Acronyms Flashcards
"Death by Acronyms" might actually be a real thing...
IPS
Intrusion Prevention System
RPO
Recovery Point Objective
RTO
Recovery Time Objective
DNS
Domain Name System
XSS
Cross-state Scripting
CRSS
Cross-site Scripting
XSRF
Cross-site Request Forgery
VLAN
Virtual LAN
VDI
Virtual Desktop Infrastructure
SaaS
Software as a Service
PaaS
Platform as a service
FaaS
Function as a Service
IaC
Infrastructure as Code
CASB
Cloud Access Security Broker
AUP
Accessible Use Policy
NGFW
Next Gen Fire Wall
EDR
Endpoint Detection and Response
TOTP
Time-based One-time Password
2FA
Two-factor Authentication
FRR
False Rejection Rate
FAR
False Acceptance Rate
SDLC
Software Development Life Cycle
MDM
Mobile Device Management
HIDS
Host Intrusion Detection System
NIPS
Net Intrusion Prevention System
HSM
Hardware Security Management -or- Hardware Security Modules
WAF
Web Access Firewall
NAC
Net Access Control
NIDS
Net Intrusion Detection System
SSO
Single Sign-on
SOAR
Secure Orchestration, Automation, and Response
SDN
Software Defined Network
NDA
Non-Disclosure Agreement
BGP
Border Gateway Protocol
DNSSEC
Domain Name System Security Extension
SSH
Secure Shell
HTTP(S)
Hyper Text Transfer Protocol (over SSL/TLS)
MitM
Man in the Middle (on-path)
VPN
Virtual Private Network
CSP
Cloud Service Provider
T US IC
The United States Intelligence Community
C2
Command and Control
AWS
Amazon Web Service
CCO
Chief Compliance Officer
CEO
Chief Executive Officer
HSM
Hardware Security Module
UTM
Unified Threat Management
OSPF
Open Shortest Path First
EIGRP
Enhanced Interior Gateway Routing Protocol
TLS
Transport Layer Security
MitB (MiB)
Man in the Browser (Trojan)
MAC
Media Access Control
DDoS
Distributed Denial-of-Service (Attack)
ISP
Internet Service Provider
UDP
User Datagram Protocol
ICMP
Internet Control Message Protocol
API
Application Programming Interface
JSON
JavaScript Object Notation
YAML
Yet Another Markup Language
SWG
Secure Web Gateway
VPC
Virtual Private Cloud
SDN
Software Defined Network
SDV
Software Defined Visibility
CBT
Computer Based Training
CIA/DAD
Confidentiality, Integrity, Availability / Disclosure, Alteration, Denial
HIPPA
Health Insurance Portability and Accountability Act
PCI DSS
Payment Card Industry Data Security Standard
IOCTA/EUROPOL
Internet Organized Crime Threat Assessment / European Union Agency for Law Enforcement Cooperation
APT
Advanced Persistent Threat
OSINT
Open Source Intelligence
CISA
Cybersecurity and Infrastructure Security Agency
TTP
Tactics, Techniques, and Procedures
RAT
Remote Access Trojan
MBR
Master Boot Record
DRM
Digital Rights Management
IRC
Internet Relay Chat
OWASP
Open Web Application Security Project
PUP
Potentially Unwanted Program
VBA
Visual Basic for Applications
AI/ML
Artificial Intelligence / Machine Learning
CFO
Chief Financial Officer
SPIM
Spam over Instant Message
ISACs
Information Sharing and Analysis Centers
TAXII
Trusted Automated eXchange of Indicator Information Protocol
IoC
Indicators of Compromise
MSSP
Managed Security Service Provider
PII
Personal Identifiable Information
VoIP
Voice over IP
SIEM
Security Information and Event Management
MTTR
Mean Time to Recovery -or- Mean Time to Restore
NFC
Near-field Communications
TPM
Trusted Platform Module
FTP
File Transfer Protocol
SMTP
Simple Mail Transfer Protocol
DHCP
Dynamic Host Configuration Protocol
TFTP
Trivial File Transfer Protocol
POP3
Post Office Protocol
NNTP
Network News Transport Protocol
NTP
Network Time Protocol
IMAP4
Internet Messaging Access Protocol
SNMP
Simple Network Management Protocol
UEM
Unified Endpoint Management
CVE
Common Vulnerabilities and Exposures
RoE
Rules of Engagement
PR
Privileges Required
Not to be confused with Public Relations
NIST
National Institute of Standards and Technology
LAN
Local Area Network
ARP
Address Resolution Protocol
DOM-based XSS
Document Object Model-based Cross-site Scripting
SSI
Self-sovereign identity
FIM
File Integrity Monitoring
AES
Advanced Encryption Standard
OCSP
Online Certificate Status Protocol
EV
Extended Validation
CA
Certificate Authorities
SAE
Simultaneous Authentication of Equals
PFX
Personal Exchange Format
IdP
Identity Provider
RADIUS
Remote Authentication Dial-In User Service
SMS
Short Message Service
RBAC
Role-Based Access Control
CER
Cross-over Error Rate
DAC
Discretionary Access Control
EMI
Electro Magnetic Interference
RFID
Radio Frequency Identification
GDPR
General Data Protection Regulation
DPO
Data Protection Officer
PHI
Protected Health Information
IDS
Intrusion Detection System
MSA
Master Service Agreement
CIS
Center for Internet Security
USB OTG
USB On-the-Go
FDE
Full Device Encryption
PSK
Pre-shared Key
COPE
Corporate-Owned, Personally-Enabled
SoC
System on a Chip
SCADA
Supervisory Control and Data Acquisition
RTOS
Real-Time Operating System