Acronyms Flashcards
ACL
Access Control List
API
Application Programming Interface
APT
Advanced Persistent Threat
ARP
Address Resolution Protocol
AV
Antivirus
BC
Business Continuity
BCP
Business Continuity Plan
BGP
Border Gateway Protocol
BIA
Business Impact Analysis
C2
Command and Control
CA
Certificate Authority
CASB
Cloud Access Security Broker
CDN
Content Delivery Network
CERT
Computer Emergency Response Team
CHD
Cardholder Data
CI/CD
Continuous Integration and Continuous
Delivery
CIS
Center for Internet Security
COBIT
Control Objectives for Information and
Related Technologies
CSIRT
Cybersecurity Incident Response Team
CSRF
Cross-site Request Forgery
CVE
Common Vulnerabilities and Exposures
CVSS
Common Vulnerability Scoring System
DDoS
Distributed Denial of Service
DKIM
Domain Keys Identified Mail
DLP
Data Loss Prevention
DMARC
Domain-based Message Authentication,
Reporting and Conformance
DNS
Domain Name Service
DoS
Denial of Service
DR
Disaster Recovery
EDR
Endpoint Detection and Response
FIM
File Integrity Monitoring
FTP
File Transfer Protocol
GDB
GNU Debugger
GPO
Group Policy Objects
HIDS
Host-based Intrusion Detection System
HIPS
Host-based Intrusion Prevention System
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol Secure
IaaS
Infrastructure as a Service
ICMP
Internet Control Message Protocol
ICS
Industrial Control Systems
IDS
Intrusion Detection System
IoC
Indicators of Compromise
IP
Internet Protocol
IPS
Intrusion Prevention System
IR
Incident Response
ISO
International Organization for
Standardization
IT
Information Technology
ITIL
Information Technology Infrastructure
Library
JSON
JavaScript Object Notation
KPI
Key Performance Indicator
LAN
Local Area Network
LDAPS
Lightweight Directory Access Protocol Secure
LFI
Local File Inclusion
LOI
Letter of Intent
MAC
Media Access Control
MFA
Multifactor Authentication
MOU
Memorandum of Understanding
MSF
Metasploit Framework
MSP
Managed Service Provider
MSSP
Managed Security Service Provider
MTTD
Mean Time to Detect
MTTR
Mean Time to Repair
NAC
Network Access Control
NDA
Non-disclosure Agreement
NGFW
Next-generation Firewall
NIDS
Network-based Intrusion Detection System
NTP
Network Time Protocol
OpenVAS
Open Vulnerability Assessment Scanner
OS
Operating System
OSSTMM
Open Source Security Testing
Methodology Manual
OT
Operational Technology
OWASP
Open Web Application Security Project
PAM
Privileged Access Management
PCI DSS
Payment Card Industry Data Security
Standard
PHP
Hypertext Preprocessor
PID
Process Identifier
PII
Personally Identifiable Information
PKI
Public Key Infrastructure
PLC
Programmable Logic Controller
POC
Proof of Concept
RCE
Remote Code Execution
RDP
Remote Desktop Protocol
REST
Representational State Transfer
RFI
Remote File Inclusion
RXSS
Reflected Cross-site Scripting
SaaS
Software as a Service
SAML
Security Assertion Markup Language
SASE
Secure Access Secure Edge
SCADA
Supervisory Control and Data Acquisition
SDLC
Software Development Life Cycle
SDN
Software-defined Networking
SFTP
Secure File Transfer Protocol
SIEM
Security Information and Event Management
SLA
Service-level Agreement
SLO
Service-level Objective
SMB
Server Message Block
SMTP
Simple Mail Transfer Protocol
SNMP
Simple Network Management Protocol
SOAR
Security Orchestration, Automation, and
Response
SOC
Security Operations Center
SPF
Sender Policy Framework
SQL
Structured Query Language
SSL
Secure Sockets Layer
SSO
Single Sign-on
SSRF
Server-side Request Forgery
STIX
Structured Threat Information Expression
SWG
Secure Web Gateway
TCP
Transmission Control Protocol
TFTP
Trivial File Transfer Protocol
TLS
Transport Layer Security
TRACE
Trade Reporting and Compliance Engine
TTP
Tactics, Techniques, and Procedures
UEBA
User and Entity Behavior Analytics
URI
Uniform Resource Identifier
URL
Uniform Resource Locator
USB
Universal Serial Bus
VLAN
Virtual LAN
VM
Virtual Machine
VPN
Virtual Private Network
WAF
Web Application Firewall
WAN
Wide Area Network
XDR
Extended Detection Response
XML
Extensible Markup Language
XSS
Cross-site Scripting
XXE
XML External Entity
ZAP
Zed Attack Proxy
ZTNA
Zero Trust Network Access