Acronyms Flashcards

1
Q

3DES

A

Triple Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication Authorization and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES256

A

Advanced Encryption Standards 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ASP

A

Application Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AUP

A

Accepted Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BAC

A

Business Availability Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BIA

A

Business Impact analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BPDU

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CAC

A

Common Access Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CAN

A

Controller Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CAPTCHA

A

Completely Automated Public Turing Test to Tell Computers and Humans Apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CAR
Corrective Action Report
26
CCMP
Counter-Mode/CBC-Mac Protocol
27
CCTV
Closed-Circuit Television
28
CERT
Computer Emergency Response Team
29
CFB
Cipher Feedback
30
CHAP
Challenge Handshake Authentication Protocol
31
CIO
Chief Information Officer
32
CIRT
Computer Incident Response Team
33
CMS
Content Management System
34
COOP
Continuity of Operation Planning
35
CP
Continuity Planning
36
CRC
Cyclical Redundancy Check
37
CRL
Certificate Signing Request
38
CSP
Cloud Service Provider
39
CSP
Control Status Register
40
CSRF
Cross Site Request Forgery
41
CSU
Channel Service Unit
42
CTO
Chief Technology Officer
43
DAC
Discretionary Access Control
44
DBA
Database Administrator
45
DDOS
Distributed Denial of Service
46
DEP
Data Execution Prevention
47
DES
Digital Encryption Standard
48
DHCP
Dynamic Host Configuration Protocol
49
DHE
Data-Handling Electronics
50
DHE
Diffie-Hellman Ephemeral
51
DLL
Dynamic Link Library
52
DLP
Data Loss Prevention
53
DMZ
Demilitarized Zone
54
DNAT
Destination Network Address Translation
55
DNS
Domain Name Service (Server)
56
DOS
Denial of Service
57
DRP
Disaster Recovery Plan
58
DSA
Digital Signature Algorithm
59
DSL
Digital Subscriber Line
60
DSU
Data Service Unit
61
EAP
Extensible Authentication Protocol
62
ECC
Elliptical Curve Cryptography
63
ECDHE
Elliptical Curve Cryptography
64
ECDSA
Elliptical Curve Digital Signature Algorithm
65
EFS
Encrypted File System
66
EMI
Electromagnetic Interference
67
ESN
Electronic Serial Number
68
ESP
Encapsulated Security Payload
69
FACL
File System Access Control List
70
FDE
Full Disk Encryption
71
FTP
File Transfer Protocol
72
FTPS
Secured File Transfer Protocol
73
GCM
Galois Counter Mode
74
GPG
Gnu Privacy Guard
75
GPO
Group Policy Object
76
GPS
Global Positioning System
77
GPU
Graphic Processing Unit
78
GRE
Generic Routing Encapsulation
79
HDD
Hard Disk Drive
80
HIDS
Host Based Intrusion Detection System
81
HIPS
Host Based Intrusion Prevention System
82
HMAC
Hashed Message Authentication Code
83
HOTP
HMAC based One Time Password
84
HSM
Hardware Security Module
85
HTML
Hyptertext Markup Language
86
HTTP
Hypertext Transfer Protocol
87
HTTPS
Hypertext Transfer Protocol over SSL
88
HVAC
Heating, Ventilation Air Conditioning
89
IaaS
Infrastructure as a Service
90
ICMP
Internet Control Message Protocol
91
ICS
Industrial Control Systems
92
ID
Identification
93
IDF
Intermediate Distribution Frame
94
IdP
Identity Provider
95
IDS
Intrusion Detection System
96
IKE
Internet Key Exchange
97
IM
Instant Messaging
98
IMAP4
Internet Message Access Protocol Version 4
99
IP
Internet Protocol
100
IPSEC
Internet Protocol Security
101
IR
Incident Response
102
IRC
Internet Relay Chat
103
IRP
Incident Response Procedure
104
ISA
Interconnection Security Agreement
105
ISP
Internet Service Provider
106
ISSO
Information Systems Security Officer
107
IV
Initialization Vector
108
JBOD
Just a Bunch of Disks
109
KDC
Key Distribution Center
110
KEK
Key Encryption Key
111
L2TP
Layer 2 Tunneling Protocol
112
LAN
Local Area Network
113
LDAP
Lightweight Directory Access Protocol
114
LEAP
Lightweight Extensible Authentication Protocol
115
MaaS
Monitoring as a Service
116
MAC
Mandatory Access Control / Media Access Control
117
MAC
Message Authentication Code
118
MAN
Metropolitan Area Network
119
MBR
Master Boot Record
120
MD5
Message Digest 5
121
MDF
Main Distribution Frame
122
MITM
Man in the Middle
123
MOU
Memorandum of Understanding
124
MPLS
Multi-Protocol Layer Switch
125
MSCHAP
