Acronym List Flashcards
3DES
Triple Data Encryption Standard
AAA
Authentication, Authorisation, and Accounting
ABAC
Attribute-based Access Control
ACL
Access Control List
AD
Active Directory
AES
Advanced Encryption Standard
AES256
Advanced Encryption Standards 256bit
AH
Authentication Header
AIS
Automated Indicator Sharing
ALE
Annualised Loss Expectancy
AP
Access Point
API
Application Programming Interface
APT
Advanced Persistent Threat
ARO
Annualised Rate of Occurrence
ARP
Address Resolution Protocol
ASLR
Address Space Layout Randomisation
ASP
Active Server Pages
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge
AUP
Acceptable Use Policy
AV
Antivirus
BASH
Bourne Again Shell
BCP
Business Continuity Plan
BGP
Border Gateway Protocol
BIA
Business Impact Analysis
BIOS
Basic Input/Output System
BPA
Business Partnership Agreement
BPDU
Bridge Protocol Data Unit
BSSID
Basic Service Set Identifier
CA
Certificate Authority
CAPTCHA
Completely automated public turing test to tell computers and humans apart
CAR
Corrective Action Report
CASB
Cloud Access Security Broker
CBC
Cipher Block Chaining
CBT
computer-based training
CCMP
Counter-Mode/ CBC-MAC Protocol
CERT
Computer Emergency Response Team
CFB
Cipher Feedback
CHAP
Challenge-Handshake Authentication Protocol
CIO
Chief Information Officer
CIRT
Computer Incident Response Team
CIS
Center for Internet Security
CMS
Content Management System
CN
Common Name
COOP
Continuity of Operations Planning
COPE
Corporate-Owned Personally Enabled
CP
Contingency Planning
CRC
Cyclic Redundancy Check
CRL
Certificate Revocation List
CSA
Cloud Security Alliance
CSIRT
Computer Security Incident Response Team
CSO
Chief Security Officer
CSP
Cloud Service Provider
CSR
Certificate Signing Request
CSRF
Cross-Site Request Forgery
CSU
Channel Service Unit
CTM
Counter-Mode
CTO
Chief Technology Officer
CVE
Common Vulnerabilities and Exposures
CVSS
Common Vulnerability Scoring System
DAC
Discretionary Access Control
DBA
Database Administrator
DEP
Data Execution Prevention
DER
Distinguished Encoding Rules
DES
Data Encryption Standard
DHCP
Dynamic Host Configuration Protocol
DHE
Diffie-Hellman Ephemeral
DKIM
Domain Keys Identified Mail
DLL
Dynamic Link Library
DMARC
Domain Message Authentication Reporting and Conformance
DNAT
Destination Network Address Translation
DNSSEC
Domain Name System Security Extensions
DPO
Data Protection Officer
DRP
Disaster Recovery Plan
DSA
Digital Signature Algorithim
DSL
Digital Subscriber Line
EAP
Extensible Authentication Protocol
ECB
Electronic Code Book
ECC
Elliptic-curve Cryptography
ECDHE
Elliptic-curve Diffie-Hellman Ephermeral
ECDSA
Elliptic-curve Digital Signature Algorithm
EDR
Endpoint Detection and Response
EFS
Encrypted File System
EIP
Extended Intrusion Pointer
EOL
End of Life
EOS
End of Service
ERP
Enterprise Resource Planning
ESN
Electronic Serial Number
ESP
Encapsulating Security Payload
ESSID
Extended Service Set Identifier
FACL
File System Access Control List
FDE
Full Disk Encryption
FIM
File Integrity Monitoring
FPGA
Field Programmable Gate Array
FRR
False Rejection Rate
FTPS
File Transfer Protocol Secure
GCM
Galois/Counter Mode
GDPR
General Data Protection Regulation
GPO
Group Policy Object
GPU
Graphics Processing Unit
GRE
Generic Routing Encapsulation
HDD
Hard Disk Drive
HIDS
Host-based Intrusion Detection System
HIPS
Host-based Intrusion Prevention System
HMAC
Hash-based Message Authentication Code
HOTP
HMAC-based One time Password
HSM
Hardware Security Module
HSMaaS
Hardware Security Module as a Service
HTML
Hypertext Markup Language
HVAC
Heating , Ventilation, Air Conditioning
IAM
Identity and Access Management
ICMP
Internet Control Management Protocol
ICS
Industrial Control Systems
IDEA
International DAta Encryption Algorithm
IDF
Intermediate Distribution Frame
IdP
Identity Provider
IDS
Intrusion Detection System
IEEE
Institute of Electrical and Electronic Engineers
IKE
Internet Key Exchange
IMAP4
Internet Message Access Protocol v4
IoC
Indicators of Compromise
IPS
Intrusion Prevention System