Acronyms Flashcards
Spell out the Acronym
3DES
Triple Digital Encryption Standard
AAA
Authentication, Authorization, Accouting
ABAC
Attribute Based Access Control
ACL
Access Control List
AES
Advanced Encryption Standard
AES256
Advanced Encryption Standard at 256bits
AH
Authentication Header
ALE
Annualized Loss Expectancy
AP
Access Point
API
Application Programming Interface
APT
Advanced Persistant Threat
ARO
Annualized Rate of Occurance
ARP
Address Resolution Protocol
ASLR
Address Space Layout Randomization
ASP
Application Service Provider
AUP
Acceptable Use Policy
AV
Antivirus
or
Asset Value
BAC
Business Availaibilty Center
BCP
Business Continuity Plan
BIA
Business Impact Analysis
BIOS
Basic Input/Output System
BPA
Business Partners Agreement
BPDU
Bridge Protocol Data Unit
BYOD
Bring Your Own Device
CA
Certificate Authority
CAC
Common Access Cards
CAN
Controller Area Network
CAPTCHA
Completly
Automated
Public
Turing Test-to-Tell
Computers and
Humans
Apart
CAR
Corrective Action Report
CASB
Cloud Access Security Broker
CBC
Cyber Block Chaining
CCMP
Counter-Mode/CBC-Mac Protocol
CCTV
Closed-circuit Television
CER
Certificate
or
Cross-over Error Rate
CERT
Computer Emergency Response Team
CFB
Cipher Feedback
CHAP
Challenge Handshake Authentication Protocol
CIO
Chief Information Office
CIRT
Computer Incident Response Team
CMS
Content Management System
COOP
Continuity of Operations Plan
COPE
Corporate Owned, Personally Enabled
CP
Contingency Plan
CRC
Cyclical Redundancy Check
CRL
Certificate Revocation List
CSIRT
Computer Security Incident Response Team
CSO
Chief Security Office
CSP
Cloud Service Provider
CSR
Cerftificate Signing Request
CSRF
Cross-site Request Forgery
CSU
Channel Service Unit
CTM
Counter-Mode
CTO
Chief Technology Office
CTR
Counter
CYOD
Choose Your Own Device
DAC
Discretionary Access Control
DBA
Database Administrator
DDoS
Destributed Denial of Service
DEP
Data Execution Prevention
DER
Distinguished Encoding Rules
DES
Digital Encryption Standard
DFIR
Digital Forensic and Invistigation Response
DHCP
Dynamic Host Configuration Protocol
DHE
Deffie-Hellmann Ephemeral
or
Data-Handling Electronics
DLL
Dynamic Link Library
DLP
Data Loss Prevention
DMZ
Demilitarized Zone
DNAT
Dynamic NAT
(Dynamic Network Address Translation)
DNS
Domain Name Service
DOS
Denial of Service
DRP
Disaster Recovery Plan
DSA
Digital Signature Algorithm
DSL
Digital Subscriber Line
DSU
Data Service Unit
EAP
Extensible Authentication Protocol
ECB
Electronic Code Book
ECC
Eliptic Curved Cryptography
ECCDHE
Eliptic Curved Cryptography over Deffie-Hellman Ephemeral
ECCDSA
Eliptic Curve Cryptography Digital Signature Algorithm
EF
Exposure Factor
EFS
Encrypted File System
EMI
Electromagnetic Interference
EMP
Electromagnetic Pulse
EOL
End of Life
ERP
Enterprise Resource Planning
ESN
Electronic Serial Number
ESP
Encapsulated Security Payload
EULA
End User Level Agreement
FACL
File System Access Control List
FAR
False Acceptance Rate
FDE
Full Disk Encryption
FRR
False Rejection Rate
FTP
File Transfer Protocol
FTPS or sFTP
Secure File Transfer Protocol
GCM
Galois Counter Mode
GPG
GNU Privacy Guard
(GNU = Gnu is Not Unix)
GPO
Group Policy Object
GPS
Global Positioning System
GPU
Graphic Processing Unit
GRE
Generic Routing Encapsulation
HA
High Availability
HDD
Hard Disk Drive