Microsoft Challenge Hanshake Authentication Protocol
126
MTBF
Mean Time Between Failures
127
MTTR
Mean Time to Recover
128
MTTF
Mean Time to Failure
129
MTU
Maximum Transmission Unit
130
NAC
Network Access Control
131
NAT
Network Address Translation
132
NDA
Non-Disclosure Agreement
133
NFC
Near Field Communication
134
NIDS
Network Based Intrusion Detection System
135
NIPS
Network Based Intrusion Prevention System
136
NIST
National Institute of Standards & Technology
137
NOS
Network Operating System
138
NTFS
New Technology File System
139
NTLM
New Technology LANMAN
140
NTP
Network Time Protocol
141
OAUTH
Open Authorization
142
OCSP
Online Certificate Status Protocol
143
OLA
Open License Agreement
144
OS
Operating System
145
OVAL
Open Vulnerability Assessment Language
146
P2P
Peer to Peer
147
PAC
Proxy Auto Configuration
148
PAM
Pluggable Authentication Modules
149
PAP
Password Authentication Protocol
150
PAT
Port Address Translation
151
PBKDF2
Password Based Key Derivation Function 2
152
PBX
Private Branch Exchange
153
PCAP
Packet Capture
154
PEAP
Protected Extensible Authentication Protocol
155
PED
Personal Electronic Device
156
PFS
Perfect Forward Security
157
PGP
Pretty Good Privacy
158
PII
Personally Identifiable Information
159
PIV
Personal Identity Verification
160
PKI
Public Key Infrastructure
161
POTS
Plain Old Telephone Service
162
PPP
Point to Point Protocol
163
PPTP
Point to Point Tunneling Protocol
164
PSK
Pre-Shared Key
165
PTZ
Pan-Tilt-Zoom
166
RA
Recovery Agent
167
RA
Registration Agent
168
RAD
Rapid Application Development
169
RADIUS
Remote Authentication Dial-In User Service
170
RAID
Redundant Array of Inexpensive Disks
171
RAS
Remote Access Server
172
RBAC
Role-Based Access Control
173
RBAC
Rule-Based Access Control
174
RC4
RSA Variable Key Size Encryption Algorithm
175
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
176
ROI
Return on Investment
177
RPO
Recovery Point Objective
178
RSA
Rivest, Shamir, & Adleman
179
RTO
Recovery Time Objective
180
RTP
Real-Time Transport Protocol
181
S/MIME
Secure/Multipurpose Internet Mail Extensions
182
SAML
Security Assertions Markup Language
183
SaaS
Software as a Service
184
SAN
Storage Area Network
185
SCADA
System Control and Data Acquisition
186
SCAP
Security Content Automation Protocol
187
SCEP
Simple Certificate Enrollment Protocol
188
SCSI
Small Computer System Interface
189
SDLC
Software Development Life Cycle
190
SDLM
Software Development Life Cycle Methodology
191
SEH
Structured Exception Handler
192
SHA
Secure Hashing Algorithm
193
SFTP
Secured File Transfer Protocol
194
SIEM
Security Information and Event Management
195
SIM
Subscriber Identity Module
196
SLA
Service Level Agreement
197
SLE
Single Loss Expectancy
198
SMS
Short Message Service
199
SMTP
Simple Mail Transport Protocol
200
SMTPS
Simple Mail Transport Protocol Secure
201
SNMP
Simple Network Management Protocol
202
SOAP
Simple Object Access Protocol
203
SONET
Synchronous Optical Network Technologies
204
SPIM
Spam over Internet Messaging
205
SQL
Structured Query Language
206
SSD
Solid State Drive
207
SSH
Secure Shell
208
SSL
Secure Sockets Layer
209
SSO
Single Sign On
210
STP
Shielded Twisted Pair
211
TACACS+
Terminal Access Controller Access Control System
212
TCP/IP
Transmission Control Protocol
213
TGT
Ticket Granting Ticket
214
TKIP
Temporal Key Integrity Protocol
215
TLS
Transport Layer Security
216
TOTP
Time Based One Time Password
217
TPM
Trusted Platform Module
218
TSIG
Transaction Signature
219
UAT
User Acceptance Testing
220
UEFI
Unified Extensible Firmware Interface
221
UDP
User Datagram Protocol
222
UPS
Uninterruptable Power Supple
223
URI
Uniform Resource Identifier
224
URL
Universal Resource Locator
225
USB
Universal Serial Bus
226
UTM
Unified Threat Management
227
UTP
Unshielded Twisted Pair
228
VDI
Virtualization Desktop Infrastructure
229
VLAN
Virtual Local Area Network
230
VLSM
Variable Length Subnet Masking
231
VoIP
Voice over IP
232
VPN
Virtual Private Network
233
VTC
Video Teleconferencing
234
WAF
Web-Application Firewall
235
WAP
Wireless Access Point
236
WEP
Wired Equivalency Protocol
237
WIDS
Wireless Intrusion Detection System
238
WIPS
Wireless Intrusion Prevention System
239
WPA
Wireless Protected Access
240
WPA2
WiFi Protected Access 2
241
WPS
WiFi Protected Setup
242
WTLS
Wireless TLS
243
XML
Extensible Markup Language
244
XSRF
Cross-Site Request Forgery
245
XSS
Cross-Site Scripting