ACRONYMS Flashcards
3DES
Triple Data Encryption Algorithm
ACL
Access Control List
AES
Advanced Encryption Standard
API
Application Programming Interface
ARP
Address Resolution Protocol
APT
Advanced Persistent Threat
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge
AUP
Acceptable Use Policy
BEC
Business Email Compromise
BYOD
Bring Your Own Device
CA
Certificate Authority
CAN
Controller Area Network
CASB
Cloud Access Security Broker
CI/CD
Continuous Integration/Continuous Delivery
CIS
Center for Internet Security
COBIT
Control Objectives for
Information and Related Technology
CPU
Central Processing Unit
CRM
Customer Relations Management
CVSS
Common Vulnerability Scoring System
DDoS
Distributed Denial of Service
DGA
Domain Generation Algorithm
DHCP
Dynamic Host Configuration Protocol
DKIM
Domain Keys Identified Mail
DLP
Data Loss Prevention
DMARC
Domain-based Message
Authentication, Reporting, and Conformance
DMZ
Demilitarized Zone
DNS
Domain Name System
DNSSEC
Domain Name System Security Extensions
DOM
Document Object Model
DRM
Digital Rights Management
EDR
Endpoint Detection and Response
ELK
Elasticsearch, Logstash, Kibana
ERP
Enterprise Resource Planning
FaaS
Function as a Service
FPGA
Field-programmable Gate Array
FTK
Forensic Toolkit
FTP
File Transfer Protocol
HIDS
Host Intrusion Detection System
HIPS
Host-based Intrusion Prevention System
HSM
Hardware Security Module
HTTP
Hypertext Transfer Protocol
IaaS
Infrastructure as a Service
IaC
Infrastructure as Code
ICMP
Internet Control Message Protocol
IDS
Intrusion Detection System
IMAP
Internet Message Access Protocol
IoC
Indicator of Compromise
IoT
Internet of Things
IP
Internet Protocol
IPS
Intrusion Prevention System
ISAC
Information Sharing and Analysis Center
ISO
International Organization for Standardization