Acronyms Flashcards

1
Q

3DES

A

Triple Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AD

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AIS

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

API

A

API Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

APT

A

APT Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARO

A

ARO Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARP

A

ARP Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ASLR

A

ASLR Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ASP

A

ASP Active Server Pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ATT&CK

A

Adversarial Tactics, Techniques,

and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AUP

A

AUP Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BCP

A

BCP Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BGP

A

BGP Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BIA

A

BIA Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BIOS

A

BIOS Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BPA

A

BPA Business Partnership Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BPDU

A

BPDU Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BSSID
BSSID Basic Service Set Identifier
26
CA
CA Certificate Authority
27
CAPTCHA
Completely Automated Public Turing | Test to Tell Computers and Humans Apart
28
CAR
CAR Corrective Action Report
29
CASB
CASB Cloud Access Security Broker
30
CBC
CBC Cipher Block Chaining
31
CBT
CBT Computer-based Training
32
CCMP
CCMP Counter-Mode/CBC-MAC Protocol
33
CERT
CERT Computer Emergency Response Team
34
CFB
CFB Cipher Feedback
35
CHAP
CHAP Challenge-Handshake Authentication Protocol
36
CIO
CIO Chief Information Officer
37
CIRT
CIRT Computer Incident Response Team
38
CIS
CIS Center for Internet Security
39
CMS
CMS Content Management System
40
CN
Common Name
41
COOP
COOP Continuity of Operations Planning
42
COPE
COPE Corporate-owned Personally Enabled
43
CP
CP Contingency Planning
44
CRC
CRC Cyclic Redundancy Check
45
CRL
CRL Certificate Revocation List
46
CSA
CSA Cloud Security Alliance
47
CSIRT
CSIRT Computer Security Incident Response Team
48
CSO
CSO Chief Security Officer
49
CSP
CSP Cloud Service Provider
50
CSR
CSR Certificate Signing Request
51
CSRF
CSRF Cross-Site Request Forgery
52
CSU
CSU Channel Service Unit
53
CTM
CTM Counter-Mode
54
CTO
CTO Chief Technology Officer
55
CVE
CVE Common Vulnerabilities and Exposures
56
CVSS
CVSS Common Vulnerability Scoring System
57
CYOD
CYOD Choose Your Own Device
58
DAC
DAC Discretionary Access Control
59
DBA
DBA Database Administrator
60
DDoS
DDoS Distributed Denial-of-Service
61
DEP
DEP Data Execution Prevention
62
DER
DER Distinguished Encoding Rules
63
DES
DES Data Encryption Standard
64
DHCP
DHCP Dynamic Host Configuration Protocol
65
DHE
DHE Diffie-Hellman Ephemeral
66
DKIM
DKIM Domain Keys Identified Mail
67
DLL
DLL Dynamic-link Library
68
DLP
DLP Data Loss Prevention
69
DMARC
DMARC Domain Message Authentication | Reporting and Conformance
70
DNAT
DNAT Destination Network Address Transaction
71
DNS
DNS Domain Name System
72
DNSSEC
DNSSEC Domain Name System Security Extensions
73
DoS
DoS Denial-of-Service
74
DPO
DPO Data Protection Officer
75
DRP
DRP Disaster Recovery Plan
76
DSA
DSA Digital Signature Algorithm
77
DSL
DSL Digital Subscriber Line
78
EAP
EAP Extensible Authentication Protocol
79
ECB
ECB Electronic Code Book
80
ECC
