Acronyms Flashcards
AAA
Authentication, Authorization, Accounting
ACE
Application Control Engine or Application Control Entry
Depends on context
ACS
Access Control System- contains objects and server groups for AAA
AH
Authentication Header- unsecure Authentication apposed to ESP, less overhead
APIC
Application Policy Infrastructure Controller
ASA
Adaptive Security Appliance
ASR
Aggregation Service Router- High performance and Scalability
AVC
Application and Visibility Control- Used for application monitoring and filtering
BPDU
Bridge Protocol Data Unit- Switch communicate with this
CASE
Context Adaptive Scanning Engine
CBAC
Context Based Access Control
CCP
Cisco Configuration Professional
CES
Cisco Email Security
CLI
Command Line Interface
CMX
connected Mobile Experience
CoPP
Control Plane Policing
CPPR
Control Plane Protection
CRL
Certificate Revocation List
CRM
Customer relationship Management
CSA
Cisco Security Agent- endpoint intrusion prevention system. Cisco’s version of a HIPS
CSM
Cisco Security Manager
CSR
Cloud Services Router
CTA
Cognitive Threat Analytics- cloud based security sensor
CTI
Computer Telephony Integration
CWS
Cloud Web security
DAI
dynamic ARP Inspection
DAP
Dynamic Access Policy
DART
Diagnostic and reporting tool- Used for VPN’s
DCA
Dynamic Content Analysis
DCOM
Distributed Component Object Model
DES
Data Encryption Standard
DLP
Data Loss Prevention
DPD
Dead Peer Detection
DSA
Digital Signature Algorithm
DTLS
Datagram Transport Layer Security- Faster throughput
DTP
Dynamic Trunking Protocol
EAP-FAST
Extensible Authentication protocol via Flexible Authentication Secure tunneling
EAP-TLS
Extensible Authentication Protocol Transport layer Secutiry
ECMP
Equal-cost Multipath
EEM
Embedded Event Management
ESA
Email Security Appliance
ESP
Encapsulated Security Protocol
FED
Forged Email Detection
FLOSS
Free/libre Open Source software
GRE
Generic Routing Encryption
HMAC
Hashed Message Authentication Codes
ICAP
Internet Content Adaptation Protocol- works with HTTP
ICS
Industrial Control System
IDM
IPS Device Manager
IEFT
Internet Engineering Task Force
IKE
Internet Key Exchange
ISAKMP
Internet Security Association and Key Management Protocol- used for IPsec
ISE
Identity Services Engine
ISR
Integrated Services Router- Zone based firewalls
LEAP
Lightweight Extensible Authentication Protocol
MAB
MAC Authentication Bypass- if 802.1x isnt set on for that machine on that port
MDM
Mobile device Management
MKA
MACsec Key Agent
MPF
Modular Policy Framework
MPP
Management Protection Plan
MSE
Mobility Services Engine
MTM
Mobile Trusted Mobile
NAC
Network Access Control
SPAN
Switchport Analyzer
RSPAN
Remote Switchport Analyzer
ERSPAN
Encapsulated Remote SwitchPort Analyzer
NGE
Next Generation Encryption
NGIPS
Next Generation Intrusion Prevention System
NIST
National Institute of Standards and Technology
OCSP
Online Certificate Status Protocol- Real time
OTP
One Time Password
OWASP
Open Web Application Security Project
PEAP
Protected Extensible Authentication Protocol
RBAC
Role-Based Access control
RCP
Remote Copy Protocol
RIB
Routing Information Base
S/MIME
Security/Multipurpose Internet Mail Extensions
SA
Security Association
SAP
Security Association Protocol
SAMM
Software Assurance Maturity Model
SASL
Simple Authentication and Security Layer
SCEP
Simple Certificate Enrollment Protocol
SCP
Secure Copy
SDEE
Security Device Event Exchange
SDF
Signature Definition File
SDM
Security Device Manager
SEAL
Software-optimized Encryption algorithm- symmetric and kind of out of date
SIEM
Security Information and Event Management
SIO
Security Intelligance Operations
SME
Signature Micro Engine- Signatures for IPS
SPI
Security Parameter Index- Identifies traffic in IPsec tunnels
PFS
Perfect Forward Secrecy - DH for phase 2
SSC
Secure Services Client
TNC
Trusted Network Connect
TPM
Trusted Platform Module
UDLD
Unidirectional Link Detection
RPF
Reverse Path Forwarding
VRF
Virtual Routing and Forwarding
VSG
Virtual Security Gateway
VTI
Virtual Tunnel Interface
VXLAN
Virtual Extensible LAN
WCCP
Web Cache communications Protocol
WSA
Web Security Appliance- Blocks risky sites
WTE
Web testing Enviroment
ZAP
Zed Attack Proxy- web application security scanner
ZBF
Zone based firewall
SNI
Server Name indication-TLS extension