Acronnym and Key Words Flashcards
What does CIA stand for in security concepts?
Confidentiality, Integrity, Availability
What does AAA represent in security controls?
Authentication, Authorisation, Accounting
What is RBAC?
Role-Based Access Control
What does MAC stand for?
Mandatory Access Control / Media Access Control
What is DAC?
Discretionary Access Control
What does ABAC represent?
Attribute-Based Access Control
What is an ACL?
Access Control List
What does SoD stand for?
Separation of Duties
What is the Principle of Least Privilege abbreviated as?
PoLP
What does MFA stand for?
Multi-Factor Authentication
What is SSO?
Single Sign-On
What does IdP stand for?
Identity Provider
What does LAN stand for?
Local Area Network
What is WAN?
Wide Area Network
What is a VLAN?
Virtual LAN
What does VPN represent?
Virtual Private Network
What is the full form of IP?
Internet Protocol
What does DNS stand for?
Domain Name System
What is DHCP?
Dynamic Host Configuration Protocol
What does TCP/IP represent?
Transmission Control Protocol / Internet Protocol
What does NAT stand for?
Network Address Translation
What is an IDS?
Intrusion Detection System
What does IPS stand for?
Intrusion Prevention System
What is UTM?
Unified Threat Management
What does SIEM stand for?
Security Information and Event Management
What does DoS represent?
Denial of Service
What is DDoS?
Distributed Denial of Service
What does MITM stand for?
Man-in-the-Middle
What is XSS?
Cross-Site Scripting
What does SQLi represent?
SQL Injection
What is CSRF?
Cross-Site Request Forgery
What does RAT stand for?
Remote Access Trojan
What is APT?
Advanced Persistent Threat
What does CVE stand for?
Common Vulnerabilities and Exposures
What is CVSS?
Common Vulnerability Scoring System
What does PKI stand for?
Public Key Infrastructure
What is SSL/TLS?
Secure Sockets Layer / Transport Layer Security
What does AES stand for?
Advanced Encryption Standard
What is RSA?
Rivest–Shamir–Adleman
What does ECC stand for?
Elliptic Curve Cryptography
What is SHA?
Secure Hash Algorithm
What does HMAC represent?
Hash-Based Message Authentication Code
What is XOR?
Exclusive OR
What does LDAP stand for?
Lightweight Directory Access Protocol
What is SAML?
Security Assertion Markup Language
What does OAuth represent?
Open Authorisation
What is OIDC?
OpenID Connect
What is Kerberos?
Authentication protocol using tickets
What does RADIUS stand for?
Remote Authentication Dial-In User Service
What is TACACS+?
Terminal Access Controller Access-Control System Plus
What does GDPR represent?
General Data Protection Regulation
What is HIPAA?
Health Insurance Portability and Accountability Act
What does PCI DSS stand for?
Payment Card Industry Data Security Standard
What is NIST?
National Institute of Standards and Technology
What does ISO stand for?
International Organisation for Standardisation
What is SOC 2?
Service Organisation Control 2
What does SLA represent?
Service-Level Agreement
What is an MOU?
Memorandum of Understanding
What does BPA stand for?
Business Partnership Agreement
What is an NDA?
Non-Disclosure Agreement
What does BCP represent?
Business Continuity Plan
What is a DRP?
Disaster Recovery Plan
What does EDR stand for?
Endpoint Detection and Response
What is DLP?
Data Loss Prevention
What does CASB represent?
Cloud Access Security Broker
What is MDM?
Mobile Device Management
What does SOAR stand for?
Security Orchestration, Automation and Response
What is NGFW?
Next-Generation Firewall
What does WAF represent?
Web Application Firewall
What does SDLC stand for?
Software Development Life Cycle
What is CI/CD?
Continuous Integration / Continuous Delivery
What does MITRE ATT&CK represent?
Adversarial Tactics, Techniques & Common Knowledge
What does OWASP stand for?
Open Web Application Security Project
What is NIST CSF?
NIST Cybersecurity Framework
What does the acronym AAA stand for?
Authentication, Authorization, and Accounting
What is an ACL?
Access Control List
What does AES stand for?