ECC Elliptic-curve Cryptography
81
ECDHE
ECDHE Elliptic-curve Diffie-Hellman Ephemeral
82
ECDSA
ECDSA Elliptic-curve Digital Signature Algorithm
83
EDR
EDR Endpoint Detection and Response
84
EFS
EFS Encrypted File System
85
EIP
EIP Extended Instruction Pointer
86
EOL
EOL End of Life
87
EOS
EOS End of Service
88
ERP
ERP Enterprise Resource Planning
89
ESN
ESN Electronic Serial Number
90
ESP
ESP Encapsulating Security Payload
91
ESSID
ESSID Extended Service Set Identifier
92
FACL
FACL File System Access Control List
93
FDE
FDE Full Disk Encryption
94
FIM
FIM File Integrity Monitoring
95
FPGA
FPGA Field Programmable Gate Array
96
FRR
FRR False Rejection Rate
97
FTP
FTP File Transfer Protocol
98
FTPS
FTPS Secured File Transfer Protocol
99
GCM
GCM Galois/Counter Mode
100
GDPR
GDPR General Data Protection Regulation
101
GPG
GPG GNU Privacy Guard
102
GPO
GPO Group Policy Object
103
GPU
GPU Graphics Processing Unit
104
GRE
GRE Generic Routing Encapsulation
105
HA
HA High Availability
106
HIDS
HIDS Host-based Intrusion Detection System
107
HIPS
HIPS Host-based Intrusion Prevention System
108
HMAC
HMAC Hash-based Message Authentication Code
109
HOTP
HOTP HMAC-based One-time Password
110
HSM
HSM Hardware Security Module
111
HSMaaS
HSMaaS Hardware Security Module as a Service
112
HTML
HTML Hypertext Markup Language
113
HTTP
HTTP Hypertext Transfer Protocol
114
HTTPS
HTTPS Hypertext Transfer Protocol Secure
115
HVAC
HVAC Heating, Ventilation, Air Conditioning
116
IAM
IAM Identity and Access Management
117
ICMP
ICMP Internet Control Message Protocol
118
ICS
ICS Industrial Control Systems
119
IDEA
IDEA International Data Encryption Algorithm
120
IDF
IDF Intermediate Distribution Frame
121
IdP
IdP Identity Provider
122
IDS
IDS Intrusion Detection System
123
IEEE
IEEE Institute of Electrical and Electronics Engineers
124
IKE
IKE Internet Key Exchange
125
IM
IM Instant Messaging
126
IMAP4
IMAP4 Internet Message Access Protocol v4
127
IoC
IoC Indicators of Compromise
128
IPS
IPS Intrusion Prevention System
129
IP
IP Internet Protocol
130
IPSec
IPSec Internet Protocol Security
131
IR
IR Incident Response
132
IRC
IRC Internet Relay Chat
133
IRP
IRP Incident Response Plan
134
ISA
ISA Interconnection Security Agreement
135
ISFW
ISFW Internal Segmentation Firewall
136
ISO
ISO International Organization for Standardization
137
ISP
ISP Internet Service Provider
138
ISSO
ISSO Information Systems Security Officer
139
ITCP
ITCP IT Contingency Plan
140
IV
IV Initialization Vector
141
KDC
KDC Key Distribution Center
142
KEK
KEK Key Encryption Key
143
L2TP
L2TP Layer 2 Tunneling Protocol
144
LDAP
LDAP Lightweight Directory Access Protocol
145
LEAP
LEAP Lightweight Extensible Authentication Protocol
146
MaaS
MaaS Monitoring as a Service
147
MAC
MAC Media Access Control
148
MAM
MAM Mobile Application Management
149
MAN
MAN Metropolitan Area Network
150
MBR
MBR Master Boot Record
151
MD5
MD5 Message Digest 5
152
MDF
MDF Main Distribution Frame
153
MDM
MDM Mobile Device Management
154
MFA
MFA Multifactor Authentication
155
MFD
MFD Multifunction Device
156
MFP
MFP Multifunction Printer
157
ML
ML Machine Learning
158
MMS
MMS Multimedia Message Service
159
MOA
MOA Memorandum of Agreement
160
MOU
MOU Memorandum of Understanding
161
MPLS
MPLS Multiprotocol Label Switching
162
MSA
MSA Measurement Systems Analysis
163
MS-CHAP
MS-CHAP Microsoft Challenge-Handshake
164
MSP
MSP Managed Service Provider
165
