Acronyms Flashcards
BCP
Business Continuity Plan
BIA
Business Impact Assessment/Analysis
DRP
Disaster Recovery Plan
DR
Disaster Recovery (site)
PIA
Privacy Impact Assessment
PTA
Privacy Threshold Assessment
MTTR
Mean Time To Restore
MTTF
Mean Time To Failure
MTBF
Mean Time Between Failures
RTO
Recovery Time Objective
RPO
Recovery Point Objective
EF
Exposure Factor
SLE
Single Loss Expectancy
ALE
Annual Loss Expectancy
ARO
Annual Rate of Occurance
ECB
Electronic Code Book
CBC
Cipher Block Chaining
CTR
Counter Mode
GCM
Galois/Counter Mode
PKI
Public Key Infrastructure
CA
Certificate Authority
RA
Registration Authority
PPTP
Point to Point Tunneling Protocol
L2TP
Layer 2 Tunneling Protocol
SSTP
Secure Sockets Transport Protocol
PGP
Pretty Good Privacy
DHE
Diffie-Hellman Ephemeral
ECDHE
Elliptic Curve Deffie-Hellman Ephemeral
ARP
Address Resolution Protocol
ICMP
Internet Control Message Protocol
MAC (related to file system permissions)
Mandatory Access Control
DNS
Domain Name Resolution
AV
Asset Value
MTD
Maximum Tolerable Downtime
SNMP
Simple Network Management Protocol
NTP
Network Time Protocol
FTPS
File Transfer Protocol Secured
SFTP
Secured File Transfer Protocol
OTA
Over The Air
NTFS
New Technology File System
MITM
Man-in-the-Middle
MITB
Man-in-the-Browser
SRTP
Secure Real-Time Protocol
WAF
Web Application Firewall
WTLS
Wireless TLS
XSS
Cross-Site Scripting
XSRF
Cross-Site Request Forgery
VDE
Virtual Desktop Environment
VDI
Virtual Desktop Infrastructure
TKIP
Temporal Key Integrity Protocol
TGT
Ticket Granting Ticket
SED
Self Encrypting Drive
RBAC
Role/Rule-Based Access Control
RFID
Radio Frequency Identifier
HOTP
HMAC-Based One-time Password
DSA
Digital Signature Algorithm
EFS
Encrypted File System
ESP
Encapsulated Security Payload
FACL
File System Access Control List
RSTP
Rapid Spanning Tree Protocol
STP (Related to switching)
Spanning Tree Protocol
STP (Related to wires)
Shielded Twisted Pair
UTP
Unshielded Twisted Pair
COPE
Company Owned, Personally Enabled
BYOD
Bring Your Own Device
CYOD
Choose Your Own Device
UTM
Unified Threat Management