Acronyms Flashcards

1
Q

3DES

A

Triple Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES256

A

Advanced Encryption Standards 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ASP

A

Application Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AV

A

Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BAC

A

Business Availability Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BPDU

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BYOD
Bring Your Own Device
26
CA
Certificate Authority
27
CAC
Common Access Card
28
CAN
Controller Area Network
29
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
30
CAR
Collective Action Report
31
CBC
Cipher Block Chaining
32
CCMP
Counter-Mode/CBC-MAC Protocol
33
CCTV
Closed-circuit Television
34
CER
Certificate
35
CER
Cross-over Error Rate
36
CERT
Computer Emergency Response Team
37
CFB
Cipher Feedback
38
CHAP
Challenge Handshake Authentication Protocol
39
CIO
Chief Information Officer
40
CIRT
Computer Incident Response Team
41
CMS
Content Management System
42
COOP
Continuity of Operations Plan
43
COPE
Corporate Owned, Personally Enabled
44
CP
Contingency Planning
45
CRC
Cyclical Redundancy Check
46
CRL
Certificate Revocation List
47
CSIRT
Computer Security Incident Response Team
48
CSO
Chief Security Officer
49
CSP
Cloud Service Provider
50
CSR
Certificate Signing Request
51
CSRF
Cross-site Request Forgery
52
CSU
Channel Service Unit
53
CTM
Counter-Mode
54
CTO
Chief Technology Officer
55
CTT
Counter
56
CYOD
Choose Your Own Device
57
DAC
Discretionary Access Control
58
DBA
Database Administrator
59
DDos
Distributed Denial of Service
60
DEP
Data Execution Prevention
61
DER
Distinguished Encoding Rules
62
DES
Digital Encryption Standard
63
DFIR
Digital Forensics and Investigation Response
64
DHCP
Dynamic Host Configuration Protocol
65
DHE
Data-Handling Electronics
66
DHE
Diffie-Hellman Ephemeral
67
DLL
Dynamic Link Library
68
DLP
Data Loss Prevention
69
DMZ
Demilitarized Zone
70
DNAT
Destination Network Address Transaction
71
DNS
Domain Name Service (Server)
72
DoS
Denial of Service
73
DRP
Disaster Recovery Plan
74
DSA
Digital Signature Algorithm
75
DSL
Digital Subscriber Line
76
DSU
Data Service Unit
77
EAP
Extensible Authentication Protocol
78
ECB
Electronic Code Book
79
ECC
Elliptic Curve Cryptography
80
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
81
ECDSA
Elliptic Curve Digital Signature Algorithm
82
EFS
Encrypted File System
83
EMI
Electromagnetic Interference
84
EMP
Electro Magnetic Pulse
85
ERP
Enterprise Resource Planning
86
ESN
Electronic Serial Number
87
ESP
Encapsulated Security Payload
88
EF
Exposure Factor
89
FACL
File System Access Control List
90
FAR
False Acceptance Rate
91
FDE
Full Disk Encryption
92
FRR
False Rejection Rate
93
FTP
File Transfer Protocol
94
FTPS
Secured File Transfer Protocol
95
GCM
Galpin Counter Mode
96
GPG
Gnu Privacy Guard
97
GPO
Group Policy Object
98
GPS
Global Positioning System
99
GPU
Graphic Processing Unit
100
GRE
Generic Routing Encapsulation
101
HA
High Availability
102
HDD
Hard Disk Drive
103
HIDS
Host-based Intrusion Detection System
104
HIPD
Host-based Intrusion Prevention System
105
HMAC
Hashed Message Authentication Code
106
HOTP
HMAC-based One-Time Password
107
HSM
Hardware Security Module
108
HTML
Hypertext Markup Language
109
HTTP
Hypertext Transfer Protocol
110
HTTPS
Hypertext Transfer Protocol over SSL/TLS
111
HVAC
Heating, Ventilation and Air Conditioning
112
IaaS
Infrastructure as a Service
113
ICMP
