Acronyms !! Flashcards

1
Q

AUP

A

Acceptable user policy – determines what is and what is not permitted on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OID

A

Object identifiers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RAT

A

Remote Access Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MAC

A

Mandatory Access Control – refers to a type of access control by which the operating system or database constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DAC

A

Discretionary access control – (DAC) model assigns an owner to an object, and the owner establishes access to users for the objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TAP

A

Test Access Point – a device that copies signals from the physical layer and the data link layer. Since no network or transport logic is used, every frame is received, allowing reliable packet monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MAM

A

Mobile Application Management – sets policies for apps that can process corporate data and prevents data transfer to personal apps. This type of solution configures an enterprise-managed container or workspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UEM

A

Unified Endpoint Management – is a suite of applications and features that extends the concept of network access control (NAC) solutions to the mobile device. UEM may include MAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NAC

A

Network Access control – an approach to computer security that attempts to unify endpoint security technology, user or system authentication and network security enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IP

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RDP

A

Remote Desktop Protocol – is Microsoft’s protocol for operating remote connections to a Windows machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

VPN

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RAM

A

Random Access Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SOAR

A

Security Orchestration, Automation, and Response. SOAR allows better response when the volume of alerts becomes overwhelming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SEDS

A

Self-encrypting drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FPGA

A

Field Programmable Gate Arrays – are semiconductor devices that contain programmable logic blocks and interconnection circuits. These devices can be programmed and reprogrammed to meet the required functionality. Difficulty in updating and patching is often a downfall of embedded systems such as FPGAs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

OT

A

Operational Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

FQDN

A

Fully Qualified Domain Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DNSSEC

A

Domain Name System Security Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DHCP

A

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

SFTP

A

Secure File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

FTP

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

TFTP

A

Trivial File Transfer Protocol – is a simple protocol for exchanging files between two TCP/IP machines. TFTP servers allow connections from a TFTP Client for sending and receiving files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

CIRT

A

Cyber Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

HIPS

A

Host-based Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

OS

A

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

SIEM

A

Security Information and Event Management

32
Q

MiTM

A

A man-in-the-middle

33
Q

DMZ

A

Demilitarized Zone

34
Q

HSM

A

Hardware Security Model – a physical device that provides extra security for sensitive data.

35
Q

LAN

A

Local Area Network – a collection of devices connected together in one physical location, such as a building, office, or home.

36
Q

VLAN

A

Virtual Local Area Network – any broadcast domain that is partitioned and isolated in a computer network at the data link layer.

37
Q

API

A

Application Programming Interface – The word Application refers to any software with a distinct function. Interface can be thought of as a contract of service between two applications. This contract defines how the two communicate with each other using requests and responses.

38
Q

PKI

A

Public key infrastructure

39
Q

VDE

A

Virtual Desktop Environments

40
Q

IRP

A

Incident Response Plan (also known as a playbook)

41
Q

CVE

A

Common Vulnerabilities and Exposures

42
Q

CVSS

A

Common Vulnerability Scoring System

43
Q

RFC

A

Requests for Comments

44
Q

IETF

A

Internet Engineering Task Force

45
Q

NIST

A

National Institute of Standards and Technology – Information security and cybersecurity tasks can be classified as five functions (Identify, Protect, Detect, Respond, Recover), following the framework developed by the National Institute of Standards and Technology.

46
Q

PCI DSS

A

Payment Card Industry Data Security Standard – defines the safe handling and storage of financial information.

47
Q

GDPR

A

General Data Protection Regulation – means that personal data cannot be collected, processed, or retained without the individual’s informed consent.

48
Q

CIS

A

Center for Internet Security – is a not-for-profit organization founded partly by The SANS Institute. It publishes the well-known “The 20 CIS Controls.”

49
Q

AI

A

Artificial intelligence

50
Q

CSP

A

Cloud Service Provider

51
Q

CTI

A

Cyber threat intelligence

52
Q

OSINT

A

Open source intelligence

53
Q

TPM

A

Trusted platform module – is a specification for hardware-based storage of encryption keys, hashed passwords, and other user and platform identification information.

54
Q

NFC

A

Near Field communications

55
Q

SOA

A

Service Oriented Architecture

56
Q

SDN

A

Software Defined Network

57
Q

IOT

A

Internet of Things

58
Q

IdP

A

Identity Provider

59
Q

IdP

A

Identity Provider

60
Q

SSO

A

Single Sign On

61
Q

RFID

A

Radio Frequency Identification – commonly used for asset management as tags. It is a chip programmed with asset data.

62
Q

STP

A

Spanning Tree Protocol – is a means for the bridges to organize themselves into a hierarchy and prevent loops from forming.

63
Q

SoC

A

System on Chip – is a design where processors, controllers, and devices are provided on a single processor die (or chip). Raspberry Pi and Arduino are examples of SoC boards.

64
Q

FGPA

A

Field Programmable Gate Array – a type of controller that can be configured with programming logic onboard the device to run a specific application. Difficulty in updating is often a downfall of many embedded systems.

65
Q

PLC

A

Programmable Logic Controller – They are industrial computers used to control different electro-mechanical processes for use in manufacturing, plants, or other automation environments.

66
Q

RTOS

A

Real-Time Operating System

67
Q

AES

A

Advanced Encryption Standard

68
Q

OAuth

A

Open Authorization – a protocol often implemented for authentication and authorization for RESTful application programming interface (API). It is designed to facilitate sharing of information (resources) within a user profile between sites.

69
Q

OIDC

A

OpenID Connect – is an authentication protocol that can be implemented as special types of OAuth flows with precisely defined token fields.

70
Q

SDV

A

Software-defined visibility – supports assessment and incident response functions. Visibility is the near real-time collection, aggregation, and reporting of data about network traffic.

71
Q

CA

A

Certificate Authority

72
Q

PHI

A

Personal health information

73
Q

PII

A

Personally identifiable information

74
Q

ACL

A

Access Control List

75
Q

ARO

A

Annualized rate of occurrence

76
Q

ALE

A

Annualized loss expectancy – The amount that would be lost over the course of a year. This amount is determined by multiplying the SLE by the annualized rate of occurrence (ARO).

77
Q

SLE

A

Single loss expectancy – is the amount that would be lost in a single occurrence of the risk factor. This amount is determined by multiplying the value of the asset by an exposure factor (EF).