Acronyms Flashcards

1
Q

3DES

A

Triple Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES256

A

Advanced Encryption Standard 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ASP

A

Application Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AV

A

AntiVirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BAC

A

Business Availability Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BPDU

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CAC
Common Access Card
26
CAN
Controller Area Network
27
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
28
CAR
Corrective Action Report
29
CBC
Cipher Block Chaining
30
CCMP
Counter-Mode/CBC-Mac Protocol
31
CCTV
Closed Circuit Television
32
CER | 2 definitions
1) Certificate | 2) Cross-over Error Rate
33
CERT
Computer Emergency Response Team
34
CFB
Cipher FeedBack
35
CHAP
Challenge Handshake Authentiction Protocol
36
CIO
Chief Information Officer
37
CIRT
Computer Incident Response Team
38
CMS
Content Management System
39
COOP
Continuity Of Operations Plan
40
CP
Contingency Planning
41
CRC
Cyclical Redundancy Check
42
CRL
Certificate Revocation List
43
CSIRT
Computer Security Incident Response Team
44
CSO
Chief Security Officer
45
CSP
Cloud Service Provider
46
CSR
Certificate Signing Request
47
CSRF
Cross-Site Request Forgery
48
CSU
Channel Service Unit
49
CTM
Counter-Mode
50
CTO
Chief Technology Officer
51
CTR
Counter
52
CYOD
Choose Your Own Device
53
DAC
Discretionary Access Control
54
DBA
Database Administrator
55
DDoS
Distributed Denial of Service
56
DEP
Data Execution Prevention
57
DER
Distinguished Encoding Rules
58
DES
Digital Encryption Standard
59
DFIR
Digital Forensics and Investigation Response
60
DHCP
Dynamic Host Configuration Protocol
61
DHE | 2 definitions
1) Data-Handling Electronics | 2) Diffie-Hellman Ephemeral
62
DLL
Dynamic Link Library
63
DLP
Data Loss Prevention
64
DMZ
DeMilitarized Zone
65
DNAT
Destination Network Address Transaction
66
DNS
Domain Name Service (Server)
67
DoS
Denial of Service
68
DRP
Disaster Recovery Plan
69
DSA
Digital Signature Algorithm
70
DSL
Digital Subscriber Line
71
DSU
Data Service Unit
72
EAP
Extensible Authentication Protocol
73
ECB
Electronic Code Book
74
ECC
Elliptic Curve Cryptography
75
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
76
ECDSA
Elliptic Curve Digital Signature Algorithm
77
EFS
Encrypted File System
78
EMI
Electro Magnetic Interference
79
EMP
Electro Magnetic Pulse
80
ERP
Enterprise Resource Planning
81
ESN
Electronic Serial Number
82
ESP
Encapsulated Security Payload
83
EF
Exposure Factor
84
FACL
File system Access Control List
85
FAR
False Acceptance Rate
86
FDE
Full Disk Encryption
87
FRR
False Rejection Rate
88
FTP
File Transfer Protocol
89
FTPS
Secured File Transfer Protocol
90
GCM
Galois Counter Mode
91
GPO
Group Policy Object
92
GPS
Global Positioning System
93
GPU
Graphic Processing Unit
94
GRE
Generic Routing Encapsulation
95
HA
High Availability
96
HDD
Hard Disk Drive
97
HIDS
Host-based Intrusion Detection System
98
HIPS
Host-based Intrusion Prevention System
99
HMAC
Hashed Message Authentication Code
100
HOTP
HMAC-based One Time Password
101
HSM
Hardware Security Module
102
HTML
HyperText Markup Language
103
HTTP
HypterText Transfer Protocol
104
HTTPS
HypterText Transfer Protocol over SSL/TLS
105
HVAC
Heating, Ventilation, and Air Conditioning
106
IaaS
Infrastructure as a Service
107
ICMP
Internet Control Message Protocol
108
ICS
Industrial Control Systems
