Acronyms Flashcards
3DES
Triple Data Encryption Algorithm
ACL
Access Control List
AES
Advanced Encryption Standard
API
Application Programming Interface
ARP
Address Resolution Protocol
APT
Advanced Persistent Threat
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge
AUP
Acceptable Use Policy
BEC
Business Email Compromise
BYOD
Bring Your Own Device
CA
Certificate Authority
CAN
Controller Area Network
CASB
Cloud Access Security Broker
CI/CD
Continuous Integration/Continuous Delivery
CIS
Center for Internet Security
COBIT
Control Objectives for Information and Related Technology
CPU
Central Processing Unit
CRM
Customer Relations Management
CVSS
Common Vulnerability Scoring System
DDoS
Distributed Denial of Service
DGA
Domain Generation Algorithm
DHCP
Dynamic Host Configuration Protocol
DKIM
Domain Keys Identified Mail
DLP
Data Loss Prevention
DMARC
Domain-based Message Authentication, Reporting, and Conformance
DMZ
Demilitarized Zone
DNS
Domain Name System
DNSSEC
Domain Name System Security Extensions
DOM
Document Object Model
DRM
Digital Rights Management
EDR
Endpoint Detection and Response
ELK
Elasticsearch, Logstash, Kibana
ERP
Enterprise Resource Planning
FaaS
Function as a Service
FPGA
Field-programmable Gate Array
FTK
Forensic Toolkit
FTP
File Transfer Protocol
HIDS
Host Intrusion Detection System
HIPS
Host Intrusion Prevention System
HSM
Hardware Security Module
HTTP
Hypertext Transfer Protocol
IaaS
Infrastructure as a Service
IaC
Infrastructure as Code
ICMP
Internet Control Message Protocol
IDS
Intrusion Detection System
IMAP
Internet Message Access Protocol
IoC
Indicator of Compromise
IoT
Internet of Things
IP
Internet Protocol
IPS
Intrusion Prevention System
ISAC
Information Sharing and Analysis Center
ISO
International Organization for Standardization
ITIL
Information Technology Infrastructure Library
LAN
Local Area Network
LDAP
Lightweight Directory Access Protocol
MaaS
Monitoring as a Service
MAC
Mandatory Access Control
MD5
Message Digest 5
MDM
Mobile Device Management
MFA
Multifactor Authentication
MOA
Memorandum of Agreemnent
MOU
Memorandum of Understanding
MRTG
Multi Router Traffic Grapher
NAC
Network Access Control
NAS
Network-attached Storage
NAT
Network Address Translation
NDA
Non-disclosure Agreement
NIC
Network Interface Card
NIDS
Network Intrusion Detection System
NIST
National Institute of Standards and Technology
OEM
Original Equipment Manafacturer
OSSIM
Open Source Security Information Management
OVAL
Open Vulnerability and Assessment Language
OWASP
Open Web Application Security Project
PaaS
Platform as a Service
PAM
Pluggable Authentication Module
PCAP
Packet Capture
PCI
Payment Card industry
PHI
Personal Health Information
PID
Process Identification Number
PII
Personally Identifiable Information
PKI
Public Key Infrastructure
RADIUS
Remote Authentication Dial-in User Service
RDP
Remote Desktop Protocol
REST
Representational State Transfer
RTOS
Real-time Operating System
SaaS
Software as a Service
SAML
Security Assertions Markup Language
SCADA
Supervisory Control and Data Acquisition
SCAP
Security Content Automation Protocol
SDLC
Software Development Life Cycle
SFTP
SSH File Transfer Protocol
SHA
Secure Hash Algorithm
SIEM
Security Information and Event Management
SLA
Service Level Agreement
SMB
Secure Message Block
SOAP
Simple Object Access Protocol
SOAR
Security Orchestration, Automation, and Response
SOC
Security Operations Center
SoC
System on Chip
SPF
Sender Policy Framework
SPI
Sensitive Personal Information
SQL
Structured Query Language
SSH
Secure Shell
SSHD
Solid-state Hybrid Drive
SSID
Service Set Identifier
SSL
Secure Sockets Layer
SSO
Single Sign-On
STIX
Structured Threat Information eXpression
TACACS+
Terminal Access Controller Access Control System Plus
TAXII
Trusted Automated eXchange of Intelligence Information
TCP
Transmission Control Protocol
TFTP
Trivial File Transfer Protocol
TLS
Transport Layer Security
TPM
Trusted Platform Module
UDP
User Datagram Protocol
UEBA
User and Entity Behavior Analytics
UEFI
Unified Extensible Firmware Interface
UEM
Unified Endpoint Management
URL
Uniform Resource Locator
USB
Universal Serial Bus
UTM
Unified Threat Management
VDI
Virtual Desktop Infrastructure
VLAN
Virtual Local Area Network
VoIP
Voice over Internet Protocol
VPC
Virtual Private Cloud
VPN
Virtual Private Network
WAF
Web Application Firewall
WAN
Wide Area Network
XML
Extensible Markup Language
XSS
Cross-site Scripting
ZAP
Zed Attack Proxy