Acronyms Flashcards
ACL
Access Control List
ADFS
Active Directory Federation Services
AP
Access Point
API
Application Programming Interface
APNS
Apple Push Notification Service
APT
Advanced Persistent Threat
ASLR
Address Space Layout Randomization
BPA
Business Partnership Agreement
CA
Certificate Authority
CAPEC
Common Attack Patterns Enumeration Classification
CERT
Computer Emergency Response Team
CGI
Common Gateway Interface
CIFS
Common Internet File System
CIRT
Computer Incident Response Team
CORS
Cross-Origin Request Scripting
CRL
Certification Revocation List
CSRF
Cross-Site Request Forgery
CVE
Common Vulnerabilities and Exposures
CVSS
Common Vulnerabilities Scoring System
CWE
Common Weakness Enumeration
DAST
Dynamic Application Security Testing
DCOM
Distributed Component Object Model
DFD
Data Flow Diagram
DLL
Dynamic Link Library
DNS
Domain Name System
DOM
Document Object Model
DoS
Denial of Service
DTP
Dynamic Trunking Protocol
ECDSA
Elliptic Curve Digital Signature Algorithm
EULA
End User License Agreement
FTP
File Transfer Protocol
GPO
Group Policy Object
GPP
Generic Packetized Protocol
GRE
Generic Routing Encapsulation
HSTS
HTTP Strict Transport Security
HTML
Hypertext Markup Language
I/O
Input/Output
ICMP
Internet Control Message Protocol
ICS
Industrial Control Systems
IDOR
Indirect Object Reference
IoT
Internet of Things
IPS
Intrusion Prevention System
IV
Initialization Vector
JPCERT
Japan Computer Emergency Response Team
JTAG
Joint Test Action Group
LAPS
Local Administration Password Solution
LFI
Local File Inclusion
LLMNR
Link-Local Multicast Name Resolution
LSASS
Local Security Authority Subsystem Service
MDM
Mobile Device Management
MFA
Multi-factor Authentication
MITM
Man-in-the-Middle
MSA
Master Service Agreement
NAC
Network Access Control
NBNS
Net Bios Service Name
NDA
Non-Disclosure Agreement
NFC
Near Field Communications
NIST
National Institute of Standards and Technology
NOP
No Operation
NSE
Network Service Engine
OS
Operating System
OSINT
Open Source Intelligence
OWASP
Open Web Application Security Project
PII
Personally Identifiable Information
POS
Point of Sale
PS
Powershell
RCE
Remote Code Execution
RDP
Remote Desktop Protocol
RFI
Remote File Inclusion
RFID
Radio Frequency Identification
RFP
Request for Protocol
ROE
Rules of Engagement
RPC
Remote Procedural Call
RSH
Remote Shell
RTOS
Real Time Operating System
SAM
Security Account Manager
SAN
Subject Alternative Name
SAST
Static Application Security Testing
SCADA
Supervisory Control and Data Acquisition
SCEP
Simple Certificate Enrollment Protocol
SCP
Secure Copy
SDK
Software Development Kit
SGID
Set Group ID
SID
Secure Identifier
SIEM
Security Information and Event Manager
SLA
Service Level Agreement
SMB
Service Message Block
SMTP
Simple Mail Transfer Protocol
SNMP
Simple Network Management Protocol
SOAP
Simple Object Access Protocol
SOC
Security Operations Center
SOW
Statement of Work
SPN
Service Principle Name
SQL
Structured Query Language
SSH
Secure Shell
STP
Spanning Tree Protocol
SUID
Set User ID
TCP
Transmission Control Protocol
TSL
Transport Layer Security
TOTP
Time-Based One-Time Password
TPM
Trusted Platform Module
TTP
Tactics, Techniques, Procedures
UDP
User Datagram Protocol
VLAN
Virtual Local Access Network
VM
Virtual Machine
VNC
Virtual Network Connection
VPN
Virtual Private Network
WADL
Web Application Description Language
WAF
Web Application Firewall
WAR
Web Application Archive
WEP
Wireless Equivalency Privacy
WinRM
Windows Remote Management
WMI
Windows Management Instrumentation
WPAD
Web-Proxy Auto-Discovery
WPS
WiFi Protected Setup
WSDL
Web Services Description Language
XSD
XML Schema Document
XSS
Cross-Site Scripting
XST
Cross-Site Tracing
XXE
External Entity