Acronym N-T Flashcards
NAC
Network Access Control
NAT
Network Access Translation
NDA
Non-Disclosure Agreement
NFC
Near Field Communication
NGFW
Next Generation Firewall
NIDS
Network Based Intrusion Detection System
NIPS
Network based Intrusion Prevention System
NIST
National Institute of Standards and Technology
NTFS
New Technology File System
NTLM
New technology Lan Manager
NTP
Network Time Protocol
OAUTH
Open Authorisation
OCSP
Online Certificate Status Protocol
OID
Object Identifier
OS
Operating System
OSINT
Open Source Intelligence
OSPF
Open shortest Path First
OT
Operational Technology
OTA
Over the Air
OVAL
Open Vulnerability Assessment Language
P12
PKCS 12
P2P
Peer to Peer
PaaS
Platform as a Service
PAC
Proxy Auto Configuration
PAM
Privilege Access Management
Pluggable Authentication Modules
PAP
Password Authentication Protocol
PAT
Port Address Translation
PBKDF2
Password Based Key derivation function 2
PBX
Private Branch Exchange
PCAP
Packet Capture
PCI DSS
Payment Card Industry Data Security Standard
PDU
Power Distribution Unit
PEAP
Protected Extensible Authentication Protocol
PED
Personal Electronic Device
PEM
Privacy Enhanced Mail
PFS
Perfect Forward Secrecy
PGP
Pretty Good Privacy
PHI
Personal Health Information
PII
Personally Identifiable Information
PIV
Personal Identity Verification
PKCS
Public Key Cryptography standards
PKI
Public key Infrastructure
PoP
Post Office Protocol
POTS
Plain Old Television Service
ppp
Point to Point Protocol
PPTP
Point to Point tunnelling Protocol
PSK
Preshared Key
PTZ
Pan Tilt Zoom
PUP
Potentially Unwanted Programme
RA
Recovery Agent
Registration Authority
RACE
Research and Development in Advanced Communications Technologies in Europe
RAD
Radical Application Development
RaDIUS
Remote Authentication Dial in user Service
Raid
Redundant array of inexpensive disks
RAS
Remote Access Server
RAT
Remote Access Trojan
RBAC
Role based Access Control
Rule based access control
RC4
Rivest Cipher Version 4
RDP
Remote Desktop Protocol
RFID
Radio Frequency Identifier
RIPEMD
RACE - Integrity Primitives Evaluation message digest
ROI
Return on Investment
RPO
Recovery Point Objective
RSA
Rivest Shamir and Adleman
RTBH
Remotely Triggered Black Hole
RTO
Recovery Time Objective
RTOS
Real time operating system
RTP
Real-time Transport Protocol
S/MINE
Secure/Multipurpose Internet Mail Extensions
SaaS
Software as a service
SAE
Simultaneous Authentication of Equals
SAML
Security Assertions Markup Languages
SAN
Storage Access Network
Subject Alternative Name
SASE
Secure Access Service Edge
SCADA
Supervisory Control and Data Acquisition
SCAP
Security Content Automation Protocol
SCEP
Security Certificate Enrolment Protocol
SD-WAN
Software defined Wide Area Network
SDK
Software Development Kit
SDLC
Software Development Lifecycle
SDLM
Software Development Lifecycle Methodology
SDN
Software-defined Networking
SE Linux
Security-enhanced Linux
SED
Self-encrypting Drives
SEH
Structured Exception Handler
SFTP
Secured File Transfer Protocol
SHA
Secure Hashing Algorithm
SHTTP
Secure Hypertext Transfer Protocol
SIEM
Security Information and Event Management
SIM
Subscriber Identity Module
SLA
Service-level Agreement
SLE
Single Loss Expectancy
SMS
Short Message Service
SMTP
Simple Mail Transfer Protocol
SMTPS
Simple Mail Transfer Protocol Secure
SNMP
Simple Network Management Protocol
SOAP
Simple Object Access Protocol
SOAR
Security Orchestration, Automation,
Response
SoC
System on Chip
SOC
Security Operations Center
SOW
Statement of Work
SPF
Sender Policy Framework
SPIM
Spam over Internet Messaging
SQL
Structured Query Language
SQLi
SQL Injection
SRTP
Secure Real-Time Protocol
SSD
Solid State Drive
SSH
Secure Shell
SSL
Secure Sockets Layer
SSO
Single Sign-On
STIX
Structured Threat Information eXchange
SWG
Secure Web Gateway
TACACS+
Terminal Access Controller Access Control System
TAXII
Trusted Automated eXchange of Indicator Information
TCP/IP
Transmission Control Protocol/Internet
Protocol
TKIP
Temporal Key Integrity Protocol
TGT
Ticket grant ticket
TLS
Transport Layer Security
TOC
Time-of-Check
TOTP
Time-based one time password
TOU
Time of Use
TPM
Trusted Platform Module
TTP
Tactics, Techniques, and Procedures
TSIG
Transaction Signature