Acronyms !! Flashcards

1
Q

AUP

A

Acceptable user policy – determines what is and what is not permitted on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OID

A

Object identifiers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RAT

A

Remote Access Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MAC

A

Mandatory Access Control – refers to a type of access control by which the operating system or database constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DAC

A

Discretionary access control – (DAC) model assigns an owner to an object, and the owner establishes access to users for the objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TAP

A

Test Access Point – a device that copies signals from the physical layer and the data link layer. Since no network or transport logic is used, every frame is received, allowing reliable packet monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MAM

A

Mobile Application Management – sets policies for apps that can process corporate data and prevents data transfer to personal apps. This type of solution configures an enterprise-managed container or workspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UEM

A

Unified Endpoint Management – is a suite of applications and features that extends the concept of network access control (NAC) solutions to the mobile device. UEM may include MAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NAC

A

Network Access control – an approach to computer security that attempts to unify endpoint security technology, user or system authentication and network security enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IP

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RDP

A

Remote Desktop Protocol – is Microsoft’s protocol for operating remote connections to a Windows machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

VPN

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RAM

A

Random Access Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SOAR

A

Security Orchestration, Automation, and Response. SOAR allows better response when the volume of alerts becomes overwhelming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SEDS

A

Self-encrypting drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FPGA

A

Field Programmable Gate Arrays – are semiconductor devices that contain programmable logic blocks and interconnection circuits. These devices can be programmed and reprogrammed to meet the required functionality. Difficulty in updating and patching is often a downfall of embedded systems such as FPGAs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

OT

A

Operational Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

FQDN

A

Fully Qualified Domain Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DNSSEC

A

Domain Name System Security Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DHCP

A

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
SFTP
Secure File Transfer Protocol
26
FTP
File Transfer Protocol
27
TFTP
Trivial File Transfer Protocol -- is a simple protocol for exchanging files between two TCP/IP machines. TFTP servers allow connections from a TFTP Client for sending and receiving files.
28
CIRT
Cyber Incident Response Team
29
HIPS
Host-based Intrusion Prevention System
30
OS
Operating System
31
SIEM
Security Information and Event Management
32
MiTM
A man-in-the-middle
33
DMZ
Demilitarized Zone
34
HSM
Hardware Security Model -- a physical device that provides extra security for sensitive data.
35
LAN
Local Area Network -- a collection of devices connected together in one physical location, such as a building, office, or home.
36
VLAN
Virtual Local Area Network -- any broadcast domain that is partitioned and isolated in a computer network at the data link layer.
37
API
Application Programming Interface -- The word Application refers to any software with a distinct function. Interface can be thought of as a contract of service between two applications. This contract defines how the two communicate with each other using requests and responses.
38
PKI
Public key infrastructure
39
VDE
Virtual Desktop Environments
40
IRP
Incident Response Plan (also known as a playbook)
41
CVE
Common Vulnerabilities and Exposures
42
CVSS
Common Vulnerability Scoring System
43
RFC
Requests for Comments
44
IETF
Internet Engineering Task Force
45
NIST
National Institute of Standards and Technology -- Information security and cybersecurity tasks can be classified as five functions (Identify, Protect, Detect, Respond, Recover), following the framework developed by the National Institute of Standards and Technology.
46
PCI DSS
Payment Card Industry Data Security Standard -- defines the safe handling and storage of financial information.
47
GDPR
General Data Protection Regulation -- means that personal data cannot be collected, processed, or retained without the individual's informed consent.
48
CIS
Center for Internet Security -- is a not-for-profit organization founded partly by The SANS Institute. It publishes the well-known "The 20 CIS Controls."
49
AI
Artificial intelligence
50
CSP
Cloud Service Provider
51
CTI
Cyber threat intelligence
52
OSINT
Open source intelligence
53
TPM
Trusted platform module -- is a specification for hardware-based storage of encryption keys, hashed passwords, and other user and platform identification information.
54
NFC
Near Field communications
55
SOA
Service Oriented Architecture
56
SDN
Software Defined Network
57
IOT
Internet of Things
58
IdP
Identity Provider
59
IdP
Identity Provider
60
SSO
Single Sign On
61
RFID
Radio Frequency Identification -- commonly used for asset management as tags. It is a chip programmed with asset data.
62
STP
Spanning Tree Protocol -- is a means for the bridges to organize themselves into a hierarchy and prevent loops from forming.
63
SoC
System on Chip -- is a design where processors, controllers, and devices are provided on a single processor die (or chip). Raspberry Pi and Arduino are examples of SoC boards.
64
FGPA
Field Programmable Gate Array -- a type of controller that can be configured with programming logic onboard the device to run a specific application. Difficulty in updating is often a downfall of many embedded systems.
65
PLC
Programmable Logic Controller -- They are industrial computers used to control different electro-mechanical processes for use in manufacturing, plants, or other automation environments.
66
RTOS
Real-Time Operating System
67
AES
Advanced Encryption Standard
68
OAuth
Open Authorization -- a protocol often implemented for authentication and authorization for RESTful application programming interface (API). It is designed to facilitate sharing of information (resources) within a user profile between sites.
69
OIDC
OpenID Connect -- is an authentication protocol that can be implemented as special types of OAuth flows with precisely defined token fields.
70
SDV
Software-defined visibility -- supports assessment and incident response functions. Visibility is the near real-time collection, aggregation, and reporting of data about network traffic.
71
CA
Certificate Authority
72
PHI
Personal health information
73
PII
Personally identifiable information
74
ACL
Access Control List
75
ARO
Annualized rate of occurrence
76
ALE
Annualized loss expectancy -- The amount that would be lost over the course of a year. This amount is determined by multiplying the SLE by the annualized rate of occurrence (ARO).
77
SLE
Single loss expectancy -- is the amount that would be lost in a single occurrence of the risk factor. This amount is determined by multiplying the value of the asset by an exposure factor (EF).