Advanced Encryption Standard
What is AES-256?
Advanced Encryption Standards 256bit
What does AH stand for?
Authentication Header
What is the full form of AI?
Artificial Intelligence
What does AIS stand for?
Automated Indicator Sharing
What is ALE?
Annualized Loss Expectancy
What does AP stand for?
Access Point
What is an API?
Application Programming Interface
What does APT stand for?
Advanced Persistent Threat
What is ARO?
Annualized Rate of Occurrence
What does ARP stand for?
Address Resolution Protocol
What is ASLR?
Address Space Layout Randomization
What does ATT&CK stand for?
Adversarial Tactics, Techniques, and Common Knowledge
What is an AUP?
Acceptable Use Policy
What does AV stand for?
Antivirus
What is BASH?
Bourne Again Shell
What does BCP stand for?
Business Continuity Planning
What is BGP?
Border Gateway Protocol
What does BIA stand for?
Business Impact Analysis
What is BIOS?
Basic Input/Output System
What does BPA stand for?
Business Partners Agreement
What is a BPDU?
Bridge Protocol Data Unit
What does BYOD stand for?
Bring Your Own Device
What is a CA?
Certificate Authority
What does CAPTCHA stand for?
Completely Automated Public Turing Test to Tell Computers and Humans Apart
What is a CAR?
Corrective Action Report
What does CASB stand for?
Cloud Access Security Broker
What is CBC?
Cipher Block Chaining
What does CCMP stand for?
Counter Mode/CBC-MAC Protocol
What is CCTV?
Closed-circuit Television
What does CERT stand for?
Computer Emergency Response Team
What is CFB?
Cipher Feedback
What does CHAP stand for?
Challenge Handshake Authentication Protocol
What does CIA stand for?
Confidentiality, Integrity, Availability
What is a CIO?
Chief Information Officer
What does CIRT stand for?
Computer Incident Response Team
What is CMS?
Content Management System
What does COOP stand for?
Continuity of Operation Planning
What is COPE?
Corporate Owned, Personally Enabled
What does CP stand for?
Contingency Planning
What is CRC?
Cyclical Redundancy Check
What does CRL stand for?
Certificate Revocation List
What is a CSO?
Chief Security Officer
What does CSP stand for?
Cloud Service Provider
What is CSR?
Certificate Signing Request
What does CSRF stand for?
Cross-site Request Forgery
What is a CSU?
Channel Service Unit
What does CTM stand for?
Counter Mode
What is a CTO?
Chief Technology Officer
What does CVE stand for?
Common Vulnerability Enumeration
What is CVSS?
Common Vulnerability Scoring System
What does CYOD stand for?
Choose Your Own Device
What is DAC?
Discretionary Access Control
What does DBA stand for?
Database Administrator
What is DDOS?
Distributed Denial of Service
What does DEP stand for?
Data Execution Prevention
What is DES?
Digital Encryption Standard
What does DHCP stand for?
Dynamic Host Configuration Protocol
What is DHE?
Diffie-Hellman Ephemeral
What does DKIM stand for?
DomainKeys Identified Mail
What is a DLL?
Dynamic Link Library
What does DLP stand for?
Data Loss Prevention
What is DMARC?
Domain Message Authentication Reporting and Conformance
What does DNAT stand for?
Destination Network Address Translation
What is DNS?
Domain Name System
What does DoS stand for?
Denial of Service
What is a DPO?
Data Privacy Officer
What does DRP stand for?
Disaster Recovery Plan
What is DSA?
Digital Signature Algorithm
What does DSL stand for?
Digital Subscriber Line
What is EAP?
Extensible Authentication Protocol
What does ECB stand for?
Electronic Code Book
What is ECC?
Elliptic Curve Cryptography
What does ECDHE stand for?
Elliptic Curve Diffie-Hellman Ephemeral
What is ECDSA?
Elliptic Curve Digital Signature Algorithm
What does EDR stand for?
Endpoint Detection and Response
What is EFS?
Encrypted File System
What does ERP stand for?
Enterprise Resource Planning
What is ESN?
Electronic Serial Number
What does ESP stand for?
