acronyms Flashcards

1
Q

3DES

A

Triple Digit Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES256

A

Advanced Encryption Standard 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ASP

A

Application Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AV

A

Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BAC

A

Business Availability Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BPDU

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BYOD
Bring Your Own Device
26
CA
Certificate Authority
27
CAC
Common Access Card
28
CAN
Controller Area Network
29
CAPTCHA
Completely Automated Public Turing test to tell Computers and Human Apart
30
CAR
Corrective Action Report
31
CBC
Cipher Block Chaining
32
CCMP
Counter-Mode/CBCC-Mac Protocol
33
CCTV
Closed-Circuit Television
34
CER
Certificate
35
CER
Cross-over Error Rate
36
CERT
Computer Emergency Response Team
37
CFB
Cipher Feedback
38
CHAP
Challenge Handshake Authentication Protocol
39
CIO
Chief Information Officer
40
CIRT
Computer Incident Response Team
41
CMS
Content Management System
42
CoOP
Continuity of Operations Plan
43
COPE
Corporate Owned, Personally Enabled
44
CP
Contingency Plan
45
CRC
Cyclical Redundancy Check
46
CRL
Certificate Revocation List
47
CSIRT
Computer Security Incident Response Team
48
CSO
Chief Security Officer
49
CSP
Cloud Service Provider
50
CSR
Certificate Signing Request
51
CSRF
Cross-Site Request Forgery
52
CSU
Channel Service Unit
53
CTM
CounTer-Mode
54
CTO
Chief Technology Officer
55
CTR
Counter
56
CYOD
Choose Your Own Device
57
DAC
Discretionary Access Controll
58
DBA
DataBase Administrator
59
DDos
Distributed Denial of Service
60
DEP
Data Execution Protection
61
DER
Distinguished Encoding Rules
62
DES
Digital Encryption Standard
63
DFIR
Digital Forensics and Investigation Response
64
DHCP
Dynamic Host Configuration Protocol
65
DHE
Data-Handling Electronics
66
DHE
Diffie-Hellman Ephemeral
67
DLL
Dynamic Link Library
68
DLP
Data Loss Prevention
69
DMZ
Demilitarized Zone
70
DNAT
Destination Network Address Transaction
71
DNS
Domain Name Service (server)
72
DoS
Denial of Service
73
DRP
Disaster Recovery Plan
74
DSA
Digital Signature Algorithm
75
DSL
Digital Subscriber Line
76
DSU
Data Service Unit
77
EAP
Extensible Authentication Protocol
78
ECB
Electronic Code Book
79
ECC
Elliptic Curve Cryptography
80
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
81
ECDSA
Elliptic Curve Digital Signature Algorithm
82
EFS
Encrypted File System
83
EMI
Electromagnetic Interference
84
EMP
Electro Magnetic Pulse
85
ERP
Enterprise Resource Planning
86
ESN
Electronic Serial Number
87
ESP
Encapsulated Security Payload
88
EF
Exposure Factor
89
FACL
File system Access Control List
90
FAR
False Acceptance Rate
91
FDE
Full Disk Encryption
92
FRR
False Rejection Rate
93
FTP
File Transfer Protocol
94
FTPS
Secured File Transfer Protocol
95
GCM
Galois Counter Mode
96
GPG
Gnu Privacy Guard
97
GPO
Group Policy Object
98
GPS
Global Positioning System
99
GPU
Graphic Processing Unit
100
GRE
Generic Routing Encapsulation
101
HA
High Availability
102
HDD
Hard Disk Drive
103
HIDS
Host-based Intrusion Detection System
104
HIPS
Host-based Intrusion Prevention System
105
HMAC
Hashed Message Authentication Code
106
HOTP
HMAC-based One-Time Password
107
HSM
Hardware Security Module
108
HTML
Hypertext Markup Language
109
HTTP
Hypertext Transfer Protocol
110
HTTPS
Hypertext Transfer Protocol over SSL/TLS
111
HVAC
Heating, Ventilation, Air Conditioning
