Acronyms Flashcards
SIP
Session Initial Protocol
PFS
Port Forward Secrecy
XaaS
Anything as a Service
TLS
Transport Layer Security
PUP
Potentially Unwanted Program
ECC
Elliptic Curve Cryptography
HMI
Human-machine Interface
SAN
Storage Area Network
NAS
Network Attached Storage
AH
Authentication Header
DMZ
Demilitarized Zone
RPO
Recovery Point Objective
ICS
Industrial Control Systems
PLC
Programmable Logic Controller
WORM
Write Once Read Many
OCSP
Online Certificate Status Protocol
SCADA
Supervisory Control and Data Acquisition
WPA
WiFi Protected Access
SoC
System on a Chip
EPS
Extrusion Prevention System
NFC
Near Field Communication
CAN
Controller Area Network
PBX
Private Branch Exchange
NTLM Hash
NT LAN Manager Hash
EMI
Electromagnetic Interference
MD5
Message Digest 5
ISA
Interconnection Security Agreement
SOX
Sarbanes-Oxley Act
MOU
Memorandum of Understanding
ABAC
Attribute-based Access Control
SSID
Service Set identifier
AV
Anti-Virus
TOS
Trusted Operation System
UAC
User Account Control
NAC
Network Access Control
RAID
Redundant Array of Independent Disks
BYOD
Bring Your Own Device
AES
Advanced Encryption Standard
BIA
Business Impact Analysis
SDN
Software Defined Networking
MAC
Media Access Control
CUS
Center for Internet Security
CYOD
Choose Your Own Device
IMSI
International Mobile Subscriber
SA
Security Association
NAT
Network Address Translation
IKE
Internet Key Exchange
MITM
Man-in-the-middle (On-path)
HMAC
Hash-based Message Authentication Code
HAVA
Help America Vote Act of 2002
UEFI
Unified Extensible Firmware Interface
WPS
WiFi Protected Setup
XSS
Cross-site Scripting
CI/CD
Continuous Integration/Continuous Delivery
SSL
Secure Sockets layer
VDI
Virtual Desktop Infrastructure
IaaS
Infrastructure as a Service
UTM
Unified Threat Management
XSRF
Cross-site Request Forgery
SDLC
Software Development Life Cycle
GLBA
Gramm-Leach-Bliley Act
BIOS
Basic Input/Output System
HSM
Hardware Security Module
ACL
Access Control List
RTO
Recovery Time Objective
SSO
Single Sign On
RFI
Radio Frequency Interference
VNC
Virtual Network Computing
CORS
Cross-Origin Resource Sharing
FIDM
Federated Identity Management
PACS
Physical Access Control System
ROT
Root of Trust
LSO
Locally Shared Object
SAML
Security Assertions Markup Language
DLP
Data Loss Prevention
ESP
Encapsulated Security Payload
PAP
Password Authentication Protocol
CSF
Cybersecurity Framework
BER
Basic Encoding Rules
RTOS
Real-time Operating System
GDPR
General Data Protection Regulation
CRL
Certificate Revocation List
SED
Self-encypting drive
RAT
Remote Acess Trojan
PAT
Port Address Translation
STP
Shielded Twisted Pair
VPC
Virtual Private Cloud
OT
Operational Technology
ILP
Information Leak Protection
FAR
False Acceptance Rate
DoS
Denial of Service
FPG
Field Programmable Gate Array
UEBA
User and Entity Behavior Analytics
PKI
Public Key Infrastructure
PII
Personally Identifiable Information
SLA
Service Level Agreement
ALE
Annualized Loss Expectancy
SOAR
Security Orchestration, Automation, Response
MITB
Man-in-the-browser
HOTP
HMAC-based One-time Password
FISMA
Federal Information Security Management Act of 2002
SHA-1, SHA-2, SHA-3
Secure Hashing Algorithm
PDS
Protected Distribution System
FRR
False Rejection Rate
RMF
Risk Management Framework
SABSA
Sherwood Applied Business Security Archicture
DAC
Discretionary Access Control
ARO
Annualized Rate of Occurrence
IRM
Information Rights Management
CASB
Cloud Access Security Broker
OVAL
Open Vulnerability Assessment Language
S/MIME
Secure/Multipurpose Internet Mail Extensions
WRT
Work Recovery Time
GPO
Group Policy Object
RBAC
Role Based Access Control
SIM
Subscriber Identity Module
VoIP
Voice Over Internet Protocol
FaaS
Function as a Service
SaaS
Software as a Service
MSSP
Managed Security Servicce Provider
provides SECaaS
SECaaS
Security as a Service
PCI-DSS
Payment Card Industry Data Security Standard
PHI
Protected Health Information
MTTR
Mean Time to Repair
MTBF
Mean Time Between Failure