Encapsulated Security Payload
What is FACL?
File System Access Control List
What does FDE stand for?
Full Disk Encryption
What is FIM?
File Integrity Management
What does FPGA stand for?
Field Programmable Gate Array
What is FRR?
False Rejection Rate
What does FTP stand for?
File Transfer Protocol
What is FTPS?
Secured File Transfer Protocol
What does GCM stand for?
Galois Counter Mode
What is GDPR?
General Data Protection Regulation
What does GPG stand for?
Gnu Privacy Guard
What is GPO?
Group Policy Object
What does GPS stand for?
Global Positioning System
What is a GPU?
Graphics Processing Unit
What does GRE stand for?
Generic Routing Encapsulation
What is HA?
High Availability
What does HDD stand for?
Hard Disk Drive
What is HIDS?
Host-based Intrusion Detection System
What does HIPS stand for?
Host-based Intrusion Prevention System
What is HMAC?
Hashed Message Authentication Code
What does HOTP stand for?
HMAC-based One-time Password
What is HSM?
Hardware Security Module
What does HTML stand for?
Hypertext Markup Language
What is HTTP?
Hypertext Transfer Protocol
What does HTTPS stand for?
Hypertext Transfer Protocol Secure
What is HVAC?
Heating, Ventilation Air Conditioning
What does IaaS stand for?
Infrastructure as a Service
What is IaC?
Infrastructure as Code
What does IAM stand for?
Identity and Access Management
What is ICMP?
Internet Control Message Protocol
What does ICS stand for?
Industrial Control Systems
What is IDEA?
International Data Encryption Algorithm
What does IDF stand for?
Intermediate Distribution Frame
What is IdP?
Identity Provider
What does IDS stand for?
Intrusion Detection System
What is IEEE?
Institute of Electrical and Electronics Engineers
What does IKE stand for?
Internet Key Exchange
What is IM?
Instant Messaging
What does IMAP stand for?
Internet Message Access Protocol
What is IoC?
Indicators of Compromise
What does IoT stand for?
Internet of Things
What is IP?
Internet Protocol
What does IPS stand for?
Intrusion Prevention System
What is IPSec?
Internet Protocol Security
What does IR stand for?
Incident Response
What is IRC?
Internet Relay Chat
What does IRP stand for?
Incident Response Plan
What is ISO?
International Standards Organization
What does ISP stand for?
Internet Service Provider
What is ISSO?
Information Systems Security Officer
What does IV stand for?
Initialization Vector
What is KDC?
Key Distribution Center
What does KEK stand for?
Key Encryption Key
What is L2TP?
Layer 2 Tunneling Protocol
What does LAN stand for?
Local Area Network
What is LDAP?
Lightweight Directory Access Protocol
What does LEAP stand for?
Lightweight Extensible Authentication Protocol
What is MaaS?
Monitoring as a Service
What does MAC stand for?
Mandatory Access Control
What does MAC also refer to?
Media Access Control
What is another meaning of MAC?
Message Authentication Code
What does MAN stand for?
Metropolitan Area Network
What is MBR?
Master Boot Record
What does MD5 stand for?
Message Digest 5
What is MDF?
Main Distribution Frame
What does MDM stand for?
Mobile Device Management
What is MFA?
Multifactor Authentication
What does MFD stand for?
Multifunction Device
What is MFP?
Multifunction Printer
What does ML stand for?
Machine Learning
What is MMS?
Multimedia Message Service
What does MOA stand for?
Memorandum of Agreement
What is MOU?
Memorandum of Understanding
What does MPLS stand for?
Multi-protocol Label Switching
What is MSA?
Master Service Agreement
What does MSCHAP stand for?
Microsoft Challenge Handshake Authentication Protocol
What is MSP?
Managed Service Provider
What does MSSP stand for?
Managed Security Service Provider
What is MTBF?
Mean Time Between Failures
What does MTTF stand for?
Mean Time to Failure
What is MTTR?
Mean Time to Recover
What does MTU stand for?
Maximum Transmission Unit
What is NAC?
Network Access Control
What does NAT stand for?
Network Address Translation
What is NDA?