112
IaaS
Infrastructure as a Service
113
ICMP
Internet Cloud Message Protocol
114
ICS
Industrial Control Systems
115
ID
Identification
116
IDEA
International Data Encryption Algorithm
117
IDF
Intermediate Distribution Frame
118
IdP
Identity Provider
119
IDS
Intrusion Detection System
120
IEEE
Institute of Electrical and Electronic Engineers
121
IIS
Internet Information System
122
IKE
Internet Key Exchange
123
IM
Instant Messaging
124
IMAP4
Internet Message Access Protocol v4
125
IoT
Internet of Things
126
IP
Internet Protocol
127
IPSec
Internet Protocol Security
128
IR
Incident Response
129
IR
Infrared
130
IRC
Internet Relay Chat
131
IRP
Incident Response Plan
132
ISA
Interconnection Security Agreement
133
ISP
Internet Service Provider
134
ISSO
Information Systems Security Officer
135
ITCP
IT Contingency Plan
136
IV
Initialization Vector
137
KDC
Key Distribution Center
138
KEK
Key Encryption Key
139
L2TP
Layer 2 Tunneling Protocol
140
LAN
Local Area Network
141
LDAP
Lightweight Directory Access Protocol
142
LEAP
Lightweight Extensible Authentication Protocol
143
MaaS
Monitoring as a Service
144
MAC
Media Access Control
145
MAC
Message Authentication Code
146
MAN
Metropolitan Area Network
147
MBR
Master Boot Record
148
MD5
Message Digest 5
149
MDF
Main Distribution Frame
150
MDM
Mobile Device Management
151
MFA
Multi-Factor Authentication
152
MFD
Multi-Function Device
153
MITM
Man-in-the-Middle
154
MMS
Multimedia Message Service
155
MOA
Memorandum of Agreement
156
MOU
Memorandum of Understanding
157
MPLS
Multi-Protocol Label Switching
158
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
159
MSP
Managed Service Provider
160
MTBF
Mean Time Between Failures
161
MTTF
Mean Time to Failure
162
MTTR
Mean Time to Repair
163
MTU
Maximum Transmission Unit
164
NAC
Network Access Control
165
NAT
Network Address Translation
166
NDA
Non-disclosure Agreement
167
NFC
Near Field Communication
168
NGAC
Next Generation Access Control
169
NIDS
Network-based Intrusion Detection System
170
NIPS
Network-based Intrusion Prevention System
171
NIST
National Institute of Standards and Technology
172
NTFS
New Technology File System
173
NTLM
New Technology LAN Manager
174
NTP
Network Time Protocol
175
OAUTH
Open Authorization
176
OCSP
Online Certification Status Protocol
177
OID
Object Identifier
178
OS
Operating System
179
OTA
Over the Air
180
OVAL
Open Vulnerability Assessment Language
181
P12
PKCS #12
182
P2P
Peer to Peer
183
PaaS
Platform as a Service
184
PAC
Proxy Auto Configuration
185
PAM
Pluggable Authentication Modules
186
PAP
Password Authentication Protocol
187
PAT
Port Address Translation
188
PBKDF2
Password-based Key Derivation Function 2
189
PBX
Private Branch Exchange
190
PCAP
Packet Capture
191
PEAP
Protected Extensible Authentication Protocol
192
PED
Personal Electronic Device
193
PEM
Privacy-enhanced Electronic Mail
194
PFS
Perfect Forward Secrecy
195
PFX
Personal Exchange Format
196
PGP
Pretty Good Privacy
197
PHI
Personal Health Information
198
PII
Personally Identifiable Information
199
PIV
Personal Identity Verification
200
PKI
Public Key Infrastructure
201
POODLE
Padding Oracle on Downgrade Legacy Encryption
202
POP
Post Office Protocol
203
POTS
Plain Old Telephone Service
204
PPP
Point-to-Point Protocol
205
PPTP
Point-to-Point Tunneling Protocol
206
PSK
Private Shared Key
207
PTZ
Pan-Tilt-Zoom
208
RA
Recovery Agent
209
RA
Registered Authority
210
RAD
Rapid Application Development
