Acronyms Flashcards

1
Q

3DES

A

Triple Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AD

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES256

A

Advanced Encryption Standard 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AIS

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BIOS

A

Basic Input/ Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BPA
Business Partnership Agreement
26
BPDU
Bridge Protocol Data Unit
27
BSSID
Basic Service Set Identifier
28
BYOD
Bring Your Own Device
29
CA
Certificate Authority
30
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
31
CAR
Corrective Action Report
32
CASB
Cloud Access Security Broker
33
CBC
Cipher Block Chaining
34
CBT
Computer-based Training
35
CCMP
Counter-Mode/ CBC-MAC Protocol
36
CCTV
Closed-Circuit Television
37
CERT
Computer Emergency Response Team
38
CFB
Cipher Feedback
39
CHAP
Challenge-Handshake Authentication Protocol
40
CIO
Chief Information Officer
41
CIRT
Computer Incident Response Team
42
CIS
Center for Internet Security
43
CMDB
Configuration Management Database
44
CMS
Content Management System
45
CN
Common Name
46
COOP
Continuity of Operations Planning
47
COPE
Company-owned Personally Enabled
48
CP
Contingency Planning
49
CPU
Central Processing Unit
50
CRL
Certificate Revocation List
51
CSA
Cloud Security Alliance
52
CSIRT
Computer Security Incident Response Team
53
CSO
Chief Security Officer
54
CSP
Cloud Service Provider
55
CSR
Certificate Signing Request
56
CSRF
Cross-Site Request Forgery
57
CTM
Counter-Mode
58
CTO
Chief Technical Officer
59
CVE
Common Vulnerabilities and Exposures
60
CVSS
Common Vulnerability Scoring System
61
CYOD
Choose Your Own Device
62
DAC
Discretionary Access Control
63
DBA
Database Administrator
64
DDoS
Distributed Denial of Service
65
DES
Data Encryption Standard
66
DHCP
Dynamic Host Configuration Protocol
67
DHE
Diffie-Hellman Ephemeral
68
DLL
Dynamic-link Library
69
DLP
Data Loss Prevention
70
DMARC
Domain Message Authentication Reporting and Conformance
71
DNAT
Destination Network Address Translation
72
DNS
Domain Name System
73
DNSSEC
Domain Name System Security Extensions
74
DoS
Denial of Service
75
DPO
Data Protection Officer
76
DRP
Disaster Recovery Plan
77
DSA
Digital Signature Algorithm
78
EAP
Extensible Authentication Protocol
79
ECB
Electronic Code Book
80
ECC
Elliptic-Curve Cryptography
81
ECDHE
Elliptic-curve Diffie-Hellman Ephemeral
82
ECDSA
Elliptic-curve Digital Signature Algorithm
83
EDR
Endpoint Detection and Response
84
EFS
Encrypted File System
85
EOL
End of Life
86
EOS
End of Service
87
ESP
Encapsulating Security Payload
88
ESSID
Extended Service Set Identifier
89
FACL
File System Access Control List
90
FDE
Full Disk Encryption
91
FIM
File Integrity Monitoring
92
FPGA
Field Programmable Gate Array
93
FRR
False Rejection Rate
94
FTP
File Transfer Protocol
95
FTPS
File Transfer Protocol Secure
96
GDPR
General Data Protection Regulation
97
GPG
GNU Privacy Guard
98
GPO
Group Policy Object
99
GPS
Global Positioning System
100
GPU
Graphics Processing Unit
101
GRE
Generic Routing Encapsulation
102
HA
High Availability
103
HDD
Hard Disk Drive
104
HIDS
Host-based Intrusion Detection System
105
HIPS
Host-based Intrusion Prevention System
106
HMAC
Hash-based Message Authentication Code
107
HOTP
HMAC-based One-time Password
108
HSM
Hardware Security Module
109
HSMaaS
Hardware Security Module as a Service
110
HTML
Hypertext Markup Language
111
HTTP
Hypertext Transfer Protocol
112
HTTPS
Hypertext Transfer Protocol Secure
113
HVAC
Heating, Ventilation, and Air Conditioning
114
IaaS
Infrastructure as a Service
115
IAM
Identity and Access Management
116
ICMP
Internet Control Message Protocol
117
ICS