Non-disclosure Agreement
What does NFC stand for?
Near Field Communication
What is NGFW?
Next-generation Firewall
What does NIDS stand for?
Network-based Intrusion Detection System
What is NIPS?
Network-based Intrusion Prevention System
What does NIST stand for?
National Institute of Standards & Technology
What is NTFS?
New Technology File System
What does NTLM stand for?
New Technology LAN Manager
What is NTP?
Network Time Protocol
What does OAUTH stand for?
Open Authorization
What is OCSP?
Online Certificate Status Protocol
What does OID stand for?
Object Identifier
What is OS?
Operating System
What does OSINT stand for?
Open-source Intelligence
What is OSPF?
Open Shortest Path First
What does OT stand for?
Operational Technology
What is OTA?
Over the Air
What does OVAL stand for?
Open Vulnerability Assessment Language
What is P12?
PKCS #12
What does P2P stand for?
Peer to Peer
What is PaaS?
Platform as a Service
What does PAC stand for?
Proxy Auto Configuration
What is PAM?
Privileged Access Management
What is another meaning of PAM?
Pluggable Authentication Modules
What does PAP stand for?
Password Authentication Protocol
What is PAT?
Port Address Translation
What does PBKDF2 stand for?
Password-based Key Derivation Function 2
What is PBX?
Private Branch Exchange
What does PCAP stand for?
Packet Capture
What is PCI DSS?
Payment Card Industry Data Security Standard
What does PDU stand for?
Power Distribution Unit
What is PEAP?
Protected Extensible Authentication Protocol
What does PED stand for?
Personal Electronic Device
What is PEM?
Privacy Enhanced Mail
What does PFS stand for?
Perfect Forward Secrecy
What is PGP?
Pretty Good Privacy
What does PHI stand for?
Personal Health Information
What is PII?
Personally Identifiable Information
What does PIV stand for?
Personal Identity Verification
What is PKCS?
Public Key Cryptography Standards
What does PKI stand for?
Public Key Infrastructure
What is POP?
Post Office Protocol
What does POTS stand for?
Plain Old Telephone Service
What is PPP?
Point-to-Point Protocol
What does PPTP stand for?
Point-to-Point Tunneling Protocol
What is PSK?
Pre-shared Key
What does PTZ stand for?
Pan-tilt-zoom
What is PUP?
Potentially Unwanted Program
What does RA stand for?
Recovery Agent
What is another meaning of RA?
Registration Authority
What does RACE stand for?
Research and Development in Advanced Communications Technologies in Europe
What is RAD?
Rapid Application Development
What does RADIUS stand for?
Remote Authentication Dial-in User Service
What is RAID?
Redundant Array of Inexpensive Disks
What does RAS stand for?
Remote Access Server
What is RAT?
Remote Access Trojan
What does RBAC stand for?
Role-based Access Control
What is another meaning of RBAC?
Rule-based Access Control
What is RC4?
Rivest Cipher version 4
What does RDP stand for?
Remote Desktop Protocol
What is RFID?
Radio Frequency Identifier
What does RIPEMD stand for?
RACE Integrity Primitives Evaluation Message Digest
What is ROI?
Return on Investment
What does RPO stand for?
Recovery Point Objective
What is RSA?
Rivest, Shamir, & Adleman
What does RTBH stand for?
Remotely Triggered Black Hole
What is RTO?
Recovery Time Objective
What does RTOS stand for?
Real-time Operating System
What is RTP?
Real-time Transport Protocol
What does S/MIME stand for?
Secure/Multipurpose Internet Mail Extensions
What is SaaS?
Software as a Service
What does SAE stand for?
Simultaneous Authentication of Equals
What is SAML?
Security Assertions Markup Language
What does SAN stand for?
Storage Area Network
What is another meaning of SAN?
Subject Alternative Name
What does SASE stand for?
Secure Access Service Edge
What is SCADA?
Supervisory Control and Data Acquisition
What does SCAP stand for?
Security Content Automation Protocol
What is SCEP?
Simple Certificate Enrollment Protocol
What does SD-WAN stand for?
