acronyms Flashcards

1
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ASLR

A

Address Space Layout Randomization

Address space layout randomization (ASLR) is a memory-protection process for operating systems (OSes) that guards against buffer-overflow attacks by randomizing the location where system executables are loaded into memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CAPTCHA

A

Completely Automated Public Turing Test to Tell Computers and Humans Apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CER

A

Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CIA

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CIRT

A

Computer Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CISO

A

Chief Information Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CMS

A

Content Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CPU

A

Central Processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CRC

A

Cyclic Redundancy Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CSRF

A

Cross-Site Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CSS

A

Cascading Style Sheets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CPT

A

Certified Penetration Tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DAC

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DBMS

A

Database Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DEP

A

Data Execution Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

DES

A

Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

DHCP

A

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

DMZ

A

Demilitarized Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

DNS

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

DoS

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

DDoS

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

DRM

A

Digital Rights Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

ECC

A

Elliptic Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

EFS

A

Encrypting File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

EMI

A

Electromagnetic Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

EULA

A

End User License Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

FDE

A

Full Disk Encryption

37
Q

FTP

A

File Transfer Protocol

38
Q

GPG

A

GNU Privacy Guard

39
Q

GPS

A

Global Positioning System

40
Q

GRE

A

Generic Routing Encapsulation

41
Q

GRC

A

Governance, Risk, and Compliance

42
Q

HMAC

A

Hashed Message Authentication Code

Here’s a concise explanation of HMAC:

Purpose: HMAC is used to verify the integrity and authenticity of a message or data by generating a fixed-size hash value (digest) based on the message and a secret key.

Process: HMAC utilizes a cryptographic hash function (e.g., SHA-256) and a secret key known only to the sender and receiver. The message is combined with the secret key, and the hash function is applied to this combination to generate the HMAC.

Properties: HMAC provides two main security properties - integrity and authenticity. Integrity ensures that the data has not been altered in transit, and authenticity ensures that the data comes from the expected sender.

Keyed Hashing: The use of a secret key distinguishes HMAC from regular hash functions. It prevents unauthorized parties from tampering with the message and generating valid HMACs.

Applications: HMAC is commonly used in various security protocols, such as SSL/TLS, IPsec, and SSH, as well as in applications like digital signatures and message authentication in web services.

Strengths: HMAC is resistant to known cryptographic attacks when using a secure hash function. It is computationally efficient and provides a high level of security.

Key Management: Proper key management is crucial for the effectiveness of HMAC. Keys must be kept secret and should be changed regularly for enhanced security.

In summary, HMAC is a widely used mechanism for ensuring the integrity and authenticity of data by generating a fixed-size hash value based on a message and a secret key. It provides a strong security foundation for many security protocols and applications, making it a fundamental tool in modern secure communication.

43
Q

HTML

A

Hypertext Markup Language

44
Q

HTTP

A

Hypertext Transfer Protocol

45
Q

HTTPS

A

Hypertext Transfer Protocol Secure

46
Q

ICMP

A

Internet Control Message Protocol

47
Q

IDS

A

Intrusion Detection System

48
Q

IPS

A

Intrusion Prevention System

49
Q

IPsec

A

Internet Protocol Security

50
Q

ISO

A

International Organization for Standardization

51
Q

ITIL

A

Information Technology Infrastructure Library

52
Q

JIT

A

Just-In-Time

53
Q

LAN

A

Local Area Network

54
Q

LDAP

A

Lightweight Directory Access Protocol

55
Q

MAC

A

Mandatory Access Control

Strict and uses predefined based on documented security labels or classifications. like TOP Secretor Confidential.

56
Q

MBR

A

Master Boot Record

57
Q

MDM

A

Mobile Device Management

58
Q

MFA

A

Multi-Factor Authentication

59
Q

MITM

A

Man-In-The-Middle

60
Q

NAC

A

Network Access Control

61
Q

NAS

A

Network-Attached Storage

62
Q

NAT

A

Network Address Translation

63
Q

NIDS

A

Network Intrusion Detection System

64
Q

NIPS

A

Network Intrusion Prevention System

65
Q

NIST

A

National Institute of Standards and Technology

66
Q

NTFS

A

New Technology File System

67
Q

OAUTH

A

Open Authorization

68
Q

OTP

A

One-Time Password

69
Q

PaaS

A

Platform-as-a-Service

70
Q

PAT

A

Port Address Translation

71
Q

PBKDF2

A

Password-Based Key Derivation Function 2

72
Q

PCI

A

Payment Card Industry

73
Q

PII

A

Personally Identifiable Information

74
Q

PKI

A

Public Key Infrastructure

75
Q

POP3

A

Post Office Protocol version 3

76
Q

PPP

A

Point-to-Point Protocol

77
Q

PPTP

A

Point-to-Point Tunneling Protocol

1723 TCP

78
Q

RAID

A

Redundant Array of Independent Disks

79
Q

RAS

A

Remote Access Service

80
Q

RDP

A

Remote Desktop Protocol

81
Q

RF

A

Radio Frequency

82
Q

RFI

A

Radio Frequency Interference

83
Q

RFID

A

Radio Frequency Identification

84
Q

RIS

A

Remote Installation Service

85
Q

RTO

A

Recovery Time Objective

86
Q

UTM

A

Unified Threat Manager

In cybersecurity, UTM stands for Unified Threat Management. It is a type of security solution that combines multiple security technologies into a single, integrated platform to protect against a wide range of threats.

UTM solutions typically include features such as firewall, intrusion prevention, anti-virus and anti-malware, virtual private network (VPN), content filtering, and application control. These technologies work together to provide comprehensive protection against threats like viruses, malware, phishing attacks, and unauthorized access.

By consolidating multiple security functions into one platform, UTM solutions offer several benefits, including simplified management and administration, reduced complexity and costs, and improved security posture. They are often used by small and medium-sized businesses that need comprehensive security but may not have the resources to manage multiple security products separately.

87
Q

Cn

A

Common name

88
Q

Idp

A

Identity Ptovider