MSSP
MSSP Managed Security Service Provider
166
MTBF
MTBF Mean Time Between Failures
167
MTTF
MTTF Mean Time to Failure
168
MTTR
MTTR Mean Time to Repair
169
MTU
MTU Maximum Transmission Unit
170
NAC
NAC Network Access Control
171
NAS
NAS Network-attached Storage
172
NAT
NAT Network Address Translation
173
NDA
NDA Non-disclosure Agreement
174
NFC
NFC Near-field Communication
175
NFV
NFV Network Function Virtualization
176
NGFW
NGFW Next-generation Firewall
177
NG-SWG
NG-SWG Next-generation Secure Web Gateway
178
NIC
NIC Network Interface Card
179
NIDS
NIDS Network-based Intrusion Detection System
180
NIPS
NIPS Network-based Intrusion Prevention System
181
NIST
NIST National Institute of Standards & Technology
182
NOC
NOC Network Operations Center
183
NTFS
NTFS New Technology File System
184
NTLM
NTLM New Technology LAN Manager
185
NTP
NTP Network Time Protocol
186
OCSP
OCSP Online Certificate Status Protocol
187
OID
OID Object Identifier
188
OSI
OSI Open Systems Interconnection
189
OSINT
OSINT Open-source Intelligence
190
OSPF
OSPF Open Shortest Path First
191
OT
OT Operational Technology
192
OTA
OTA Over-The-Air
193
OTG
OTG On-The-Go
194
OVAL
OVAL Open Vulnerability and Assessment Language
195
OWASP
OWASP Open Web Application Security Project
196
P12
P12 PKCS #12
197
P2P
P2P Peer-to-Peer
198
PAC
PAC Proxy Auto Configuration
199
PAM - Access
PAM Privileged Access Management - mgmt for admin accounts
200
PAM - Auth
PAM Pluggable Authentication Modules
201
PAP
PAP Password Authentication Protocol
202
PAT
PAT Port Address Translation
203
PBKDF2
PBKDF2 Password-based Key Derivation Function 2
204
PBX
PBX Private Branch Exchange
205
PCAP
PCAP Packet Capture
206
PCI DSS
PCI DSS Payment Card Industry Data Security Standard
207
PDU
PDU Power Distribution Unit
208
PE
PE Portable Executable - file format for executables
209
PEAP
PEAP Protected Extensible Authentication Protocol
210
PED
PED Portable Electronic Device
211
PEM
PEM Privacy Enhanced Mail
212
PFS
PFS Perfect Forward Secrecy
213
PGP
PGP Pretty Good Privacy
214
PHI
PHI Personal Health Information
215
PII
PII Personally Identifiable Information
216
PIN
PIN Personal Identification Number
217
PIV
PIV Personal Identity Verification
218
PKCS
PKCS Public Key Cryptography Standards
219
PKI
PKI Public Key Infrastructure
220
PoC
PoC Proof of Concept
221
POP
POP Post Office Protocol
222
POTS
POTS Plain Old Telephone Service
223
PPP
PPP Point-to-Point Protocol
224
PPTP
PPTP Point-to-Point Tunneling Protocol
225
PSK
PSK Preshared Key
226
PTZ
PTZ Pan-Tilt-Zoom
227
PUP
PUP Potentially Unwanted Program
228
QA
QA Quality Assurance
229
QoS
QoS Quality of Service
230
RA
RA Registration Authority
231
RAD
RAD Rapid Application Development
232
RADIUS
RADIUS Remote Authentication Dial-in User Service
233
RAID
RAID Redundant Array of Inexpensive Disks
234
RAM
RAM Random Access Memory
235
RAS
RAS Remote Access Server
236
RAT
RAT Remote Access Trojan
237
RC4
RC4 Rivest Cipher version 4
238
RCS
RCS Rich Communication Services
239
RFC
RFC Request for Comments
240
RFID
RFID Radio Frequency Identification
241
RIPEMD
RIPEMD RACE Integrity Primitives | Evaluation Message Digest
242
ROI
ROI Return on Investment
243
RPO
RPO Recovery Point Objective
244
RSA
RSA Rivest, Shamir, & Adleman
245
RTBH
RTBH Remotely Triggered Black Hole
246
RTO
RTO Recovery Time Objective
247
RTOS
RTOS Real-time Operating System
248
RTP
RTP Real-time Transport Protocol