Industrial Control Systems
118
IDEA
International Data Encryption Algorithm
119
IdP
Identity Provider
120
IDS
Intrusion Detection System
121
IEEE
Institute of Electrical and Electronics Engineers
122
IKE
Internet Key Exchange
123
IM
Instant Messaging
124
IMAP4
Internet Message Access Protocol 4
125
IoC
Indicators of Compromise
126
IoT
Internet of Things
127
IP
Internet Protocol
128
IPS
Intrusion Prevention Security
129
IPSec
Internet Protocol Security
130
IR
Incident Response
131
IRP
Incident Response Plan
132
ISFW
Internal Segmentation Firewall
133
ISO
International Organization for Standardization
134
ISP
Internet Service Provider
135
ISSO
Information System Security Officer
136
ITCP
IT Contingency Plan
137
IV
Initialization Vector
138
JSON
JavaScript Object Notation
139
KDC
Key Distribution Center
140
KEK
Key Encryption Key
141
L2TP
Layer 2 Tunneling Protocol
142
LAN
Local Area Network
143
LDAP
Lightweight Directory Access Protocol
144
LEAP
Lightweight Extensible Authentication Protocol
145
MaaS
Monitoring as a Service
146
MAC
Media Access Control
147
MAM
Mobile Application Management
148
MBR
Master Boot Record
149
MD5
Message Digest 5
150
MDF
Main Distribution Frame
151
MDM
Mobile Device Management
152
MFA
Multi-Factor Authentication
153
MFD
Multifunction Device
154
MFP
Multifunction Printer
155
ML
Machine Learning
156
MMS
Multimedia Message Service
157
MS-CHAP
Microsoft Challenge-Handshake Authentication Protocol
158
MSP
Managed Service Provider
159
MSSP
Managed Security Service Provider
160
MTBF
Mean Time Between Failures
161
MTTF
Mean Time to Failure
162
MTTR
Mean Time to Repair
163
NAC
Network Access Control
164
NAS
Network-attached Storage
165
NAT
Network Address Translation
166
NDA
Non-disclosure Agreement
167
NFC
Near-field Communication
168
NFV
Network Function Virtualization
169
NGFW
Next-generation Firewall
170
NG-SWG
Next-generation Secure Web Gateway
171
NIC
Network Interface Card
172
NIDS
Network-based Intrusion Detection System
173
NIPS
Network-based Intrusion Prevention Sytem
174
NIST
National Institute of Standards and Technology
175
NOC
Network Operations Center
176
NTFS
New Technology File System
177
NTLM
New Technology LAN Manager
178
NTP
Network Time Protocol
179
NTPSec
Network Time Protocol Secure
180
OCSP
Online Certificate Status Protocol
181
OID
Object Identifier
182
OS
Operating System
183
OSI
Open Systems Interconnection
184
OSINT
Open-source Intelligence
185
OT
Operational Technology
186
OTA
Over-The-Air
187
OTG
On-The-Go
188
OVAL
Open Vulnerability and Assessment Language
189
OWASP
Open Web Application Security Project
190
PaaS
Platform as a Service
191
PAM
Privileged Access Management
192
PAP
Password Authentication Protocol
193
PAT
Port Address Translation
194
PBKDF2
Password-based Key Derivation Function 2
195
PCAP
Packet Capture
196
PCI DSS
Payment Card Industry Data Security Standard
197
PDU
Power Distribution Unit
198
PEAP
Protected Extensible Access Protocol
199
PED
Portable Electronic Device
200
PFS
Perfect Forward Secrecy
201
PGP
Pretty Good Privacy
202
PHI
Protected Health Information
203
PII
Personally Identifiable Information
204
PIN
Personal Identification Number
205
PIV
Personal Identity Verification
206
PKCS
Public Key Cryptography Standards
207
PKI
Public Key Infrastructure
208
PoC
Proof of Concept
209
POP
Post Office Protocol
210
POTS
Plain Old Telephone Service
211
PPP
Point-to-Point Protocol
212
PPTP
Point-to-Point Tunneling Protocol
213
PSK
Preshared Key
214
PUP
Potentially Unwanted Program
215
QA
Quality Assurance
216
QoS
Quality of Service
217
RA
Registration Authority
218
RAD
Rapid Application Development
219
RADIUS
Remote Authentication Dial-in User Service
220
RAID