Internet Control Message Protocol
114
ICS
Industrial Control Systems
115
ID
Identification
116
IDEA
International Data Encryption Algorithm
117
IDF
Intermediate Distribution Frame
118
IdP
Identity Provider
119
IDS
Intrusion Detection System
120
IEEE
Institute of Electrical and Electronic Engineers
121
IIS
Internet information System
122
IKE
Internet Key Exchange
123
IM
Instant Messaging
124
IMAP4
Internet Message Access Protocol v4
125
IoT
Internet of Things
126
IP
Internet Protocol
127
IPSec
Internet Protocol Security
128
IR
Incident Response
129
IR
Infrared
130
IRC
Internet Relay Chat
131
IRP
Incident Response Plan
132
ISA
Interconnection Security Agreement
133
ISP
Internet Service Provider
134
ISSO
Information Systems Security Officer
135
ITCP
IT Contingency Plan
136
IV
Initialization Vector
137
KDC
Key Distribution Center
138
KEK
Key Encryption Key
139
L2TP
Layer 2 Tunneling Protocol
140
LAN
Local Area Network
141
LDAP
Lightweight Directory Access Protocol
142
LEAP
Lightweight Extensible Authentication Protocol
143
MaaS
Monitoring as a Service
144
MAC
Mandatory Access Control
145
MAC
Media Access Control
146
MAC
Message Authentication Code
147
MAN
Metropolitan Area Network
148
MBR
Master Boot Record
149
MD5
Message Digest 5
150
MDF
Main Distribution Frame
151
MDM
Mobile Device Management
152
MFA
Multi-Factor Authentication
153
MFD
Multi-function Device
154
MITM
Man-in-the-Middle
155
MMS
Multimedia Message Service
156
MOA
Memorandum of Agreement
157
MOU
Memorandum of Understanding
158
MPLS
Multi-protocol Label Switching
159
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
160
MSP
Managed Service Provider
161
MTBF
Mean Time Between Failures
162
MTTF
Mean Time to Failure
163
MTTR
Mean Time to Recover or Mean Time to Repair
164
MTU
Maximum Transmission Unit
165
NAC
Network Access Control
166
NAT
Network Address Translation
167
NDA
Non-disclosure Agreement
168
NFC
Near Field Communication
169
NGAC
Next Generation Access Control
170
NIDS
Network-based Intrusion Detection System
171
NIPS
Network-based Intrusion Prevention System
172
NIST
National Institute of Standards & Technology
173
NTFS
New Technology File System
174
NTLM
New Technology Lan Manager
175
NTP
Network Time Protocol
176
OAUTH
Open Authorization
177
OCSP
Online Certificate Status Protocol
178
OID
Object Identifier
179
OS
Operating System
180
OTA
Over The Air
181
OVAL
Open Vulnerability Assessment Language
182
P12
PKCS #12
183
P2P
Peer to Peer
184
PaaS
Platform as a Service
185
PAC
Proxy Auto Configuration
186
PAM
Pluggable Authentication Modules
187
PAP
Password Authentication Protocol
188
PAT
Port Address Translation
189
PBKDF2
Password-based Key Derivation Function 2
190
PBX
Private Branch Exchange
191
PCAP
Packet Capture
192
PEAP
Protected Extensible Authentication Protocol
193
PED
Personal Electronic Device
194
PEM
Privacy-enhanced Electronic Mail
195
PFS
Perfect Forward Secrecy
196
PFX
Personal Exchange Format
197
PGP
Pretty Good Privacy
198
PHI
Personal Health Information
199
PII
Personally Identifiable Information
200
PIV
Personal Identity Verification
201
PKI
Public Key Infrastructure
202
POODLE
Padding Oracle on Downgrade Legacy Encryption
203
POP
Post Office Protocol
204
POTS
Plain Old Telephone Service
205
PPP
Point-to-Point Protocol
206
PPTP
Point-to-Point Tunneling Protocol
207
PSK
Pre-shared Key
208
PTZ
Pan-Tilt-Zoom
209
RA
Recovery Agent
210
RA
Registration Authority
211
RAD
Rapid Application Development
212
RADIUS
Remote Authentication Dial-in User Server