249
S/MIME
S/MIME Secure/Multipurpose Internet Mail Extensions
250
SAE
SAE Simultaneous Authentication of Equals
251
SAML
SAML Security Assertions Markup Language
252
SCADA
SCADA Supervisory Control and Data Acquisition
253
SCAP
SCAP Security Content Automation Protocol
254
SCEP
SCEP Simple Certificate Enrollment Protocol
255
SDK
SDK Software Development Kit
256
SDLC
SDLC Software Development Life Cycle
257
SDLM
SDLM Software Development Life-cycle Methodology
258
SDN
SDN Software-defined Networking
259
SDP
SDP Service Delivery Platform
260
SDV
SDV Software-defined Visibility
261
SED
SED Self-Encrypting Drives
262
SEH
SEH Structured Exception Handling
263
SFTP
SFTP SSH File Transfer Protocol
264
SHA
SHA Secure Hashing Algorithm
265
SIEM
SIEM Security Information and Event Management
266
SIM
SIM Subscriber Identity Module
267
SIP
SIP Session Initiation Protocol
268
SLA
SLA Service-level Agreement
269
SLE
SLE Single Loss Expectancy
270
SMB
SMB Server Message Block
271
S/MIME
S/MIME Secure/Multipurpose Internet Mail Extensions
272
SMS
SMS Short Message Service
273
SMTP
SMTP Simple Mail Transfer Protocol
274
SMTPS
SMTPS Simple Mail Transfer Protocol Secure
275
SNMP
SNMP Simple Network Management Protocol
276
SOAP
SOAP Simple Object Access Protocol
277
SOAR
SOAR Security Orchestration, Automation, Response
278
Soc
SoC System on Chip
279
SOC
SOC Security Operations Center
280
SPF
SPF Sender Policy Framework
281
SPIM
SPIM Spam over Instant Messaging
282
SQL
SQL Structured Query Language
283
SQLi
SQLi SQL Injection
284
SRTP
SRTP Secure Real-time Transport Protocol
285
SSD
SSD Solid State Drive
286
SSH
SSH Secure Shell
287
SSID
SSID Service Set Identifier
288
SSL
SSL Secure Sockets Layer
289
SSO
SSO Single Sign-on
290
STIX
STIX Structured Threat Information eXpression
291
STP
STP Shielded Twisted Pair
292
SWG
SWG Secure Web Gateway
293
TACACS
TACACS+ Terminal Access Controller Access Control System
294
TAXII
TAXII Trusted Automated eXchange | of Intelligence Information
295
TCP/IP
TCP/IP Transmission Control Protocol/Internet Protocol
296
TGT
TGT Ticket Granting Ticket
297
TKIP
TKIP Temporal Key Integrity Protocol
298
TLS
TLS Transport Layer Security
299
TOTP
TOTP Time-based One Time Password
300
TPM
TPM Trusted Platform Module
301
TSIG
TSIG Transaction Signature
302
TTP
TTP Tactics, Techniques, and Procedures
303
XSS
XSS Cross-site Scripting
304
XSRF
XSRF Cross-site Request Forgery
305
XOR
XOR Exclusive OR
306
XML
XML Extensible Markup Language
307
XaaS
XaaS Anything as a Service
308
WPS
WPS WiFi Protected Setup
309
WPA
WPA WiFi Protected Access
310
WORM
WORM Write Once Read Many
311
WIPS
WIPS Wireless Intrusion Prevention System
312
WIDS
WIDS Wireless Intrusion Detection System
313
WEP
WEP Wired Equivalent Privacy
314
WAP
WAP Wireless Access Point
315
WAF
WAF Web Application Firewall
316
VPC
VPC Virtual Private Cloud
317
VLSM
VLSM Variable-length Subnet Masking
318
VDI
VDI Virtual Desktop Infrastructure
319
VDE
VDE Virtual Desktop Environment
320
VBA
VBA Visual Basic for Applications
321
UTP
UTP Unshielded Twisted Pair
322
UTM
UTM Unified Threat Management
323
URL
URL Universal Resource Locator
324
URI
URI Uniform Resource Identifier
325
UEM
UEM Unified Endpoint Management
326
UEFI
UEFI Unified Extensible Firmware Interface
327
UEBA
UEBA User and Entity Behavior Analytics
328
UDP
UDP User Datagram Protocol
329
UAT
UAT User Acceptance Testing