HIDS
Host-Based Intrution Detection System
HIPS
Host-based Intrution Prevention System
HMAC
Hashed Message Authentication Code
HOTP
HMAC-based One Time Password
HSM
Hardware Security Module
HTML
Hypertext Markup Language
HTTP
Hypertext Tranfer Protocol
HTTP
Secure Hypertext Transfer Protocol
HVAC
Heating, Ventilation and Airconditioning
IaaS
Infrastructure as a Service
ICMP
Internet Control Message Protocol
ID
Identification
IDEA
International Data Encryption Algorithm
IDF
Intermediate Distribution Frame
IdP
Identity Provider
IEEE
Institute of Electrical and Electronic Engineers
IIS
Internet Information System
IKE
Internet Key Exchange
IM
Instant Messaging
IMAP4
Internet Message Access Protocol version 4
IoT
Internet of Things
IP
Internet Protocol
IPSec
Internet Protocol Security
IR
Incident Response
or
Infrared
IRC
Internet Relay Chat
IRP
Incident Response Plan
ISA
Interconnections Security Agreement
ISP
Internet Service Provider
ISSO
Information Systemes Security Officer
ITCP
IT Contingency Plan
IV
Initialization Vector
KDC
Key Distribuition Center
KEK
Key Encryption Key
L2TP
Layer 2 Tunneling Protocol
LAN
Local Area Network
LDAP
Lightweight Directory Access Protocol
LEAP
Lightweight Extensible Authentication Protocol
MaaS
Monitoring as a Service
MAC
Mandatory Access Control
or
Media Access Control
or
Message Authentication Code
MD5
Message Digest v5
MDF
Main Distribution Frame
MDM
Mobile Device Management
MFA
Multifactor-Authentication
MFD
Multi-funtion Device
MIME
Multipurpose Internet Mail Exchange
MITM
Man-in-the-Middle
MMS
Multimedia Message Service
MOA
Memorandum of Agreement
MOTD
Message of the Day
MPLS
Multi-Protocol Label Switching
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
MSP
Managed Service Provider
MTBF
Mean Time Between Failures
MTTF
Mean Time to Failure
MTTR
Mean Time to Recover
or
Mean Time to Repair
MTU
Maximum Transmision Protocol
NAC
Network Access Control
NAT
Network Access Translation
NDA
Non Disclosure Agreements
NFC
Near Field Communication
NGAC
Next Generation Access Control
NIDS
Network-Based Intrusion Detecion System
NIPS
Network-based Intrusion Prevention System
NIST
National Institute Standards & Technology
NTFS
New Technology File System
NTLM
New Technology LAN Manager
OAUTH
Open Authorization
OCSP
Online Certificate Status Protocol
OID
Object Identifier
OS
Operating System
OTA
Over The Air
OVAL
Open Vulnerability Assessment Language
P12
PKCS#12
(Public-Key Cryptography Standards)
P2P
Peer to Peer
PaaS
Platform as a Service
PAC
Proxy Auto Configuration
PAM
Pluggable Authentication Modules
PAP
Password Authentication Protocol
PAT
Port Address Translation
PBKDF2
Password-based Key Derivation Function 2
PBX
Private Branch Exchange
PCAP
Packet Capture
PEAP
Protected Extensible Authentication Protocol
PED
Personal Electronic Device
PEM
Privacy-enchanced Electronic Mail
PFS
Prefect Forward Secrecy
PFX
Personal Exchange Format
PGP
Pretty Good Privacy
PHI
Personal Health Information
PII
Personable Identifiable Information
PIV
Personal Identity Verification
PKI
Public Key Infrastructure
POODLE
Padding Oracle on Downgrade Legacy Encryption
POP
Post Office Protocol
POTS
Plan Old Telephone Service
PPP
Point-to-Point Protocol
PPTP
Point-to-Point Tunneling Protocol
PSK
Pre-shared Key
PTZ
Pan-Tilt-Zoom
RA
