Acronyms Flashcards
Spell out the Acronym
3DES
Triple Digital Encryption Standard
AAA
Authentication, Authorization, Accouting
ABAC
Attribute Based Access Control
ACL
Access Control List
AES
Advanced Encryption Standard
AES256
Advanced Encryption Standard at 256bits
AH
Authentication Header
ALE
Annualized Loss Expectancy
AP
Access Point
API
Application Programming Interface
APT
Advanced Persistant Threat
ARO
Annualized Rate of Occurance
ARP
Address Resolution Protocol
ASLR
Address Space Layout Randomization
ASP
Application Service Provider
AUP
Acceptable Use Policy
AV
Antivirus
or
Asset Value
BAC
Business Availaibilty Center
BCP
Business Continuity Plan
BIA
Business Impact Analysis
BIOS
Basic Input/Output System
BPA
Business Partners Agreement
BPDU
Bridge Protocol Data Unit
BYOD
Bring Your Own Device
CA
Certificate Authority
CAC
Common Access Cards
CAN
Controller Area Network
CAPTCHA
Completly
Automated
Public
Turing Test-to-Tell
Computers and
Humans
Apart
CAR
Corrective Action Report
CASB
Cloud Access Security Broker
CBC
Cyber Block Chaining
CCMP
Counter-Mode/CBC-Mac Protocol
CCTV
Closed-circuit Television
CER
Certificate
or
Cross-over Error Rate
CERT
Computer Emergency Response Team
CFB
Cipher Feedback
CHAP
Challenge Handshake Authentication Protocol
CIO
Chief Information Office
CIRT
Computer Incident Response Team
CMS
Content Management System
COOP
Continuity of Operations Plan
COPE
Corporate Owned, Personally Enabled
CP
Contingency Plan
CRC
Cyclical Redundancy Check
CRL
Certificate Revocation List
CSIRT
Computer Security Incident Response Team
CSO
Chief Security Office
CSP
Cloud Service Provider
CSR
Cerftificate Signing Request
CSRF
Cross-site Request Forgery
CSU
Channel Service Unit
CTM
Counter-Mode
CTO
Chief Technology Office
CTR
Counter
CYOD
Choose Your Own Device
DAC
Discretionary Access Control
DBA
Database Administrator
DDoS
Destributed Denial of Service
DEP
Data Execution Prevention
DER
Distinguished Encoding Rules
DES
Digital Encryption Standard
DFIR
Digital Forensic and Invistigation Response
DHCP
Dynamic Host Configuration Protocol
DHE
Deffie-Hellmann Ephemeral
or
Data-Handling Electronics
DLL
Dynamic Link Library
DLP
Data Loss Prevention
DMZ
Demilitarized Zone
DNAT
Dynamic NAT
(Dynamic Network Address Translation)
DNS
Domain Name Service
DOS
Denial of Service
DRP
Disaster Recovery Plan
DSA
Digital Signature Algorithm
DSL
Digital Subscriber Line
DSU
Data Service Unit
EAP
Extensible Authentication Protocol
ECB
Electronic Code Book
ECC
Eliptic Curved Cryptography
ECCDHE
Eliptic Curved Cryptography over Deffie-Hellman Ephemeral
ECCDSA
Eliptic Curve Cryptography Digital Signature Algorithm
EF
Exposure Factor
EFS
Encrypted File System
EMI
Electromagnetic Interference
EMP
Electromagnetic Pulse
EOL
End of Life
ERP
Enterprise Resource Planning
ESN
Electronic Serial Number
ESP
Encapsulated Security Payload
EULA
End User Level Agreement
FACL
File System Access Control List
FAR
False Acceptance Rate
FDE
Full Disk Encryption
FRR
False Rejection Rate
FTP
File Transfer Protocol
FTPS or sFTP
Secure File Transfer Protocol
GCM
Galois Counter Mode
GPG
GNU Privacy Guard
(GNU = Gnu is Not Unix)
GPO
Group Policy Object
GPS
Global Positioning System
GPU
Graphic Processing Unit
GRE
Generic Routing Encapsulation
HA
High Availability
HDD
Hard Disk Drive
HIDS
Host-Based Intrution Detection System
HIPS
Host-based Intrution Prevention System
HMAC
Hashed Message Authentication Code
HOTP
HMAC-based One Time Password
HSM
Hardware Security Module
HTML
Hypertext Markup Language
HTTP
Hypertext Tranfer Protocol
HTTP
Secure Hypertext Transfer Protocol
HVAC
Heating, Ventilation and Airconditioning
IaaS
Infrastructure as a Service
ICMP
Internet Control Message Protocol
ID
Identification
IDEA
International Data Encryption Algorithm
IDF
Intermediate Distribution Frame
IdP
Identity Provider
IEEE
Institute of Electrical and Electronic Engineers
IIS
Internet Information System
IKE
Internet Key Exchange
IM
Instant Messaging