Software-defined Wide Area Network
What is SDK?
Software Development Kit
What does SDLC stand for?
Software Development Lifecycle
What is SDLM?
Software Development Lifecycle Methodology
What does SDN stand for?
Software-defined Networking
What is SE Linux?
Security-enhanced Linux
What does SED stand for?
Self-encrypting Drives
What is SEH?
Structured Exception Handler
What does SFTP stand for?
Secured File Transfer Protocol
What is SHA?
Secure Hashing Algorithm
What does SHTTP stand for?
Secure Hypertext Transfer Protocol
What is SIEM?
Security Information and Event Management
What does SIM stand for?
Subscriber Identity Module
What is SLA?
Service-level Agreement
What does SLE stand for?
Single Loss Expectancy
What is SMS?
Short Message Service
What does SMTP stand for?
Simple Mail Transfer Protocol
What is SMTPS?
Simple Mail Transfer Protocol Secure
What does SNMP stand for?
Simple Network Management Protocol
What is SOAP?
Simple Object Access Protocol
What does SOAR stand for?
Security Orchestration, Automation, Response
What is SoC?
System on Chip
What does SOC stand for?
Security Operations Center
What is SOW?
Statement of Work
What does SPF stand for?
Sender Policy Framework
What is SPIM?
Spam over Internet Messaging
What does SQL stand for?
Structured Query Language
What is SQLI?
SQL Injection
What does SRTP stand for?
Secure Real-Time Protocol
What is SSD?
Solid State Drive
What does SSH stand for?
Secure Shell
What is SSL?
Secure Sockets Layer
What does SSO stand for?
Single Sign-on
What is STIX?
Structured Threat Information eXchange
What does SWG stand for?
Secure Web Gateway
What is TACACS+?
Terminal Access Controller Access Control System
What does TAXII stand for?
Trusted Automated eXchange of Indicator Information
What is TCP/IP?
Transmission Control Protocol/Internet Protocol
What does TGT stand for?
Ticket Granting Ticket
What is TKIP?
Temporal Key Integrity Protocol
What does TLS stand for?
Transport Layer Security
What is TOC?
Time-of-check
What does TOTP stand for?
Time-based One-time Password
What is TOU?
Time-of-use
What does TPM stand for?
Trusted Platform Module
What is TTP?
Tactics, Techniques, and Procedures
What does TSIG stand for?
Transaction Signature
What is UAT?
User Acceptance Testing
What does UAV stand for?
Unmanned Aerial Vehicle
What is UDP?
User Datagram Protocol
What does UEFI stand for?
Unified Extensible Firmware Interface
What is UEM?
Unified Endpoint Management
What does UPS stand for?
Uninterruptable Power Supply
What is URI?
Uniform Resource Identifier
What does URL stand for?
Universal Resource Locator
What is USB?
Universal Serial Bus
What does USB OTG stand for?
USB On the Go
What is UTM?
Unified Threat Management
What does UTP stand for?
Unshielded Twisted Pair
What is VBA?
Visual Basic
What does VDE stand for?
Virtual Desktop Environment
What is VDI?
Virtual Desktop Infrastructure
What does VLAN stand for?
Virtual Local Area Network
What is VLSM?
Variable Length Subnet Masking
What does VM stand for?
Virtual Machine
What is VoIP?
Voice over IP
What does VPC stand for?
Virtual Private Cloud
What is VPN?
Virtual Private Network
What does VTC stand for?
Video Teleconferencing
What is WAF?
Web Application Firewall
What does WAP stand for?
Wireless Access Point
What is WEP?
Wired Equivalent Privacy
What does WIDS stand for?
Wireless Intrusion Detection System
What is WIPS?
Wireless Intrusion Prevention System
What does WO stand for?
Work Order
What is WPA?
Wi-Fi Protected Access
What does WPS stand for?
Wi-Fi Protected Setup
What is WTLS?
Wireless TLS
What does XDR stand for?
Extended Detection and Response
What is XML?
Extensible Markup Language
What does XOR stand for?
Exclusive Or
What is XSRF?
Cross-site Request Forgery
What does XSS stand for?
Cross-site Scripting