213
RAID
Redundant Array of Inexpensive Disks
214
RAS
Remote Access Server
215
RAT
Remote Access Trojan
216
RBAC
Rule-based Access Control
217
RC4
Rivest Cipher version 4
218
RDP
Remote Desktop Protocol
219
RFID
Radio Frequency Identifier
220
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
221
ROI
Return on Investment
222
RMF
Risk Management Framework
223
RPO
Recovery Point Objective
224
RSA
Rivest, Shamir, & Adleman
225
RTBH
Remotely Triggered Black Hole
226
RTO
Recovery Time Objective
227
RTOS
Real-time Operating System
228
RTP
Real-time Transport Protocol
229
S/MIME
Secure/Multipurpose Internet Mail Extensions
230
SaaS
Software as a Service
231
SAML
Security Assertions Markup Language
232
SAN
Storage Area Network
233
SAN
Subject Alternative Name
234
SCADA
System Control and Data Acquisition
235
SCAP
Security Content Automation Protocol
236
SCEP
Simple Certificate Enrollment Protocol
237
SCP
Secure Copy
238
SCSI
Small Computer System Interference
239
SDK
Software Development Kit
240
SDLC
Software Development Life Cycle
241
SDLM
Software Development Life Cycle Methodology
242
SDN
Software Defined Network
243
SED
Self-encrypting Drive
244
SEH
Structured Exception Handler
245
SFTP
Secure File Transfer Protocol
246
SHA
Secure Hashing Algorithm
247
SHTTP
Secure Hypertext Transfer Protocol
248
SIEM
Security Information and Event Management
249
SIM
Subscriber Identity Module
250
SLA
Service Level Agreement
251
SLE
Single Loss Expectancy
252
SMB
Server Message Block
253
SMS
Short Message Service
254
SMTP
Simple Mail Transfer Protocol
255
SMTPS
Simple Mail Transfer Protocol Secure
256
SNMP
Simple Network Management Protocol
257
SOAP
Simple Object Access Protocol
258
SoC
System on Chip
259
SPF
Sender Policy Framework
260
SPIM
Spam over Instant Messaging
261
SPoF
Single Point of Failure
262
SQL
Structured Query Language
263
SRTP
Secure Real-Time Protocol
264
SSD
Solid State Drive
265
SSH
Secure Shell
266
SSID
Service Set Identifier
267
SSL
Secure Sockets Layer
268
SSO
Single Sign-on
269
STP
Shielded Twisted Pair
270
TACACS+
Terminal Access Controller Access Control System Plus
271
TCP/IP
Transmission Control Protocol/Internet Protocol
272
TGT
Ticket Granting Ticket
273
TKIP
Temporal Key Integrity Protocol
274
TLS
Transport Layer Security
275
TOTP
Time-based One-time Password
276
TPM
Trusted Platform Module
277
TSIG
Transaction Signature
278
UAT
User Acceptance Testing
279
UAV
Unmanned Aerial Vehicle
280
UDP
User Datagram Protocol
281
UEFI
Unified Extensible Firmware Interface
282
UPS
Uninterruptible Power Supply
283
URI
Uniform Resource Identifier
284
URL
Universal Resource Locater
285
USB
Universal Serial Bus
286
USB OTG
USB On The Go
287
UTM
Unified Threat Management
288
UTP
Unshielded Twisted Pair
289
VDE
Virtual Desktop Environment
290
VDI
Virtual Desktop Infrastructure
291
VLAN
Virtual Local Area Network
292
VLSM
Variable Length Subnet Masking
293
VM
Virtual Machine
294
VoIP
Voice over IP
295
VPN
Virtual Private Network
296
RBAC
Role-Based Access Control
297
VTC
Video Teleconferencing
298
WAF
Web Application Firewall
299
WAP
Wireless Access Point
300
WEP
Wired Equivalent Privacy
301
WIDS
Wireless Intrusion Detection System
302
WIPS
Wireless Intrusion Prevention System
303
WORM
Write Once Read Many
304
WPA
WiFi Protected Access
305
WPA2
WiFi Protected Access 2
306
WPS
WiFi Protected Setup
307
WTLS
Wireless TLS
308
XML
Extensible Markup Language
309
XOR
Exclusive Or
310
XSRF
Cross-site Request Forgery
311
XSS
Cross Site Scripting