Acronyms for Security + Flashcards

1
Q

AAA

A

Authentication, Authorization, and Accounting

A framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List

access rights each user has to a particular system object, such as a file directory or individual file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard

Symmetric Encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES-256

A

Advanced Encryption Standards 256-bit

A version of the AES using a 256-bit key size for encryption,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AH

A

Authentication Header

part of the IPsec protocol that provides authentication and integrity to the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AIS

A

Automation Indicator Sharing

system that allows exchange of cyber threat indicators between public and private sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ALE

A

Annualized Loss Expectancy

risk management concept to estimate the monetary loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AP

A

Access Point

Network hardware device that allows other WIFI devices to connect to a wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

APT

A

Advanced Persistent Threat

Cyberattack where intruder gains access to a network and remains undetected for a long time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ARO

A

Annualized Rate of Occurrence

Frequency which a event is likely to occur annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARP

A

Address Resolution Protocol

Communication protocol used for discovering link layer address (mac)

Port 219

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ASLR

A

Address Space Layout Randomization

Security Technique preventing memory corruption vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ATT&CK

A

Adversarial Tactics, Techniques and common Knowledge

maintained by MITRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BASH

A

Unix shell command language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BCP

A

Business Continuity Planning

prevention and recovery from potential threats to a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BGP

A

Border Gateway Protocol

Protocol used to route information across the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BIA

A

Business Impact Analysis

evalutes potential effects of natural and man-made events on business operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BPA

A

Business Partners Agreement

contract between parties who agreed to share resources to undertake a specific project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BPDU

A

Bridge Protocol Data Unit

network message transmitted by LAN bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CAR

A

Corrective Action Report

report outlines the corrective actions necessary to rectify a detected non-conformance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

CASB

A

Cloud Access Security Broker

security policy enforcement points placed between cloud service consumers and cloud service providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

CBC

A

Cipher Block Chaining

provides confidentiality but not
message intergrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

CCMP

A

Counter mode/CBC-MAC Protocol

encryption protocol used in WIFI Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

CCTV

A

Closed-circuit Television

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

CERT

A

Computer Emergency Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

CFB

A

Cipher Feedback

mode operation for block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

CHAP

A

Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

CIA

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

CIO

A

Chief Information Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

CIRT

A

Computer Incident Response Team

contact when security breach emergency occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

CMS

A

Content Management System

software creates, manages content on a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

COOP

A

Continuity of Operation Planning

process by gov agencies to ensure critical functions continue during wide range of emergencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

COPE

A

Corporate Owned, Personally Enabled

corpo owned IT devices for personal use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

CP

A

Contingency Planning

action that helps organization respond to significant future event or situations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

CRC

A

Cyclical Redundancy Check

code - detect accidental changes to raw data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

CRL

A

Certificate Revocation List

revoked by issuing certificate authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

CSO

A

Chief Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

CSP

A

Cloud Service Provider

company that offers some component of cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

CSR

A

Certificate Signing Request

applying for digital identity Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

CSRF

A

Cross-site Request Forgery

malicious exploit of website where unauthorized commands are transmitted from a user that the web application trusts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

CSU

A

Channel Service Unit

device used in digital data transmission for interfacing a digital data terminal with a digital transmission medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

CTM

A

Counter Mode
mode of operation in cryptography for block ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

CTO

A

Chief Technology Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

CVE

A

Common Vulnerability Enumeration

list of publicly disclosed cybersecurity vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

CVSS

A

Common Vulnerability Scoring System

industry standard for assessing the severity of computer system security vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

CYOD

A

Choose Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

DAC

A

Discretionary Access Control

access control defined by ACL where access rights are assigned to users by the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

DBA

A

Database Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

DDoS

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

DEP

A

Data Execution Prevention

security feature that helps prevent damage to the computer from virus and other threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

DES

A

Digital Encryption Standard

Encryption of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

DHCP

A

Dynamic Host Configuration Protocol
assigns IP addresses automatically to each device on network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

DHE

A

Diffie-Hellman Ephermal
secure exchange cryptographic keys over public channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

DKIM

A

Domain Keys Identified Mail

email authentication method designed to detect forage sender addresses in emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

DLL

A

Dynamic Link Library

feature on windows that allow mulitple software programs to share same functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

DLP

A

Data Loss Prevention

set of tools and processes used to ensure that sensitive data is not loss misused or accessed by unauth users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

DMARC

A

Domain Message Authentication Reporting and Conformance

email authentication protocol, prevent email spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

DNAT

A

Destination Network Address Translation

technique for transparently changing the destination IP address of an end route packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

DNS

A

Domain Name Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

DoS

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

DPO

A

Data Privacy Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

DRP

A

Disaster Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

DSA

A

Digital Signature Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

DSL

A

Digital Subscriber Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

EAP

A

Extensible Authentication Protocol

authentication framework used for wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

