Acronym Flashcards
Acronym: IDS
Full Form: Intrusion Detection System
Definition: A system that monitors network traffic for suspicious activity and alerts the user or administrator.
Acronym: SIEM
Full Form: Security Information and Event Management
Definition: A system that provides real-time analysis of security alerts generated by applications and network hardware.
Acronym: IPS
Full Form: Intrusion Prevention System
Definition: A security solution that detects and prevents identified threats in real-time, often working in conjunction with an IDS.
Acronym: VPN
Full Form: Virtual Private Network
Definition: A service that encrypts your internet connection and hides your IP address to enhance privacy and security online.
Acronym: DDoS
Full Form: Distributed Denial of Service
Definition: A cyber-attack where multiple systems flood the bandwidth or resources of a targeted system, usually a web server.
Acronym: SSL
Full Form: Secure Sockets Layer
Definition: A protocol for establishing authenticated and encrypted links between networked computers.
Acronym: TLS
Full Form: Transport Layer Security
Definition: A cryptographic protocol that provides secure communication over a computer network, the successor of SSL.
Acronym: SOC
Full Form: Security Operations Center
Definition: A centralized unit that deals with security issues on an organizational and technical level.
Acronym: MFA
Full Form: Multi-Factor Authentication
Definition: A security system that requires more than one method of authentication from independent categories of credentials.
Acronym: APT
Full Form: Advanced Persistent Threat
Definition: A stealthy attack in which a person or group gains unauthorized access to a network and remains undetected for an extended period.
Acronym: FIM
Full Form: File Integrity Monitoring
Definition: A technology that monitors and detects changes in files that may indicate a security breach or malicious activity.
Acronym: CVE
Full Form: Common Vulnerabilities and Exposures
Definition: A list of publicly disclosed computer security flaws, each assigned an identifier by a unique number.
Acronym: IAM
Full Form: Identity and Access Management
Definition: A framework of policies and technologies that ensure the right individuals access the right resources at the right times for the right reasons.
Acronym: CISO
Full Form: Chief Information Security Officer
Definition: A senior-level executive responsible for establishing and maintaining the enterprise’s strategy and program to protect information assets.
Acronym: PFS
Full Form: Perfect Forward Secrecy
Definition: A property of secure communication protocols in which session keys cannot be compromised even if the private key of the server is compromised.
Acronym: RSA
Full Form: Rivest-Shamir-Adleman
Definition: An encryption algorithm widely used for securing sensitive data, especially during transmission over the internet.
Acronym: WAF
Full Form: Web Application Firewall
Definition: A security solution that protects web applications by filtering and monitoring HTTP traffic between a web application and the Internet.
Acronym: BYOD
Full Form: Bring Your Own Device
Definition: A policy that allows employees to use their personal devices to connect to the company’s network and access work-related systems.
Acronym: SOC 2
Full Form: System and Organization Controls 2
Definition: A framework for managing and auditing a service provider’s handling of data, based on five principles: security, availability, processing integrity, confidentiality, and privacy.
Acronym: PKI
Full Form: Public Key Infrastructure
Definition: A set of roles, policies, and procedures to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
Acronym: DNS
Full Form: Domain Name System
Definition: A system that translates domain names into IP addresses so browsers can load Internet resources.
Acronym: MITM
Full Form: Man-in-the-Middle
Definition: A type of cyberattack where the attacker secretly intercepts and relays communications between two parties who believe they are directly communicating with each other.
Acronym: DoS
Full Form: Denial of Service
Definition: An attack that attempts to make a machine or network resource unavailable to its intended users by overwhelming it with traffic.
Acronym: ISO
Full Form: International Organization for Standardization
Definition: An independent, non-governmental organization that develops and publishes international standards, including those for information security (e.g., ISO 27001).
Acronym: PII
Full Form: Personally Identifiable Information
Definition: Any information that can be used to distinguish or trace an individual’s identity, such as name, Social Security number, or biometric records.
Acronym: HIDS
Full Form: Host-based Intrusion Detection System
Definition: A system that monitors and analyzes the internals of a computing system for suspicious activities, such as unauthorized changes to system files.
Acronym: NIDS
Full Form: Network-based Intrusion Detection System
Definition: A system that monitors network traffic for suspicious activity and alerts administrators of potential threats.
Acronym: MAC
Full Form: Mandatory Access Control
Definition: A security model where access to system resources is determined by the operating system based on a set of predefined rules and restrictions, typically used in government and military contexts.
Acronym: DAC
Full Form: Discretionary Access Control
Definition: A security model where the owner of the resource controls access, often through Access Control Lists (ACLs).
Acronym: SSO
Full Form: Single Sign-On
Definition: A user authentication process that allows a user to access multiple applications with one set of login credentials.
Acronym: XSS
Full Form: Cross-Site Scripting
Definition: A vulnerability in web applications that allows attackers to inject malicious scripts into webpages viewed by other users.
Acronym: SAST
Full Form: Static Application Security Testing
Definition: A method of analyzing source code to find security vulnerabilities without executing the program.
Acronym: DAST
Full Form: Dynamic Application Security Testing
Definition: A security testing method that assesses an application during runtime to identify vulnerabilities like SQL injection or Cross-Site Scripting.
Acronym: UEBA
Full Form: User and Entity Behavior Analytics
Definition: A system that identifies abnormal behaviors in users and entities within a network, helping to detect insider threats or compromised accounts.
Acronym: EDR
Full Form: Endpoint Detection and Response
Definition: A cybersecurity technology that monitors and responds to potential security incidents on endpoint devices like computers or mobile devices.
Acronym: TTP
Full Form: Tactics, Techniques, and Procedures
Definition: The behavior patterns used by cyber adversaries in their attacks, which can be analyzed to better predict and respond to future incidents.
Acronym: RAT
Full Form: Remote Access Trojan
Definition: A type of malware that provides an attacker with remote control over the infected machine, allowing them to access files, control the system, or install additional malware.
Acronym: GDPR
Full Form: General Data Protection Regulation
Definition: A comprehensive data protection law implemented in the European Union that governs the collection, storage, and use of personal data.
Acronym: SOC
Full Form: Service Organization Control
Definition: A set of reports written by a third-party auditor that details the security, availability, processing integrity, confidentiality, and privacy of an organization’s systems.
Acronym: OWASP
Full Form: Open Web Application Security Project
Definition: A nonprofit organization that provides free resources, including security standards, tools, and best practices to improve the security of software and web applications.