Acronym List Flashcards

1
Q

3DES

A

Triple Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorisation, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AD

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES256

A

Advanced Encryption Standards 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AIS

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ALE

A

Annualised Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARO

A

Annualised Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ASLR

A

Address Space Layout Randomisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASP

A

Active Server Pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BCP

A

Business Continuity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BIOS
Basic Input/Output System
26
BPA
Business Partnership Agreement
27
BPDU
Bridge Protocol Data Unit
28
BSSID
Basic Service Set Identifier
29
CA
Certificate Authority
30
CAPTCHA
Completely automated public turing test to tell computers and humans apart
31
CAR
Corrective Action Report
32
CASB
Cloud Access Security Broker
33
CBC
Cipher Block Chaining
34
CBT
computer-based training
35
CCMP
Counter-Mode/ CBC-MAC Protocol
36
CERT
Computer Emergency Response Team
37
CFB
Cipher Feedback
38
CHAP
Challenge-Handshake Authentication Protocol
39
CIO
Chief Information Officer
40
CIRT
Computer Incident Response Team
41
CIS
Center for Internet Security
42
CMS
Content Management System
43
CN
Common Name
44
COOP
Continuity of Operations Planning
45
COPE
Corporate-Owned Personally Enabled
46
CP
Contingency Planning
47
CRC
Cyclic Redundancy Check
48
CRL
Certificate Revocation List
49
CSA
Cloud Security Alliance
50
CSIRT
Computer Security Incident Response Team
51
CSO
Chief Security Officer
52
CSP
Cloud Service Provider
53
CSR
Certificate Signing Request
54
CSRF
Cross-Site Request Forgery
55
CSU
Channel Service Unit
56
CTM
Counter-Mode
57
CTO
Chief Technology Officer
58
CVE
Common Vulnerabilities and Exposures
59
CVSS
Common Vulnerability Scoring System
60
DAC
Discretionary Access Control
61
DBA
Database Administrator
62
DEP
Data Execution Prevention
63
DER
Distinguished Encoding Rules
64
DES
Data Encryption Standard
65
DHCP
Dynamic Host Configuration Protocol
66
DHE
Diffie-Hellman Ephemeral
67
DKIM
Domain Keys Identified Mail
68
DLL
Dynamic Link Library
69
DMARC
Domain Message Authentication Reporting and Conformance
70
DNAT
Destination Network Address Translation
71
DNSSEC
Domain Name System Security Extensions
72
DPO
Data Protection Officer
73
DRP
Disaster Recovery Plan
74
DSA
Digital Signature Algorithim
75
DSL
Digital Subscriber Line
76
EAP
Extensible Authentication Protocol
77
ECB
Electronic Code Book
78
ECC
Elliptic-curve Cryptography
79
ECDHE
Elliptic-curve Diffie-Hellman Ephermeral
80
ECDSA
Elliptic-curve Digital Signature Algorithm
81
EDR
Endpoint Detection and Response
82
EFS
Encrypted File System
83
EIP
Extended Intrusion Pointer
84
EOL
End of Life
85
EOS
End of Service
86
ERP
Enterprise Resource Planning
87
ESN
Electronic Serial Number
88
ESP
Encapsulating Security Payload
89
ESSID
Extended Service Set Identifier
90
FACL
File System Access Control List
91
FDE
Full Disk Encryption
92
FIM
File Integrity Monitoring
93
FPGA
Field Programmable Gate Array
94
FRR
False Rejection Rate
95
FTPS
File Transfer Protocol Secure
96
GCM
Galois/Counter Mode
97
GDPR
General Data Protection Regulation
98
99
GPO
Group Policy Object
100
GPU
Graphics Processing Unit
101
GRE
Generic Routing Encapsulation
102
HDD
Hard Disk Drive
103
HIDS
Host-based Intrusion Detection System
104
HIPS
Host-based Intrusion Prevention System
105
HMAC
Hash-based Message Authentication Code
106
HOTP
HMAC-based One time Password
