Acronyms Flashcards

1
Q

3DES

A

Triple Digital Encryption System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication authorization and accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES256

A

Advanced encryption standards 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AH

A

Authentication header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ALE

A

Annualized loss expectancy

SLE × ARO = ALE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AP

A

Access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

API

A

Application program interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

APT

A

Advanced persistent threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARO

A

Annualized rate of occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP

A

Address resolution protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ASLR

A

Address space layout randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASP

A

Application service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AUP

A

Acceptance use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BAC

A

Business availability center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BCP

A

Business continuity planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BIA

A

Business impact analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BIOS

A

Basic input/output system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BPA

A

Business partners agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BPDU

A

Bridge protocol data unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BYOD

A

Bring your own device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CA

A

Certificate authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CAC
Common access card
26
CAN
Controller access network
27
CAPTCHA
Completely automated public tuning test to tell computers and humans apart
28
CAR
Corrective action report
29
CBC
Cipher block chaining
30
CCMP
Counter-mode/CBC-Mac protocol
31
CCTV
Closed-circuit television
32
CER
Certificate
33
CER
Cross-over error rate
34
CERT
Computer emergency response team
35
CFB
Cipher feedback
36
CHAP
Challenge handshake authentication protocol
37
CIO
Chief information officer
38
CIRT
Computer incident response team
39
CMS
Content management system
40
COOP
Continuity of operations plan
41
COPE
Corporate owned personally enabled
42
CP
Contingency plan
43
CRC
Cyclical redundancy check
44
CRL
Certificate revocation list
45
CSIRT
Computer security incident response team
46
CSO
Chief security officer
47
CSL
Cloud service provider
48
CSR
Certificate signing request
49
CSRF
Cross-site request forgery
50
CSU
Channel service unit
51
CTM
Counter-mode
52
CTO
Chief technology office
53
CTR
Counter
54
CYOD
Choose your own device
55
DAC
Discretionary access control
56
DBA
Database administrator
57
DDoS
Distributed denial of service
58
DEP
Data execution prevention
59
DER
Distinguished coding rules
60
DER
Distinguished encoding rules
61
DES
digital encryption standard
62
DFIR
Digital investigaron and forensics response
63
DHCP
Dynamic host configuration protocol
64
DHE
Data-handling electronics
65
DHE
Diffie-hellman ephemeral
66
DLL
Dynamic link library
67
DLP
Data lots prevention
68
DMZ
Demilitarized zone
69
MTBF
Mean time between failures
70
MTTF
Mean time to failure
71
MTTR
Meant time to recover/repair
72
MTU
Maximum transmission unit
73
NAC
Network access control
74
NAT
Network access translation
75
NDA
Non-disclosure agreement
76
NFC
Near field communication
77
NGAC
Next generation access control
78
NIDS
Network-based intrusion detection system
79
NIPS
Network-based intrusion protection system
80
NIST
National Institute of Standards and Technology
81
NTFS
New technology file system
82
NTLM
New technology LAN manager
83
NTP
Network time protocol
84
OAUTH
Open authorization
85
OCSP
Online certificate status protocol
86
OID
Object identifier
87
OS
Operating system
88
OTA
Over the air
89
OVAL
Open vulnerability assessment language
90
P12
PKCS #12
91
P2P
Peer to peer
92
PaaS
Platform as a service
93
PAC
Proxy auto configuration
94
PAM
Pluggable authentication modules
95
PAP
Password authentication protocol
96
PAT
Put address translation
97
PBKDF2
Paid based key derivation function 2
