Abbreviations Flashcards

Learn the CCSK abbreviations

1
Q

ABAC

A

Attribute Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AIaaS

A

AI as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AWS

A

Amazon Web Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BC

A

Business Continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BC/DR

A

Business Continuity/Disaster Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BISO

A

Business Information Security officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BSI

A

British Standards Institution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BYOK

A

Bring Your Own Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CAC

A

Cloud Advisory Council

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CAIQ

A

Consensus Assessments Initiative Questionnaire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CASB

A

Cloud Access Security Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CCAK

A

Certificate of Cloud Computing Audit Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CCoE

A

Cloud Center of Excellence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CCM

A

Cloud Control Matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CCPA

A

California Consumer Privacy Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CCSK

A

Certificate of Cloud Security Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

C5

A

Cloud Computing Compliance Criteria Catalog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
CD
Continuous Deployment
25
CDN
Content Delivery Network
26
CDR
Cloud Detection and Response
27
CI
Continuous Integration
28
CI/CD
Continuous Integration/Continuous Deployment
29
CISA
Cybersecurity and Infrastructure Agency
30
CIS
Center for Internet Security
31
CMFA
Continuous Multi Factor Authentication
32
CMEK
Customer Managed Encryption Keys
33
CNAPP
Cloud Native Application Protection Platform
34
COBIT
Control Objectives for Information and related Technology
35
COPPA
Children's Online Privacy Protection Act
36
CSC
Cloud Service Consumer
37
CSA
Cloud Security Alliance
38
CSP
Cloud Service Provider
39
CSPM
Cloud Security Posture Management
40
CSF
Common Security Framework
41
CSMM
Cloud Security Maturity Model
42
CWPP
Cloud Workload Protection Platforms
43
DAAS
Data, Applications, Assets and Services
44
DBaaS
Database as a Service
45
DEK
Data Encryption Keys
46
DevOps
Development and Operations
47
DevSecOps
Development, Security, and Operations
48
DDoS
Distributed Denial of Service
49
DLP
Data Loss Prevention
50
DNS
Domain Name System
51
DoS
Denial of Service
52
DR
Disaster Recovery
53
DRaaS
Disaster Recovery as a Service
54
DRM
Data Rights Management
55
EA
Enterprise Architecture
56
EDR
Endpoint Detection and Response
57
ENISA
European Network and Information Security Agency
58
FIDO
Fast IDentity Online
59
FAIR
Factor Analysis of Information Risk
60
FEDRAMP
Federal Risk and Authorization Management Program
61
GCP
Google Cloud Platform
62
GDPR
General Data Protection Regulation
63
GKE
Google Kubernetes Engine
64
GLBA
Gramm-Leach-Bliley Act
65
GPU
Graphics Processing Unit
66
GV
Govern
67
HIPAA
Health Insurance Portability and Accountability Act
68
HTTP
Hypertext Transfer Protocol
69
IaaS
Infrastructure as a Service
70
IaC
Infrastructure as Code
71
IAM
Identity and Access Management
72
ID
Identity
73
IdM
Identity Management
74
IdP
Identity Provider
75
IDS
Intrusion Detection System
76
IEC
International Electrotechnical Commission
77
IoT
Internet of Things
78
IP
Internet Protocol
79
IPS
Intrusion Prevention System
80
ISACA
Information Systems Audit and Control Association
81
ISO/IEC
International Organization for Standardization / International Electrotechnical CommissionIT
82
IT
Information Technology
83
JIT
Just-In-Time
84
JSON
JavaScript Object Notation
85
KMS
Key Management Service
86
LGPD
Lei Geral de Proteção de Dados
87
LLM
Large Language Model
88
M&A
Mergers and Acquisitions
89
MFA
Multi-Factor Authentication
90
MITRE
MITRE Corporation
91
ML
Machine Learning
92
MLOps
Machine Learning Operations
93
MSP
Managed Service Provider
94
NaaS
Network as a Service
95
NDA
Nondisclosure Agreement
96
NIST
National Institute of Standards and Technology
97
NSG
Network Security Group
98
NACL
Network Access Control List
99
NAT
Network Address Translation
100
OAuth
Open Authorization
101
OASIS
Organization for the Advancement of Structured Information Standards
102
OCI
Oracle Cloud Infrastructure
103
OS
Operating System
104
OSI
Open Systems Interconnection
105
OTP
One-Time Password
106
OT
Operational Technology
107
OWASP
Open Web Application Security Project
108
PaaS
Platform as a ServiceP
109
PAM
Privileged Access Management
110
PBAC
Policy-Based Access Control
111
PCI DSS
Payment Card Industry Data Security Standard
112
PCI SSC
Payment Card Industry Security Standards Council
113
PEP
Policy Enforcement Point
114
PDP
Policy Decision Point
115
PII
Personally Identifiable Information
116
PIM
Privileged Identity Management
117
PR
Protect / Pull Request
118
RACI
Responsible, Accountable, Consulted and Informed
119
RBAC
Role-Based Access Control
120
RC
Recover
121
REST
Representational State Transfer
122
RP
Relying Party
123
RS
Respond
124
S3
Simple Storage Service
125
SaaS
Software as a Service
126
SAML
Security Assertion Markup Language
127
SBOM
Software Bill of Materials
128
SCA
Software Composition Analysis
129
SCIM
System for Cross-Domain Identity Management
130
SASE
Secure Access Service Edge
131
SCP
Service Control Policy
132
SD-WAN
Software Defined Wide Area Network
133
SDN
Software Defined Networking
134
SDP
Software Defined Perimeter
135
SDK
Software Development Kit
136
SIEM
Security Information and Event Management
137
SLA
Service-Level Agreement
138
SME
Subject Matter Expert
139
SMS
Short Message Service
140
SOAR
Security Orchestration, Automation, and Response
141
SOC1
Service Organization Control 1
142
SOC2
Service Organization Control 2
143
SOX
Sarbanes-Oxley Act
144
SP
Special Publication
145
SPI
Service Model tiers Software, Platform, Infrastructure
146
SPIFFE
Security Production Identity Framework For Everyone
147
SRM
Security and Risk Management
148
SSDLC
Secure Software Development Life Cycle
149
SSPM
SaaS Security Posture Management
150
SSRM
Shared Security Responsibility Model
151
SSH
Secure Shell
152
STAR
Security, Trust, Assurance, and Risk
153
SQL
Structured Query Language
154
SSO
Single Sign-On
155
STRIDE
Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service and Elevation of Privilige
156
TLS
Transport Layer Security
157
TOGAF
The Open Group Application Framework
158
TPU
Tensor Processing Unit
159
TSS
Technology Solution Services
160
TTL
Time To Live
161
TVM
Threat and Vulnerability Management
162
UEBA
User and Entity Behavior Analysis
163
VM
Virtual Machine
164
VNet
Virtual Network
165
VPN
Virtual Private Network
166
VPC
Virtual Private Cloud
167
VXLAN
Virtual Extensible Local Area Network
168
WAF
Web Application Firewall
169
WAN
Wide Area Network
170
XACML
eXtensible Access Control Markup Language
171
XaaS
Anything as a Service
172
XML
eXtensible Markup Language
173
ZT
Zero Trust
174
ZTA
Zero Trust Architecture
175
ZTMM
Zero Trust Maturity Model
176
ZTNA
Zero Trust Network Access
177