109
ID
Identification
110
IDEA
International Data Encryption Algorithm
111
IDF
Intermediate Distribution Frame
112
IdP
Identity Provider
113
IDS
Intrusion Detection System
114
IEEE
Institute of Electrical and Electronic Engineers
115
IIS
Internet Information System
116
IKE
Internet Key Exchange
117
IM
Instant Messaging
118
IMAP4
Internet Message Access Protocol v4
119
IoT
Internet of Things
120
IP
Internet Protocol
121
IPSec
Internet Protocol Security
122
IR | 2 definitions
1) Incident Response | 2) Infrared
123
IRC
Internet Relay Chat
124
IRP
Incident Response Plan
125
ISA
Interconnection Security Agreement
126
ISP
Internet Service Provider
127
ISSO
Information Systems Security Officer
128
ITCP
IT Contingency Plan
129
IV
Initialization Vector
130
KDC
Key Distribution Center
131
KEK
Key Encryption Key
132
L2TP
Layer 2 Tunneling Protocol
133
LAN
Local Area Network
134
LDAP
Lightweight Directory Access Protocol
135
LEAP
Lightweight Extensible Authentication Protocol
136
MaaS
Monitoring as a Service
137
MAC | 3 definitions
1) Mandatory Access Control 2) Media Access Control 3) Message Authentication Code
138
MAN
Metropolitan Area Network
139
MBR
Master Boot Record
140
MD5
Message Digest 5
141
MDF
Main Distribution Frame
142
MDM
Mobile Device Management
143
MFA
Multi-Factor Authentication
144
MFD
Multi-Function Device
145
MITM
Man-In-The-Middle
146
MMS
Multimedia Message Service
147
MOA
Memorandum Of Agreement
148
MOU
Memorandum Of Understanding
149
MPLS
Multi-Protocol Label Switching
150
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
151
MSP
Managed Service Provider
152
MTBF
Mean Time Between Failures
153
MTTF
Mean Time To Failure
154
MTTR
Mean Time To Recover (or Repair)
155
MTU
Maximum Transmission Unit
156
NAC
Network Access Control
157
NAT
Network Address Translation
158
NDA
Non-Disclosure Agreement
159
NFC
Near Field Communcation
160
NGAC
Next Generation Access Control
161
NIDS
Network-based Intrusion Detection System
162
NIPS
Network-based Intrusion Prevention System
163
NIST
National Institute of Standards & Technology
164
NTFS
New Technology File System
165
NTLM
New Technology LAN Manager
166
NTP
Network Time Protocol
167
OAuth
Open Authentication
168
OCSP
Online Certificate Status Protocol
169
OID
Object Identifier
170
OS
Operating System
171
OTA
Over The Air
172
OVAL
Open Vulnerability Assessment Language
173
P12
PKCS #12
174
P2P
Peer To Peer
175
PaaS
Platform as a Service
176
PAC
Proxy Auto Configuration
177
PAM
Pluggable Authentication Modules
178
PAP
Password Authentication Protocol
179
PAT
Port Address Translation
180
PBKDF2
Password-Based Key Derivation Function 2
181
PBX
Private Branch Exchange
182
PCAP
Packet Capture
183
PEAP
Protected Extensible Authentication Protocol
184
PED
Personal Electronic Device
185
PEM
Privacy-enhanced Electronic Mail
186
PFS
Perfect Forward Secrecy
187
PFX
Personal Exchange Format
188
PGP
Pretty Good Privacy
189
PHI
Personal Health Information
190
PII
Personally Identifiable Information
191
PIV
Personal Identify Verification
192
PKI
Public Key Infrastructure
193
POODLE
Padding Oracle on Downgrade Legacy Encryption
194
POP
Post Office Protocol
195
POTS
Plain Old Telephone Service
196
PPP
Point-to-Point Protocol
197
PPTP
Point-to-Point Tunneling Protocol
198
PSK
Pre-Shared Key
199
PTZ
Pan-Tilt-Zoom
200
RA | 2 definitions
1) Recovery Agent | 2) Registration Authority
201
RAD
Rapid Application Development
202
RADIUS
Remote Authentication Dial-In User Server