211
RADIUS
Remote Authentication Dial-In User Server
212
RAID
Redundant Array of Inexpensive Disks
213
RAS
Remote Access Server
214
RAT
Remote Access Trojan
215
RBAC
Role-Based Access Control
216
RBAC
Rule-Based Access Control
217
RC4
Rivest Cipher version 4
218
RDP
Remote Desktop Protocol
219
RFID
Radio Frequency Identifier
220
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
221
ROI
Return on Investment
222
RMF
Risk Management Framework
223
RPO
Recovery Point Objective
224
RSA
Rivest, Shamir, and Adleman
225
RTBH
Remotely Triggered Black Hole
226
RTO
Recovery Time Object
227
RTOS
Real-Time Operating System
228
RTP
Real-Time Transport Protocol
229
S/MIME
Secure/Multipurpose Internet Mail Extensions
230
SaaS
Software as a Service
231
SAML
Security Assertions Markup Language
232
SAN
Storage Are Network
233
SAN
Subject Alternative Name
234
SCADA
System Control and Data Acquisition
235
SCAP
Security Content Automation Protocol
236
SCEP
Simple Certificate Enrollment Protocol
237
SCP
Secure Copy
238
SCSI
Small Computer Interface System
239
SDK
Software Development Kit
240
SDLC
Software Development Life Cycle
241
SDLM
Software Development Life Cycle Methodology
242
SDN
Software Defined Network
243
SED
Self-Encrypted Drive
244
SEH
Structures Exception Handler
245
SFTP
Secured File Transfer Protocol
246
SHA
Secure Hash Algorithm
247
SHTTP
Secure Hypertext Transfer Protocol
248
SIEM
Security Information and Event Management
249
SIM
Subscriber Identity Module
250
SLA
Service Level Agreement
251
SLE
Single Loss Expectancy
252
SMB
Server Message Block
253
SMTP
Simple Mail Transfer Protocol
254
SMTPS
Simple Mail Transfer Protocol Secure
255
SNMP
Simple Network Management Protocol
256
SOAP
Simple Object Access Protocol
257
SoC
System on Chip
258
SPF
Sender Policy Framework
259
SPIM
Spam over Internet Messaging
260
SPoF
Single Point of Failure
261
SQL
Structured Query Language
262
SRTP
Secure Real-Time Protocol
263
SSD
Solid State Drive
264
SSL
Secure Sockets Layer
265
SSO
Single Sign-on
266
STP
Shielded Twisted Pair
267
TACACS+
Terminal Access Controller Access Control System Plus
268
TCP/IP
Transmission Control Protocol/Internet Protocol
269
TGT
Ticket Granting Ticket
270
TKIP
Temporal Key Integrity Protocol
271
TLS
Transport Layer Security
272
TOTP
Time-based One-time Password
273
TPM
Trusted Platform Module
274
TSIG
Transaction Signature
275
UAT
User Acceptance Training
276
UAV
Unmanned Aerial Vehicle
277
UDP
User Data Protocol
278
UEFI
Unified Extensible Firmware Interface
279
UPS
Uninterruptible Power Supply
280
URI
Uniform Resource Identifier
281
URL
Universal Resource Locator
282
USB
Universal Serial Bus
283
USB OTG
USB on The Go
284
UTM
Unified Threat Management
285
UTP
Unshielded Twisted Pair
286
VDE
Virtual Desktop Environment
287
VDI
Virtual Desktop Infrastructure
288
VLAN
Virtual Local Area Network
289
VLSM
Variable Length Subnet Masking
290
VM
Virtual Machine
291
VoIP
Voice over IP
292
VPN
Virtual Private Network
293
VTC
Video Teleconferencing
294
WAF
Web Application Firewall
295
WAP
Wireless Access Point
296
WEP
Wire Equivalent Privacy
297
WIDS
Wireless Intrusion Detection System
298
WIPS
Wireless Intrusion Prevention System
299
WORM
Write Once Read Many
300
WPA
WiFi Protected Access
301
WPA2
WiFi Protected Access 2
302
WPS
WiFi Protected Setup
303
WTLS
Wireless TLS
304
XML
Extensible Markup Language
305
XOR
Exclusive Or
306
XSRF
Cross-Site Request Forgery
307
XSS
Cross-Site Scripting