107
HSM
Hardware Security Module
108
HSMaaS
Hardware Security Module as a Service
109
HTML
Hypertext Markup Language
110
HVAC
Heating , Ventilation, Air Conditioning
111
IAM
Identity and Access Management
112
ICMP
Internet Control Management Protocol
113
ICS
Industrial Control Systems
114
IDEA
International DAta Encryption Algorithm
115
IDF
Intermediate Distribution Frame
116
IdP
Identity Provider
117
IDS
Intrusion Detection System
118
IEEE
Institute of Electrical and Electronic Engineers
119
IKE
Internet Key Exchange
120
IMAP4
Internet Message Access Protocol v4
121
IoC
Indicators of Compromise
122
IPS
Intrusion Prevention System
123
IR
Incident Response
124
IRC
Internet Relay Chat
125
IRP
Incident Response Plan
126
ISA
Interconnection Security Agreement
127
ISFW
Internal Segmentation Firewall
128
ISO
International Organisation for Standardisation
129
ISSO
Information Systems Security Officer
130
ITCP
IT Contingency Plan
131
IV
Initialisation Vector
132
KDC
Key Distribution Center
133
KEK
Key Encryption Key
134
L2TP
Layer 2 Tunneling Protocol
135
LDAP
Lightweight Directory Access Point
136
LEAP
Lightweight Extensible Authentication Protocol
137
MaaS
Monitoring as a Service
138
MAC
Media Access Control
139
MAM
Media Access Management
140
MBR
Master Boot Record
141
MD5
Message Digest 5
142
MDF
Main Distribution Frame
143
MDM
Mobile Device Management
144
MFD
Multifunction Device
145
MFP
Multifunction Printer
146
ML
Machine Learning
147
MOA
Memorandum of Understanding
148
MPLS
Multiprotocol Label Switching
149
MSA
Measurement Systems Analysis
150
MS-CHAP
Microsoft Challenge-Handshake Authentication Protocol
151
MSP
Managed Service Provider
152
MSSP
Managed Security Service Provider
153
MTBF
Mean Time Between Failures
154
MTTF
Mean Time to Failure
155
MTTR
Mean Time to Repair
156
MTU
Maximum Transmission Unit
157
NAC
Network Access Control
158
NAS
Network-attached Storage
159
NAT
Network Address Translation
160
NDA
Non-disclosure Agreement
161
NFC
Near-field Communication
162
NFV
Network Function Virtualization
163
NGFW
Next-generation Firewall
164
NG-SWG
Next-generation Secure Web Gateway
165
NIDS
Network-based Intrusion Detection System
166
NIPS
Network-based Intrusion Prevention System
167
NIST
National Institute of Standards & Technology
168
NOC
Network Operations Center
169
NTFS
New Technology File System
170
NTLM
New Technology LAN Manager
171
OCSP
Online Certificate Status Protocol
172
OID
Object Identifier
173
OSI
Open Systems Interconnection
174
OSINT
Open-source Intelligence
175
OSPF
Open Shortest Path First
176
OT
Operational Technology
177
OTA
Over-The-Air
178
OVAL
Open Vulnerability and Assessment Language
179
OWASP
Open Web Application Security Project
180
P12
PKCS #12
181
PAM
Privileged Access Management
182
PAM
Pluggable Authentication Modules
183
PAP
Password Authentication Protocol
184
PAT
Port Address Translation
185
PBKDF2
Password-based Key Derivation Function 2
186
PBX
Private Branch Exchange
187
PCAP
Packet Capture
188
PCI DSS
Payment Card Industry Data Security Standard
189
PDU
Power Distribution Unit
190
PE
Portable Executable
191
PEAP
Protected Extensible Authentication Protocol
192
PED
Portable Electronic Device
193
PEM
Privacy Enhanced Mail
194
PFS
Perfect Forward Secrecy
195
PGP
Pretty Good Privacy
196
PHI
Personal Health Information
197
PII
Personally Identifiable Information
198
PIV
Personal Identity Verification
199
PKCS
Public Key Cryptography Standards
200
PKI
Public Key Infrastructure
201
PoC
Proof of Concept
202
POTS
Plain Old Telephone Service
203
PPP
Point-to-Point Protocol
204
PPTP
Point-to-Point Tunneling Protocol
205
PSK
Preshared Key
206
PTZ
Pan-Tilt-Zoom
207
PUP
Potentially Unwanted Program
