Acronyms Flashcards
URL
Uniform Resource Locator
ARP
Address Resolution Protocol
DNS
Domain Name Service
IP
Internet Protocol
TCP
Transmission Control Protocol
UDP
User Datagram Protocol
WEP
Wired Equivalent Privacy
WPA
Wi-Fi Protected Access
SCAP
Security Control Automation Protocol
ROE
Rules of Engagement (Penetration Testing)
CMMI
Capability Maturing Model Integration
OSI
Open System Interconnection (Model)
MITM
Man-in-the-Middle (Attack)
DoS
Denial of Service
DDoS
Distributed Denial of Service
IRC
Internet Relay Chat
FTP
File Transfer Protocol
SSH
Secure Shell
RDP
Remote Desktop Protocol
SMTP
Simple Mail Transfer Protocol
POP
Post Office Protocol
IMAP
Internet Message Access Protocol
HTTP
HyperText Transfer Protocol
HTTPS
HyperText Transfer Protocol - Secure
ICMP
Internet Control Message Protocol
NAT
Network Address Translation
WAP
Wireless Access Point
AP
Access Point
MAC
Machine Access Code
ACL
Access Control List
DMZ
Demilitarised Zone
SSL
Secure Sockets Layer
TLS
Transport Layer Security
VPN
Virtual Private Network
IPSec
Internet Protocol Security
ESP
Encapsulating Security Payload (IPSec)
AH
Authentication Headers
SAs
Security Associations
IDS
Intrusion Detection System
IPS
Intrusion Prevention System
SPAN
Switch Port Analyser
UTM
Unified Threat Management
STP
Spanning Tree Protocol
SIEM
Security Information and Event Management
SNMP
Simple Network Management Protocol
SSID
Service Set Identifier
NAS
Network Attached Storage
SAN
Storage Area Network
MIMO
Multiple Input, Multiple Output
TKIP
Temporal Key Integrity Protocol
AES
Advanced Encryption Standard
PSK
Preshared Key
EAP
Extensible Authentication Protocol
CCMP
Counter Mode Cipher Block Chaining Message Authentication Code Protocol
LEAP
Light EAP
EAP: Extensible Authentication Protocol
PEAP
Protected EAP
EAP: Extensible Authentication Protocol
TTLS
Tunneled TLS
TLS: Transport Layer Security
FAST
Flexible Authentication via Secure Tunneling
WORM
Write Once, Read Many
NTP
Network Time Protocol
DLP
Data Loss Prevention
NAC
Network Access Control
AC
Access Control
SEG
Secure Email Gateway
SFTP
Secure FTP
FTP: File Transfer Protocol
RFC
Request for Change
GPO
Group Policy Object
FIM
File Integrity Monitoring
DEP
Data Execution Prevention
S/MIME
Secure/Multipurpose Internet Mail Extensions
MDM
Mobile Device Management
BYOD
Bring Your Own Device
CYOD
Choose Your Own Device
COPE
Company Owner, Personally Enabled
VDI
Virtual Desktop Infrastructure
RTP
Real Time Protocol
SRTP
Secure RTP
RTP: Real Time Protocol
VoIP
Voice over IP
DNSSEC
DNS Secure
DNS + Digital Certificates
DHCP
Dynamic Host Configuration Protocol
LDAP
Lightweight Directory Access Protocol
LDAPS
LDAP Secure
(Encrypted
LDAP: Lightweight Directory Access Protocol)
FTPS
FTP Secure [ FTP + TLS ]
FTP: File Transfer Protocol
SFTP
Secure FTP [ FTP over SSH ]
FTP: File Transfer Protocol
SCP
Secure Copy Protocol
SCP uses SSH
TFTP
Trivial FTP – [Insecure]
FTP: File Transfer Protocol
HSM
Hardware Security Modules
PUP
Potentially Unwanted Program
VBA
Visual Basic for Applications
APT
Advanced Persistent Threat
CybOX
Cyber Observable eXpression
STIX
Structured Threat Information eXpression
TAXII
Trusted Automated eXchange of Information
ISAC
Information Sharing and Analysis Centre
TTP
Tactics, Techniques, and Procedures
SOAR
Security Orchestration, Automation, and Response
PCI DSS
Payment Card Industry Data Security Standard
ASV
Approved Scanning Vendor
FISMA
Federal Information Security