Recovery Agent
or
Registration Authority
RAD
Rapid Application Development
RADIUS
Remote Authentication Dial-in User Server
RAID
Redundant Array of Inexpensive Disks
RAS
Remote Access Server
RAT
Remote Access Trojan
RBAC
Role-Based Access Control
or
Rule-Based Access Control
RC4
Rivest Cipher version 4
RDP
Remote Desktop Protocol
REST
Representational State Transfer
RFID
Radio Frequency Identifier
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
ROI
Return of Investment
RMF
Risk Management Framework
RPO
Recovery Point Objective
RSA
Rivest, Shamir & Adleman
RTBH
Remotely Triggered Black Hole
RTO
Recovery Time Objective
RTOS
Real-Time Operating System
RTP
Real-time Transport Protocol
S/MIME
Secure Multipurpose Internet Mail Extensions
SaaS
Software as a Service
SAML
Security Assertions Mark-Up Language
SAN
Storage Area Network
or
Subject Alternative Name
SCADA
System Control and Data Acquisition
SCAP
Security Content Automation Protocol
SCEP
Simple Certificate Enrollment Protocol
SCP
Security Copy
SCSI
Small Computer System Interface
SDK
Software Developer Kit
SDLC
Software Development Life Cycle
SDLM
Software Development Life-cycle Methodology
SDN
Software Defined Network
SED
Self-Encrypting Drive
SEH
Structrure Exception Handler
SHA
Secure Hash Algorithm
SHTTP
Secure Hypertext Protocol
SIEM
Security Information and Event Management
SIM
Subscriber Identity Mode
SIP
Session Initiation Protocol
SIPS
Session Initiation Protocol Secure
SLA
Service Level Agreement
SLE
Single Loss Expectancy
SMB
Server Message Block
SMS
Short Message Service
SMTP
Simple Mail Transfer Protocol
SMTPS
Simple Mail Transfer Protocol Secure
SNMP
Simple Network Management Protocol
SoC
System on Chip
SPF
Sender Policy Framework
SPIM
Spam over Internet Messaging
SPoF
Single Point of Failure
SQL
Structured Query Language
SRTP
Secure Real-Time Protocol
SSD
Solid State Drive
SSH
Secure Shell
SSID
Service Set Identifier
SSL
Secure Socket Layer
SSO
Single Sign-On
SSP
System Security Plan
STP
Shielded Twisted Pair
TACACS+
Terminal Access Controller Access Control System Plus
TCO
Total Cost of Ownership
TCP/IP
Transmision Control Protocol over
Internet Procol
TGT
Ticket Granting Ticket
TKIP
Temporal Key Integrity Protocol
TLS
Transport Layer Security
TOTP
Time-based One Time Password
TPM
Trusted Platform Module
TSIG
Transaction Signature
UAT
User Acceptance Testing
UAV
Unmanned Air Vehicle
UDP
User Datagram Protocol
UEFI
Unified Extensible Firmware Interface
UPS
Uninterruptable Power Supply
URI
Uniform Resource Identifier
URL
Universal Resource Locator
USB
Universal Serial Bus
USB/OTG
USB On-The-Go
UTM
Unified Threat Managment
UTP
Unshielded Twisted Pair
VDE
Virtual Desktop Enviroment
VDI
Virtual Desktop Infrastructure
VLAN
Virtual Local Area Network
VLSM
Variable Length Subnet Masking
VM
Virtual Machine
VoIP
Voice over Internet Protocol
VPN
Virtual Private Network
VTC
Video Teleconferencing
WAF
Web-Application Firewall
WAP
Wireless Access Point
WED
Wired Equivalent Privacy
WIDS
Wireless Intrusion Detection System
WIPS
Wireless Intrusion Prevention System
WORM
Write Once Read Many
WPA
WiFi Protected Access
WPA-2
WiFi Protected Access 2
WPS
WiFi Protected Setup
WTLS
Wireless TLS
XML
Extensible Markup Language
XOR
Exclusive Or
XSFR
Cross-site Request Forgery
XSS
Cross-site Scripting