98
PBX
Private branch exchange
99
PCAP
Packet capture
100
PEAP
Protected extensible authentication protocol
101
PED
Personal electronic device
102
PEM
Privacy-enhanced electronic mail
103
PFS
Perfect forward secrecy
104
PFX
Personal exchange format
105
PGP
Pretty good privacy
106
PHI
Private health information
107
PII
Personally identifiable information
108
PIV
Personal identity verification
109
PKI
Public key infrastructure
110
POODLE
Padded Oracle on downgrade legacy encryption
111
POP
Post office protocol
112
POTS
Plain old telephone service
113
PPP
Point to point protocol
114
PPTP
Point to point tunneling protocol
115
PSK
Pre-shared key
116
PTZ
Pan tilt zoom
117
RA
Recovery agent Or Registration authority
118
RAD
Rapid application development
119
RADIUS
Remote authentication dial-in user service
120
RAID
Redundant array of inexpensive disks
121
RAS
Remote access server
122
RAT
Remote access trojan
123
RBAC
Role-based access control Or Rule-based access control
124
RC4
Rivest cipher v4
125
RDP
Remote desktop protocol
126
RFID
Radio frequency identifier
127
RIPEMD
RACE integrity primitives evaluation message digest
128
ROI
Return on investment
129
RMF
Risk management framework
130
RPO
Recovery point objective
131
RSA
Rivest , Shamir, Adleman
132
RTBH
Remotely triggered black home
133
RTO
Recovery time objective
134
RTOS
Real-time operating system
135
RTP
Real-time transport protocol
136
S/MIME
Secure/multipurpose internet mail extension
137
SaaS
Software as a service
138
SAML
Security assertions markup language
139
SAN
Storage area network Or Subject alternative name
140
SCADA
System control and date acquisition
141
SCAP
Security content automation protocol
142
SCEP
Simple certificate enrollment protocol
143
SCP
Secure copy
144
SCSI
Small computer system interface
145
SDK
Software development kit
146
SDLC
Software development life cycle
147
SDLM
Software development life cycle methodology
148
SDN
Software defined network
149
SED
Self encrypting drive
150
SEH
Structured exception handler
151
SFTP
Secured file transfer protocol
152
SHA
Secured hashing algorithm
153
SHTTP
Secure hypertext transfer protocol
154
SIEM
Secure information and event management
155
SID
Subscriber identity module
156
SLA
Service level agreement
157
SLE
Single loss expectancy
158
SMB
Server message block
159
SMS
Short messenger service
160
SMTP
Simple mail transfer protocol
161
SMTPS
Simple mail transfer protocol secure
162
SNMP
Simple network management protocol
163
SOAP
Simple object access protocol
164
SoC
System on chip
165
SPF
Sender policy framework
166
SPIM
Spam over internet message
167
SPoF
Single point of failure
168
SQL
Structured query language
169
SRTP
Secure real-time protocol
170
SSD
Solid state drive
171
SSH
Secure shell
172
SSID
Service set identifier
173
SSL
Secure sockets layer
174
SSO
Single sign-on
175
STP
Shielded twisted pair
176
TACAS+
Terminal access controller access control system plus
177
TCP/IP
Transmission control protocol/internet protocol
178
TGT
Ticket granted ticket
179
TKIP
Temporary key integrity protocol
180
TSL
Transport layer security
181
TOTP
Time-based on-time password
182
TPM
Trusted platform module
183
TSIG
Transaction signature
184
UAT
User acceptance testing
185
UAV
Unmanned aerial vehicle
186
UDP
User datagram protocol
187
UEFI
Unified extensible firmware interface
188
UPS
Uninterruptible power supply
189
URI
Uniform resource identifier
190
URL
Universal resource locator
191
USB
Universal serial bus
192
USB OTG
USB on the go
193
UTM
Unified threat management
194
UTP
Unshielded twisted pair
195
VDE
Virtual desk environment
196
VDI
Virtual desk infrastructure
197
VLAN
Virtual local area network
198
VLSM
variable length subnet masking
199
VM
Virtual machine
200
VoIP
Voice over IP
201
VPN
Virtual private network
202
VTC
Video teleconferencing
203
WAF
Web application firewall
204
WAP
Wireless access point
205
WEP
Wired equivalency privacy
206
WIDS
Wireless intrusion detection system
207
WIPS
Wireless intrusion prevention system
208
WORM
Write once read many
209
WPA
Wi-fi protected access
210
WPA2
Wi-fi protected access 2
211
WPS
Wi-fi protected setup
212
WTLS
Wireless TLS
213
XML
Extensible markup language
214
XOR
Exclusive OR
215
XSRF
Cross-sir request forgery
216
XSS
Cross-site scripting