Acronyms Flashcards
AAA
Authentication
Authorization
Accounting
ABAC
Attribute
Based
Access
Control
AUP
Acceptable
Use
Policy
ACL
Access
Control
List
AP
Access
Point
AD
Active
Directory
ASP
Active
Server
Pages
ARP
Access
Resolution
Protocol
ASLR
Address
Space
Layout
Randomization
AES
Advanced
Encryption
Standard
APT
Advanced
Persistent
Threat
ATT&CK
Adversarial
Tactics
Techniques
&
Common Knowledge
ALE
Annualized
Loss
Expectancy
ARO
Annualized rate occurrence
AV
Anti
Virus
Xaas
Anything
As
A
Service
API
Application
Programming
Interface
ASP
Application
Service
Provider
AEAD
Authenticated
Encryption
With
Associated
Date
AH
Authentication
Header
AIS
Automated
Indicator
Sharing
BASH
Bourne
Again
She’ll
BIOS
Basic
Input
Output
System
BSSID
Basic
Service
Set
Indetifier
BCP
Basic
Continuity
Plan
BGP
Basic
Gateway
Protocol
BIA
Business
Impact
Analysis
BPDU
Bridge
Protocol
Data
Unit
BYOD
Bring
Your
Own
Device
BAC
Business
Availability
Center
BCP
Business
Continuity
Plan
BPA
Business
Partnership
Agreement
CA
Certificate
Authority
CMM
Capability
Maturity
Model
CAPTCHA
Completely
Automated
Public
Turing
Trust
To
Tell
Computer and
Humans
Apart
CASB
Cloud
Access
Security
Broker
CBC
Cipher
Blocking
Chaining
CERT
Computer
Emergency
Response
Team
CEP
Certificate
Enrollment
Protocol
CRL
Certificate
Revocation
List
CSR
Certificate
Signing
Resquest
CHAP
Challenge
Handshake
Authentication
Protocol
CCB
Change
Control
Board
CSU
Channel
Service
Unit
CSO
Chief
Security
Officer
CYOD
Choose
Your
Own
Device
CFB
Cipher
Feed
Back
CCTV
Closed
Circuit
Television
CSP
Cloud
Service
Provider
CN
Common
Name
CAC
Common
Access
Card
CVE
Common
Vulnerability and
Exposures
CVSS
Common
Vulnerability
Scoring
System
CMS
Content
Management
System
CP
Contingency
Planning
COOP
Continuity
Of
Operations
Planning
CAN
Controlled
Area
Network
COPE
Cooperate
Owned
Personally
Enabled
CAR
Corrective
Action
Report
CTM
Counter
Mode
CCMP
Counter mode with
Cipher blocking chaining
Messaging authentication code
Protocol
CRC
Cyclic
Redundancy
Check
CSRF & XSRF
Cross
Site
Request
Forgery
DAC
Discretionary
Access
Control
DEK
Date
Encryption
Key
DES
Data
Encryption
Standard
DEP
Data
Execution
Prevention
DLP
Date
Loss
Prevention
DMZ
Demilitarized
Zone
DOS
Denial
Of
Service
DNAT
Destination
Network
Address
Translation
DHCP
Dynamic
Host
Configuration
Panel
DHE
Diffie
Hellman
Ephemeral
DFIR
Digital
Forensics
Investigation
Response
DSA
Digital
Signature
Algorithm
DSSS
Direct
Sequence
Spread
Spectrum
DRP
Disaster
Recovery
Plan
DAC
Disaster
Access
Control
DER
Distinguished
Encoding
Rules
DN
Distinguished
Name
DDoS
Distributed
Denial
Of service
DNS
Domain
Name
Service/server
DNSSEC
Domain
Name
System
Security
Extensions
DMARC
Domain
Messaging
Authentication
Reporting
Conformance
DLL
Dynamic
Link
Library
EAP
Extensible
Authentication
Protocol
EMI
Electromagnetic
Interference
EMP
Electromagnetic
Pulse
ECB
Electronic
Code
Book
ESN
Electronic
Serial
Number
ECC
Elliptic
Curve
Cryptography
ECDHE
Elliptic
Curve
Diffie
Hellman
Ephemeral
ECDSA
Elliptic
Curve
Digital
Signature
Algorithm