203
RAID
Redundant Array of Inexpensive Disks
204
RAS
Remote Access Server
205
RAT
Remote Access Trojan
206
RBAC | 2 definitions
1) Role-Based Access Control | 2) Rule Based Access Control
207
RC4
Rivest Cipher version 4
208
RDP
Remote Desktop Protocol
209
RFID
Radio Frequency Identifier
210
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
211
ROI
Return On Investment
212
RMF
Risk Management Framework
213
RPO
Recovery Point Objective
214
RSA
Rivest, Shamir & Adleman
215
RTBH
Remotely Triggered Black Hole
216
RTO
Recovery Time Objective
217
RTOS
Real-Time Operating System
218
RTP
Real-Time Transport Protocol
219
S/MIME
Secure/Multipurpose Internet Mail Extensions
220
SaaS
Software as a Service
221
SAML
Security Assertions Markup Language
222
SAN | 2 definitions
1) Storage Area Network | 2) Subject Alternative Name
223
SCADA
System Control And Data Acquisition
224
SCAP
Security Content Automation Protocol
225
SCEP
Simple Certificate Enrollment Protocol
226
SCP
Secure Copy
227
SCSI
Small Computer System Interface
228
SDK
Software Development Kit
229
SDLC
Software Development Life Cycle
230
SDLM
Software Development Life Cycle Methodology
231
SDN
Software Defined Network
232
SED
Self-Encrypting Drive
233
SEH
Structured Exception Handler
234
SFTP
Secured File Transfer Protocol
235
SHA
Secure Hashing Algorithm
236
SHTTP
Secure Hypertext Transfer Protocol
237
SIEM
Security Information and Event Management
238
SIM
Subscriber Identity Module
239
SLA
Service Level Agreement
240
SLE
Single Loss Expectancy
241
SMB
Server Message Block
242
SMS
Short Message Service
243
SMTP
Simple Mail Transfer Protocol
244
SMTPS
Simple Mail Transfer Protocol Secure
245
SNMP
Simple Network Management Protocol
246
SOAP
Simple Object Access Protocol
247
SoC
System on Chip
248
SPF
Sender Policy Framework
249
SPIM
Spam over Internet Messaging
250
SPoF
Single Point of Failure
251
SQL
Structured Query Language
252
SRTP
Secure Real-Time Protocol
253
SSD
Solid State Drive
254
SSH
Secure Shell
255
SSID
Service Set Identifier
256
SSL
Secure Sockets Layer
257
SSO
Single Sign-On
258
STP
Shielded Twisted Pair
259
TACACS+
Terminal Access Controller Access Control System Plus
260
TCP/IP
Transmission Control Protocol/Internet Protocol
261
TGT
Ticket Granting Ticket
262
TKIP
Temporal Key Integrity Protocol
263
TLS
Transport Layer Security
264
TOTP
Time-based One Time Password
265
TPM
Trusted Platform Module
266
TSIG
Transaction Signature
267
UAT
User Acceptance Testing
268
UAV
Unmanned Aerial Vehicle
269
UDP
User Datagram Protocol
270
URI
Uniform Resource Identifier
271
URL
Universal Resource Locator
272
USB
Universal Serial Bus
273
USB OTG
USB On The Go
274
UTM
Unified Threat Management
275
UTP
Unshielded Twisted Pair
276
VDE
Virtual Desktop Environment
277
VDI
Virtual Desktop Infrastructure
278
VLAN
Virtual Local Area Network
279
VLSM
Variable Length Subnet Masking
280
VM
Virtual Machine
281
VoIP
Voice over IP
282
VPN
Virtual Private Network
283
VTC
Video Teleconferncing
284
WAF
Web Application Firewall
285
WAP
Wireless Access Point
286
WEP
Wired Equivalent Privacy
287
WIDS
Wireless Intrusion Detection System
288
WIPS
Wireless Intrusion Prevention System
289
WORM
Write Once Read Many
290
WPA
WiFi Protected Access
291
WPA2
WiFi Protected Access 2
292
WPS
WiFi Protected Setup
293
WTLS
Wireless TLS
294
XML
Extensible Markup Language
295
XOR
Exclusive Or
296
XSRF
Cross-Site Request Forgery
297
XSS
Cross-Site Scripting