARO
Annualised Rate of Occurrence
ARP
Address Resolution Protocol
AUP
Acceptable Use Policy
BAC
Business Availability Canter
BCP
Business Continuity Planning
BIA
Business impact analysis 
BIOS
Basic input/output system
BPA
Business partners agreement
BYOD
Bring your own device
CA
Certificate authority
CAC
Common access card
CAN
Controller area network
CAPTCHA
Completely automated public touring test to tell computers and humans apart
CAR
Corrective action report
CCMP
Counter mode/CBC Mac protocol
CCTV
Closed circuit television
CERT
Computer emergency response Team
CHAP
Challenge handshake authentication protocol
CIO
Chief information officer
CIRT
Computer incident response Team
COOP
Continuity of operation planning
CP
Contingency planning
CRC
Cyclical redundancy check
CRL
Certification revocation list
CSR
Control status register
CSU
Channel service unit
CTO
Chief technology officer
DAC
Discretionary access control
DBA
Database administrator
DDOS
Distributor denial of service
DEP
Data execution prevention
DES
Digital encryption standard
DHCP
Dynamic host configuration protocol
DHE
Data handling electronics
DLL
Dynamic link library
DLP
Data loss prevention
DMZ
Demilitarised zone
DNAT
Destination network address transaction
DNS
Domain name service (server)
DOS
Denial of service
DRP
Disaster recovery plan
DSA
Digital signature algorithm
DSL
Digital subscriber line
DSU
Data service unit
EAP
Extensible authentication protocol
ECC
Elliptic curve cryptography
EFS
Encrypted file system
EMI
Electromagnetic interference
ESN
Electronic serial number
ESP
Encapsulated security payload
FACL
File system access control list
FDE
Full disc encryption
FTP
File transfer protocol
FTPS
Secure file transfer protocol
GPG
GNU privacy guard
GPO
Group policy object
GPS
Global positioning system
GPU
Graphical processing unit
GRE
Generic routing encapsulation
HDD
Hard disk drive
HIDS
Host based intrusion detection system
HIPS
Host based intrusion prevention system
HMAC
Hashed Message Authentication Code
HOTP
HMAC based one time password
HSM
Hardware security module
HTML
Hypertext Markup language
HTTP
Hypertext transfer protocol
HTTPS
Hyper transfer protocol over SSL
HVAC
Heating ventilation air conditioning
IaaS
Infrastructure as a service
ICMP
Internet control message protocol
IDS 
Intrusion detection system
IKE
Internet key exchange
IMAP4
Internet message access protocol V4
IP
Internet protocol
IPSEC
Internet protocol security
IR
Incident response
IRC
Internet relay chat 
IRP
Incident response procedure
ISA
Interconnection security agreement
ISP
Internet service provider
ISSO
Information systems security officer
ITCP
IT contingency plan
IV
Initialisation vector
IV
Initialisation vector
L2TP
Layer 2 tunnelling protocol
LDAP
Lightweight directory access protocol
LEAP
Lightweight extensible authentication protocol
Maas
Monitoring as a service
Maas
Monitoring as a service
MAC
Mandatory access control/media access control
MAC
Mandatory access control/media access control
MAN
Metropolitan area network
MBR
Master boot record
MD5
Message digest five
MPLS
Multi protocol layer switch
MSCHAP
Microsoft challenge handshake authentication
MTBF
Meantime between failures
MTTR
Meantime to recover
MTTF
Meantime to failure
MTU
Maximum transmission unit
NAC
Network access control
NAT
Network address translation
NDA
Non-disclosure agreement
NFC
Near field communication
NIDS
Network based intrusion detection system
NIPS
Network based intrusion prevention system
NIST
National Institute of standards and technology
NOS
Network operating system
NFTS
New technology file system
NTLM
New technology LANMAN
NTP
Network time protocol
OCSP
Online certificate status protocol
OLA
Open license agreement
OS
Operating system
OVAL
Open vulnerability assessment language
OWASP
Open Webb application security project
P2P
Peer to peer
PAC
Proxy auto configuration
PAM
Pluggable authentication modules
PAP
Password authentication protocol
PAT
Port address translation
PASTA
Process for attack simulation and threat analysis
PBKDF2
Password based key derivation function two
PBX
Private branch exchange
PCAP
Packet capture
PEAP
Protected extensible authentication protocol
PED
Personal electronic device
PGP
Pretty good privacy
PII
Personally identifiable information
PIV
Personal identity verification
PKI
Public key infrastructure
PPP
Point to point protocol
PPTP
Point to point tunnelling protocol
PSK
Pre-shared key
RA
Recovery agent
RAD
Rapid application development
RADIUS
Remote authentication dial in user service
RAID
Redundant array of inexpensive discs
RAS
Remote access server
RBAC
Role -based access control /rule-based access control
RC4
RSA variable key size encryption algorithm
RIPEMD
RACE integrity primitives evaluation message digest
ROI
Return of investment
RPO
Recovery point objective
RTO
Recovery time objective
RTP
Real-time transport protocol
S/MIME
Secure/multipurpose Internet Mail extensions
SAML
Security assertions markup language
SaaS
Software as a service
SAN
Storage area network
SCADA
System control and data acquisition
SCAP
Security content automation protocol
SCEP
Simple certificate enrolment protocol
SCSI
Small computer system interface
SDLC
Software development life cycle
SDLM
Software development life cycle methodology
SEH
Structured exception handler
SHA
Secure hashing algorithm
SFTP
Secured file transfer protocol
SHTTP
Secure hypertext transfer protocol
SIEM
Security information and event management
SIM
Subscriber identity module
SLA
Service level agreement
SLE
Single loss expectancy
SMTP
Simple mail transfer protocol
SNMP
Simple network management protocol
SOAP
Simple object access protocol
SONET
 synchronous optical network technologies
SPIM
Spam over Internet messaging
SQL
Structured query language
SSD
Solid state Drive
SSH
Secure shell
SSL
Secure sockets layer
SSO
Single sign on
STP
Shielded twisted pair
STRIDE
Spoofing, tampering, repudiation, information disclosure, DoS (denial of service), elevation of privilege
TACACS+
Terminal access controller access control system
TCP/IP
Transmission control protocol/Internet protocol
TKIP
Temporal key integrity protocol
TLS
Transport layer security
TOTP
Time based on one time password
TPM
Trusted platform module
TSIG
Transaction signature
UAT
User acceptance testing
UEFI
Unified extensible firmware interface
UDP
User diagram protocol
UPS
Uninterrupted power supply
URI
Uniform resource identifier
URL
Universal resource locator
USB
Universal serial bus
UTM
Unified threat management
UTP
Unshielded twisted pair
VDI
Visualisation desktop infrastructure
VLAN
Virtual local area network
VOIP
Voice over IP
VPN
Virtual private network
VTC
Video teleconferencing
WAF
Webb application firewall
WAP
Wireless access point
WEP
Wired equivalent privacy
WIDS
Wireless intrusion detection system
WIPS
Wireless intrusion prevention system
WPA
Wireless protected access
WPA2
Wi-Fi protected access 2
WPS
Wi-Fi protected set up
WTLS
Wireless TLS
XML
Extensible markup language
XSRF
Cross site request forgery
EOL
End of Life
EOSL
End of Service Life