208
QA
QA Quality Assurance
209
QoS
QoS Quality of Service
210
RA
Registration Authority
211
RAD
Rapid Application Development
212
RADIUS
Remote Authentication Dial-in User Service
213
RAID
Redundant Array of Inexpensive Disks
214
RAS
Remote Access Server
215
RAT
Remote Access Trojan
216
RC4
Rivest Cipher version 4
217
RCS
Rich Communication Services
218
RFC
Request for Comments
219
RFID
Radio Frequency Identification
220
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
221
RPO
Recovery Point Objective
222
RTBH
Remotely Triggered Black Hole
223
RTO
Recovery Time Objective
224
RTOS
Real-time Operating System
225
RTP
Real-time Transport Protocol
226
S/MIME
Secure/Multipurpose Internet Mail Extensions
227
SAE
Simultaneous Authentication of Equals
228
SAML
Security Assertions Markup Language
229
SCADA
Supervisory Control and Data Acquisition
230
SCAP
Security Content Automation Protocol
231
SCEP
Simple Certificate Enrollment Protocol
232
SDLC
Software Development Life Cycle
233
SDLM
Software Development Life-cycle Methodology
234
SDN
Software-defined Networking
235
SDP
Service Delivery Platform
236
SDV
Software-defined Visibility
237
SED
Self-Encrypting Drives
238
SEH
Structured Exception Handling
239
SFTP
SSH File Transfer Protocol
240
SHA
Secure Hashing Algorithm
241
SIEM
Security Information and Event Management
242
SIM
Subscriber Identity Module
243
SIP
Session Initiation Protocol
244
SLE
Single Loss Expectancy
245
SMB
Server Message Block
246
S/MIME
Secure/Multipurpose Internet Mail Extensions
247
SMTP
Simple Mail Transfer Protocol
248
SMTPS
Simple Mail Transfer Protocol Secure
249
SNMP
Simple Network Management Protocol
250
SOAP
Simple Object Access Protocol
251
SOAR
Security Orchestration, Automation, Response
252
SoC
System on Chip
253
SOC
Security Operations Center
254
SPF
Sender Policy Framework
255
SPIM
Spam over Instant Messaging
256
SQL
Structured Query Language
257
SQLi
SQL Injection
258
SRTP
Secure Real-time Transport Protocol
259
SSID
Service Set Identifier
260
SSL
Secure Sockets Layer
261
STIX
Structured Threat Information eXpression
262
STP
Shielded Twisted Pair
263
SWG
Secure Web Gateway
264
TACACS+
Terminal Access Controller Access Control System
265
TAXII
Trusted Automated eXchange of Intelligence Information
266
TCP/IP
Transmission Control Protocol/Internet Protocol
267
TGT
Ticket Granting Ticket
268
TKIP
Temporal Key Integrity Protocol
269
TLS
Transport Layer Security
270
TOTP
Time-based One Time Password
271
TPM
Trusted Platform Module
272
TSIG
Transaction Signature
273
TTP
Tactics, Techniques, and Procedures
274
UAT
User Acceptance Testing
275
UDP
User Datagram Protocol
276
UEBA
User and Entity Behavior Analytics
277
UEFI
Unified Extensible Firmware Interface
278
UEM
Unified Endpoint Management
279
UPS
Uninterruptible Power Supply
280
URI
Uniform Resource Identifier
281
URL
Universal Resource Locator
282
USB
Universal Serial Bus
283
UTM
Unified Threat Management
284
UTP
Unshielded Twisted Pair
285
VBA
Visual Basic for Applications
286
VDE
Virtual Desktop Environment
287
VDI
Virtual Desktop Infrastructure
288
VLAN
Virtual Local Area Network
289
VLSM
Variable-length Subnet Masking
290
VPC
Virtual Private Cloud
291
VPN
Virtual Private Network
292
VTC
Video Teleconferencing
293
WAF
Web Application Firewall
294
WAP
Wireless Access Point
295
WEP
Wired Equivalent Privacy
296
WIDS
Wireless Intrusion Detection System
297
WIPS
Wireless Intrusion Prevention System
298
WORM
Write Once Read Many
299
WPA
WiFi Protected Access
300
WPS
WiFi Protected Setup
301
XaaS
Anything as a Service
302
XML
Extensible Markup Language
303
XOR
Exclusive OR
304
XSRF
Cross-site Request Forgery
305
XSS
Cross-site Scripting