Acronyms Flashcards
3DES
Triple Digital Encryption System
AAA
Authentication authorization and accounting
ABAC
Attribute-based access control
ACL
Access control list
AES256
Advanced encryption standards 256
AH
Authentication header
ALE
Annualized loss expectancy
SLE × ARO = ALE
AP
Access point
API
Application program interface
APT
Advanced persistent threat
ARO
Annualized rate of occurrence
ARP
Address resolution protocol
ASLR
Address space layout randomization
ASP
Application service provider
AUP
Acceptance use policy
AV
Antivirus
BAC
Business availability center
BCP
Business continuity planning
BIA
Business impact analysis
BIOS
Basic input/output system
BPA
Business partners agreement
BPDU
Bridge protocol data unit
BYOD
Bring your own device
CA
Certificate authority
CAC
Common access card
CAN
Controller access network
CAPTCHA
Completely automated public tuning test to tell computers and humans apart
CAR
Corrective action report
CBC
Cipher block chaining
CCMP
Counter-mode/CBC-Mac protocol
CCTV
Closed-circuit television
CER
Certificate
CER
Cross-over error rate
CERT
Computer emergency response team
CFB
Cipher feedback
CHAP
Challenge handshake authentication protocol
CIO
Chief information officer
CIRT
Computer incident response team
CMS
Content management system
COOP
Continuity of operations plan
COPE
Corporate owned personally enabled
CP
Contingency plan
CRC
Cyclical redundancy check
CRL
Certificate revocation list
CSIRT
Computer security incident response team
CSO
Chief security officer
CSL
Cloud service provider
CSR
Certificate signing request
CSRF
Cross-site request forgery
CSU
Channel service unit
CTM
Counter-mode
CTO
Chief technology office
CTR
Counter
CYOD
Choose your own device
DAC
Discretionary access control
DBA
Database administrator
DDoS
Distributed denial of service
DEP
Data execution prevention
DER
Distinguished coding rules
DER
Distinguished encoding rules
DES
digital encryption standard
DFIR
Digital investigaron and forensics response
DHCP
Dynamic host configuration protocol
DHE
Data-handling electronics
DHE
Diffie-hellman ephemeral
DLL
Dynamic link library
DLP
Data lots prevention
DMZ
Demilitarized zone
MTBF
Mean time between failures
MTTF
Mean time to failure
MTTR
Meant time to recover/repair
MTU
Maximum transmission unit
NAC
Network access control
NAT
Network access translation
NDA
Non-disclosure agreement
NFC
Near field communication
NGAC
Next generation access control
NIDS
Network-based intrusion detection system
NIPS
Network-based intrusion protection system
NIST
National Institute of Standards and Technology
NTFS
New technology file system
NTLM
New technology LAN manager
NTP
Network time protocol
OAUTH
Open authorization
OCSP
Online certificate status protocol
OID
Object identifier
OS
Operating system
OTA
Over the air
OVAL
Open vulnerability assessment language
P12
PKCS #12
P2P
Peer to peer
PaaS
Platform as a service
PAC
Proxy auto configuration
PAM
Pluggable authentication modules
PAP
Password authentication protocol
PAT
Put address translation
PBKDF2
Paid based key derivation function 2
PBX
Private branch exchange
PCAP
Packet capture
PEAP
Protected extensible authentication protocol
PED
Personal electronic device
PEM
Privacy-enhanced electronic mail
PFS
Perfect forward secrecy
PFX
Personal exchange format
PGP
Pretty good privacy
PHI
Private health information
PII
Personally identifiable information
PIV
Personal identity verification
PKI
Public key infrastructure
POODLE
Padded Oracle on downgrade legacy encryption
POP
Post office protocol
POTS
Plain old telephone service
PPP
Point to point protocol
PPTP
Point to point tunneling protocol
PSK
Pre-shared key
PTZ
Pan tilt zoom
RA
Recovery agent
Or
Registration authority
RAD
Rapid application development
RADIUS
Remote authentication dial-in user service
RAID
Redundant array of inexpensive disks
RAS
Remote access server
RAT
Remote access trojan
RBAC
Role-based access control
Or
Rule-based access control
RC4
Rivest cipher v4
RDP
Remote desktop protocol
RFID
Radio frequency identifier
RIPEMD
RACE integrity primitives evaluation message digest
ROI
Return on investment
RMF
Risk management framework
RPO
Recovery point objective
RSA
Rivest , Shamir, Adleman
RTBH
Remotely triggered black home
RTO
Recovery time objective
RTOS
Real-time operating system
RTP
Real-time transport protocol
S/MIME
Secure/multipurpose internet mail extension
SaaS
Software as a service
SAML
Security assertions markup language
SAN
Storage area network
Or
Subject alternative name
SCADA
System control and date acquisition
SCAP
Security content automation protocol
SCEP
Simple certificate enrollment protocol
SCP
Secure copy
SCSI
Small computer system interface
SDK
Software development kit
SDLC
Software development life cycle
SDLM
Software development life cycle methodology
SDN
Software defined network
SED
Self encrypting drive
SEH
Structured exception handler
SFTP
Secured file transfer protocol
SHA
Secured hashing algorithm
SHTTP
Secure hypertext transfer protocol
SIEM
Secure information and event management
SID
Subscriber identity module
SLA
Service level agreement
SLE
Single loss expectancy
SMB
Server message block
SMS
Short messenger service
SMTP
Simple mail transfer protocol
SMTPS
Simple mail transfer protocol secure
SNMP
Simple network management protocol
SOAP
Simple object access protocol
SoC
System on chip
SPF
Sender policy framework
SPIM
Spam over internet message
SPoF
Single point of failure
SQL
Structured query language
SRTP
Secure real-time protocol
SSD
Solid state drive
SSH
Secure shell
SSID
Service set identifier
SSL
Secure sockets layer
SSO
Single sign-on
STP
Shielded twisted pair
TACAS+
Terminal access controller access control system plus
TCP/IP
Transmission control protocol/internet protocol
TGT
Ticket granted ticket
TKIP
Temporary key integrity protocol
TSL
Transport layer security
TOTP
Time-based on-time password
TPM
Trusted platform module
TSIG
Transaction signature
UAT
User acceptance testing
UAV
Unmanned aerial vehicle
UDP
User datagram protocol
UEFI
Unified extensible firmware interface
UPS
Uninterruptible power supply
URI
Uniform resource identifier
URL
Universal resource locator
USB
Universal serial bus
USB OTG
USB on the go
UTM
Unified threat management
UTP
Unshielded twisted pair
VDE
Virtual desk environment
VDI
Virtual desk infrastructure
VLAN
Virtual local area network
VLSM
variable length subnet masking
VM
Virtual machine
VoIP
Voice over IP
VPN
Virtual private network
VTC
Video teleconferencing
WAF
Web application firewall
WAP
Wireless access point
WEP
Wired equivalency privacy
WIDS
Wireless intrusion detection system
WIPS
Wireless intrusion prevention system
WORM
Write once read many
WPA
Wi-fi protected access
WPA2
Wi-fi protected access 2
WPS
Wi-fi protected setup
WTLS
Wireless TLS
XML
Extensible markup language
XOR
Exclusive OR
XSRF
Cross-sir request forgery
XSS
Cross-site scripting