Acronyms Flashcards
Remember the acronyms for Security+ 701
Acronym
Combined
DLP
Data Loss Prevention: A strategy for making sure that end users do not send sensitive or critical information outside the corporate network.
AES-256
Advanced Encryption Standards 256-bit: A variant of AES using a 256-bit key size, offering the highest level of encryption in the AES family.
MDM
Mobile Device Management: Software that allows IT administrators to control, secure, and enforce policies on smartphones, tablets, and other endpoints. It’s crucial for organizations implementing BYOD policies.
POTS
Plain Old Telephone Service: The voice-grade telephone service that remains the basic form of residential and small business service connection to the telephone network in many parts of the world. It’s being gradually replaced by VoIP services.
NGFW
Next-generation Firewall: A network security device that combines traditional firewall capabilities with other network device filtering functions. It often includes features like application awareness and control, integrated intrusion prevention, and cloud-delivered threat intelligence.
ECC
Elliptic Curve Cryptography: An approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.
STIX
Structured Threat Information eXchange: A standardized language for sharing cyber threat intelligence. It’s used to share actionable threat intelligence across organizations.
SoC
System on Chip: An integrated circuit that integrates all or most components of a computer or other electronic system. It’s widely used in embedded systems and mobile devices.
SIM
Subscriber Identity Module: An integrated circuit that securely stores the international mobile subscriber identity and its related key. It’s used in mobile phones to authenticate subscribers.
SAN
Subject Alternative Name: An extension to X.509 that allows various values to be associated with a security certificate. It’s often used to specify additional domains and IP addresses protected by an SSL certificate.
NFC
Near Field Communication: A set of communication protocols that enable two electronic devices to establish communication by bringing them within about 4 cm of each other. It’s often used for contactless payment systems and similar applications.
WEP
Wired Equivalent Privacy: A security algorithm for IEEE 802.11 wireless networks. It’s been deprecated due to security weaknesses.
SLE
Single Loss Expectancy: A dollar figure that is associated with a single event of data loss. It’s used in risk assessment calculations.
WTLS
Wireless Transport Layer Security: A security protocol part of the Wireless Application Protocol (WAP) stack. It’s the wireless equivalent of the Transport Layer Security (TLS) protocol.
BCP
Business Continuity Planning: The process of creating systems of prevention and recovery to deal with potential threats to a company.
CVE
Common Vulnerability Enumeration: A list of publicly disclosed computer security flaws, each with an identification number.
PBX
Private Branch Exchange: A telephone system within an enterprise that switches calls between enterprise users on local lines while allowing all users to share a certain number of external phone lines. It’s used to manage internal and external communications in organizations.
PAP
Password Authentication Protocol: A simple authentication protocol where a user’s password is sent unencrypted over the network. Due to its lack of security, it’s generally only used as a last resort when other protocols are not available.
P2P
Peer to Peer: A distributed application architecture that partitions tasks or workloads between peers. It’s commonly used for file sharing and cryptocurrency networks.
RAS
Remote Access Server: A server that provides remote access connectivity to an organization’s internal network. It allows remote users to access network resources as if they were directly connected to the corporate network.
RAT
Remote Access Trojan: A malware program that includes a back door for administrative control over the target computer. It’s often used by cybercriminals to gain unauthorized access to systems.
ARP
Address Resolution Protocol: A protocol used for discovering the link layer address associated with a given IPv4 address.
DPO
Data Privacy Officer: An enterprise security leadership role required by the General Data Protection Regulation (GDPR).