Acronyms Flashcards
APT
Advanced Persistent Threat
BIOS
Basic Input Output System
CAC
Common access card
MFA
Multi Factor Authentication
LDAP
Lightweight Directory Access Protocol
TCP
Transmission Control Protocol
UDP
User Datagram Protocol
IP
Internet Protocol
ARP
Address Resolution Protocol
NDP
Neighbor Discovery Protocol
SRTP
Secure Realtime Transport Protocol
FTP
File Transport Protocol
TFTP
Trivial File Transport Protocol
SSH
Secure Shell
SSL
Secure Sockets Layer
TLS
Transport Layer Security
IPsec
Internet protocol security
SFTP
Secure File Transfer Protocol
SMTP
Simple Mail Transfer Protocol
POP3
Post Office Protocol
IMAP4
Internet message access protocol
NTP
Network Time Protocol
NAC
Network Access Control (under 802.1x)
DLP
Data Loss Prevention
SIEM
Security Information Event Management
HSM
Hardware Security Module
DEP
Data execution Prevention
S/MIME
Secure Multipurpose Internet Mail Extension
DNS
Domain Name Server
VPN
Virtual Private network
DHCP
Dynamic Host Configuration Protocol
SNMPv3
Simple network management Protocol version 3
DMZ
Demilitarized zone
NAT
Network Address Translation
UEFI
Unified Extensible Firmware Interface
SED
Self encrypting Drive
SDN
Software Defined Network
XSS
cross site Scriping
MITM
Man in the middle
DOS
Denial of Service
DDOS
Distributed Denial of Service
AFRL
Air Force Research Lab
ICMP
Internet Control Messaging Protocol
SQL
Structured Query Language
HMAC
Hashed Message Authentication Codes
MAC (#)
Media Access Control
HTTP
Hypertext Transfer protocol
HTTPS
Hypertext Transfer protocol Secure
3DES
Triple Data Encryption Algorithm
Data Encryption Standard
PII
PErsonal Identifiable Information
EAP
Extensible Authentication protocol
TTLS
Tunneled Tranport Layer Secure
ESP
Encapsulating Security Payload
HOTP
HMAC based One time password
IoT
Internet of Things
MAC
Mandatory Access Control
MD5
Messaging Digest 5
MDM
Mobile Device Management
MFD
Multi Function Device
NAC
Network Access Control
NAT
Network Address Translation
NIDS
network based intrusion detection system
NIPS
network based Prevention detection system
LAN
Local Area Network
OOB
out of band
PAP
Password Authentication Protocol
OCSP
Online Certificate Status Protocol
RADIUS
Remote Authentication Dial in User Service
PKI
Public Key Infrastructure
RAT
Remote access Trojan
RTOS
Real time operating system
RAID (1,2,3…)
Redundant array of inexpensive disks
SaaS
Software as a Service
SAML
Security Assertion markup language
SCADA
Supervisory control and data acquisition
SFTP
Secure File Transfer protocol
SHA
Secure hashing algorithm
SSID
Secure set identifier
SOPs
Secure operating procedures
TACACS+
Terminal Access controller Access-control system plus
TOTP
Time based one time password
VLAN
Virtual Local Area Network
WPA
Wi-Fi protected Access
RPO
Recovery Point Objective
NDP
Network Discovery Protocol
VoIP
Voice over internet Protocol
RDP
remote Desktop protocol
ISP
Internet service provider
URL
Uniform Resource Locator
ACL
Access Control Lists
STP
Spanning Tree Protocol
RSTP
Rapid spanning tree protocol
NIC
Network interface cards
AES
Advanced Encryption Standard
AES 256
Advanced Encryption Standard 256 bit
AH
Authentication Header
ALE
Annualized Loss Expectancy
ARO
Annualized Rate of Occurrence
AUP
Acceptable Use Policy
CA
Certificate Authority
CAN
Controller Area Network
CCTV
Closed-circuit television
CHAP
Challenge Handshake Authentication Protocol
CRL
Certification Revocation List
DAC
Discretionary Access control
DLL
Dynamic Link Library
ECC
Elliptic Curve Cryptography
GRE
Generic Routing Encapsulation
HIPS
Host-based Intrusion prevention system
HIDS
Host-based Intrusion detection system
IM
Instant Messaging
KDC
Key distributor Center
L2TP
Layer 2 tunneling protocol
LANMAN
Local area network manager
MAN
Metropolitan area network
MSCHAP
Microsoft Challenge Handshake authentication protocol
MTU
Maximum transmission Unit
NOS
Network Operating system
NTFS
New Technology File System
NTLM
New Technology LANMAN
OVAL
Open vulnerability assessment language
PAT
Port Address Translation
PBX
Private Branch Exchange
PGP
Pretty Good Privacy
PKI
Public Key infrastructure
PPP
Point to point protocol
PPTP
Point to point tunneling protocol
RAD
Rapid Application Development
RAS
Remote access server
RBAC
Rule/Role based access control
RSA
Rivest, Shamir, & Adleman
SCSI
Small computer system interface
WAF
Web application Firewall
NAS
Network attached storage
RAM
Random access memory
SCP
Secure copy protocol
Microsoft RPC
Remote procedure control
ICS
Industrial Control Systems
SoC
Secure Operations Center
SOAP
Simple Object Access Protocol
BIA
Business Impact Analysis
EAP-FAST
Extensible Authentication Protocol - Flexible Authentication via Secure Tunneling
LEAP
Lightweight Extensible Authentication Protocol
PEAP
Protected Extensible Authentication Protocol