Acronyms Flashcards
DDoS
Distributed Denial of Service (Chapter 7)
NOP
No Operation (Chapter 7)
XSS
Cross Site Scripting (Chapter 7)
XSRF
Cross Site Request Forgery (Chapter 7)
SHA
Secure Hash Algorithm (Chapter 10)
AES
Advanced Encryption Standard (Chapter 10)
DES
Data Encryption Standard (Chapter 10)
RC4
Rivest Cipher 4 (Chapter 10)
MD5
Message Digest 5 (Chapter 10)
HMAC
Hash-Based Message Authentication Code (Chapter 10)
PGP
Pretty Good Privacy (Chapter 10)
ECC
Elliptic Curve Cryptography (Chapter 10)
RSA
Rivest, Shamir & Adleman (Chapter 10)
RTO
Recovery Time Objective (Chapter 9)
RPO
Recovery Point Objective (Chapter 9)
MTBF
Mean Time Between Failures (Chapter 9)
MTTR
Mean Time To Recover (Chapter 9)
ALE
Annual Loss Expectancy (Chapter 8)
SLE
Single Loss Expectancy (Chapter 8)
ARO
Annual Rate of Occurrence (Chapter 8)
PAT
Port Address Translation
NAT
Network Address Translation
ISP
Internet Service Provider
LAN
Local Area Network
CISO
Chief Information Security Officer
HIDS
Host Based Intrusion Detection System
NIPS
Network Based Intrusion Prevention System
IDS
Intrusion Detection System
CTO
Chief Technical Officer
FQDN
Fully Qualified Domain Name
UTM
Unified Threat Management
WAF
Web Application Firewall
NGFW
Next Generation Firewall
XML
Extensible Markup Language (Chapter 7)
LDAP
Lightweight Directory Application Protocol (Chapter 7)
CIA
Confidentiality, Integrity, Availability
WPA2
Wi-Fi Protected Access 2 (Chapter 5)
TPM
Trusted Platform Module (Chapter 5)
VSAN
Virtual Storage Area Network (Chapter 5)
EFS
Encrypting File System (Chapter 5)
HSM
Hardware Security Module (Chapter 5)
DLP
Data Loss Prevention (Chapter 5)
IaaS
Infrastructure as a Service (Chapter 5)
SaaS
Software as a Service
NAC
Network Access Control (Chapter 4)
CVE
Common Vulnerabilities and Exposures (Chapter 4)
TKIP
Temporal Key Integrity Protocol (Chapter 4)
SSID
Service Set Identifier (Chapter 4)
CCMP
Counter Mode Cipher Block Chaining Message Authentication Code Protocol (Chapter 4)
PPTP
Point to Point Tunneling Protocol
SFTP
Secure File Transfer Protocol
NFC
Near Field Communication (Chapter 4)
SCP
Secure Copy
SQL
Structured Query Language
LSO
Locally Shared Objects
IV
Initialization Vector
RFID
Radio Frequency Identification
MaaS
Monitoring as a Service
BCP
Business Continuity Plan
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
PBKDF2
Password-Based Key Derivation Function 2