Redundant Array of Independent Disks
221
RAM
Random Access Memory
222
RAS
Remote Access Server
223
RAT
Remote Access Trojan
224
RC4
Revist Cipher Version 4
225
RDP
Remote Desktop Protocol
226
RFI
Remote File Inclusion
227
RFID
Radio Frequency Identification
228
ROI
Return on Investment
229
RPO
Recovery Point Objective
230
RSA
Rivest, Shamir, & Adleman
231
RTBH
Remotely Triggered Black Hole
232
RTO
Recovery Time Objective
233
RTOS
Real-Time Operating System
234
RTP
Real-Time Transport Protocol
235
S/MIME
Secure/ Multipurpose Internet Mail Extensions
236
SaaS
Software as a Service
237
SAE
Simultaneous Authentication of Equals
238
SAML
Security Assertions Markup Language
239
SAN
Storage Area Network
240
SCADA
Supervisory Control and Data Acquisition
241
SCAP
Security Content Automation Protocol
242
SCEP
Simple Certificate Enrollment Protocol
243
SDK
Software Development Kit
244
SDLC
Software Development Life Cycle
245
SDLM
Software Development Life Cycle Methodology
246
SDN
Software-defined Networking
247
SDP
Service Delivery Platform
248
SDV
Software-defined Visibility
249
SED
Self-encrypting Drives
250
SFTP
SSH File Transfer Protocol
251
SHA
Secure Hashing Algorithm
252
SIEM
Security Information and Event Management
253
SIM
Subscriber Identity Module
254
SLA
Service-level Agreement
255
SLE
Single Loss Expectancy
256
SMB
Server Message Block
257
SMS
Short Message Service
258
SMTP
Simple Mail Transfer Protocol
259
SMTPS
Simple Mail Transfer Protocol Secure
260
SNMP
Simple Network Management Protocol
261
SOAP
Simple Object Access Protocol
262
SOAR
Security Orchestration, Automation, and Response
263
SoC
System on a Chip
264
SOC
Security Operations Center
265
SOX
Sarbanes Oxley Act
266
SPIM
Spam Over Instant Messaging
267
SQL
Structured Query Language
268
SQLi
SQL Injection
269
SRTP
Secure Real-time Transport Protocol
270
SSH
Secure Shell
271
SSID
Service Set Identifier
272
SSL
Secure Sockets Layer
273
SSO
Single Sign-on
274
SSRF
Server-side Request Forgery
275
STIX
Structured Threat Information eXpression
276
SWG
Secure Web Gateway
277
TACACS+
Terminal Access Controller Access Control System
278
TAXII
Trusted Automated eXchange of Intelligence Information
279
TCP
Transmission Control Protocol
280
TCP/IP
Transmission Control Protocol/ Internet Protocol
281
TKIP
Temporal Key Integrity Protocol
282
TLS
Transfer Layer Secure
283
TOTP
Time-based One Time Password
284
TPM
Trusted Platform Module
285
TSIG
Transaction Signature
286
TTP
Tactics, Techniques, and Procedures
287
UAT
User Acceptance Testing
288
UDP
User Datagram Protocol
289
UEBA
User and Entity Behavior Analytics
290
UEFI
Unified Extensible Firmware Interface
291
UEM
Unified Endpoint Management
292
UPS
Uninterruptible Power Supply
293
URI
Uniform Resource Identifier
294
URL
Universal Resource Locator
295
USB
Universal Serial Bus
296
USB OTG
USB On-The-Go
297
UTM
Unified Threat Management
298
VBA
Visual Basic for Applications
299
VDE
Virtual Desktop Environment
300
VDI
Virtual Desktop Infrastructure
301
VLAN
Virtual Local Area Network
302
VLSM
Variable-Length Subnet Masking
303
VM
Virtual Machine
304
VoIP
Voice Over IP
305
VPC
Virtual Private Cloud
306
VPN
Virtual Private Network
307
WAF
Web Application Firewall
308
WAP
Wireless Access Point
309
WEP
Wired Equivalent Privacy
310
WIDS
Wireless Intrusion Detection System
311
WIPS
Wireless Intrusion Prevention System
312
WLAN
Wireless Local Area Network
313
WORM
Write Once Read Many
314
WPA
WiFi Protected Access
315
WPS
WiFi Protected Service
316
XaaS
Everything as a Service
317
XML
Extensible Markup Language
318
XOR
Exclusive OR
319
XSRF
Cross-site Request Forgery
320
XSS
Cross-site Scripting
321
MSA
Measurement System Analysis