ECB

A

Electronic Code Book

mode of operation for a block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

ECC

A

Elliptic Curve Cryptography
approach to public key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

ECDHE

A

Elliptic Curven Diffie-Hellman Ephemeral

ECDHE is one of the three main algorithms used for the initial TLS handshake, are classified as asymmetric algorithms because one party has a secret key and the other party has a public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

ECDSA

A

Elliptic Curve Digital Signature Algorithm

used on bitcoin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

EDR

A

Endpoint Detection and Response

cybersecurity technology that addresses need for continuous monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

EFS

A

Encrypted File System

feature on Microsoft Windows that provides filesystem - level encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

ERP

A

Enterprise Resource Planning

business process management software that allows organizations to use a system of integrated applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

ESN

A

Electronic Serial Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

ESP

A

Encapsulated Security Payload

component of IPsec used for confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

FACL

A

File System Access Control List

data structure that controls access to files and folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

FDE

A

Full Disk Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

FIM

A

File Integrity Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

FPGA

A

Field Programmable Gate Array

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

FRR

A

False Rejection Rate

likelihood that biometric security system will incorrectly reject access attempt by auth user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

FTP

A

File Transfer Protocol
Network Protocol used for transfer of computer files between a client and server on a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

FTPS

A

File Transfer Protocol Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

GCM

A

Galosis Counter mode

mode of operation for symmetric key cryptographic block ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

GDPR

A

General Data Protection Regulation

in the Europe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

GPG

A

GNU Privacy Guard

free software to encrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

GPO

A

Group Policy Object

feature of Windows that provides centralized mangement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

GPS

A

Global Positioning System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

GPU

A

Graphics Processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

GRE

A

Generic Routing Encapsulation

tunneling protocol, encapsulate layers of network protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

HA

A

High Availability

Refers to systems that are durable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

HDD

A

Hard Disk Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

HIDS

A

Host-based Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

HIPS

A

Host-based Intrusion Prevention system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

HMAC

A

Hashing Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

HOTP

A

HMAC-based One-time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

HSM

A

Hardware Security Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

HTML

A

Hypertext Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

HTTP

A

Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

HTTPS

A

Hypertext Transfer Protocol Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

IaaS

A

Infrastructure as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

IaC

A

Infrastructure as Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

IAM

A

Identity and Access Management

framework of business processes, policies, and tech

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

ICMP

A

Internet Control Message Protocol

sends error messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

ICS

A

Industrial Control Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

IDEA

A

International Data Encryption Algorithm

symmetric key block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

IDF

A

Intermediate Distribution Frame

cable rack that interconnects telecom wiring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

IdP

A

Identity Provider

provides principal authentication to other service providers within a federation or distrubuted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

IDS

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

IEEE

A

Institute of Electrical and Electronics Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

IKE

A

Internet Key Exchange

protocol used on IPsec for establishing SA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

IM

A

Instant Message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

IMAP

A

Internet Message Access Protocol

used by email clients to retrieve messages from a mail server over TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

IoC

A

Indicators of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

IoT

A

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

IP

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

IPS

A

Intrustion Prevention System

119
Q

IPSec

A

Internet Protocol Security

secure network protocol suite that auth and encrypts packet of data sent over internet protocol network

120
Q

IR

A

Incident Response

121
Q

IRP

A

Incident Response Plan

122
Q

ISO

A

International Standards Organization

123
Q

ISP

A

Internet Service Provider

124
Q

ISSO

A

Information System Security Officer

125
Q

IV

A

Initialization Vector

a fixed size input to a cryptographic primitive that is typically required to be random or pseudorandom

126
Q

KDC

A

Key Distribution Center

part of crypto system intended to reduce the risks, inherit and exchanging keys

127
Q

KEK

A

key encryption key

128
Q

LAN

A

local area network

129
Q

LDAP

A

Lightweight Directory Access Protocol

protocol for accessing and maintaining distributive directory information services over Internet

130
Q

LEAP

A

lightweight extensible authentication protocol

wireless LAN authentication method

131
Q

MaaS

A

monitoring as a service

132
Q

MAC

A

Message Authentication Code

133
Q

MAN

A

Metropolitan area network

134
Q

MBR

A

Master boot record

special type of boot sector at the very beginning of a partitioned computer mask storage device

135
Q

MD5

A

message digest 5

cryptographic hash function produces a 128-bit hash value not secure

136
Q

MDF

A

Main distribution frame

frame for connecting equipment to cables and subscriber carrier equipment

137
Q

MDM

A

Mobile device management

138
Q

MFA

A

Multi-Factor authentication

139
Q

MFD

A

Multi-Function device

140
Q

MFP

A

multifunction printer

141
Q

ML

A

machine learning

142
Q

MOA

A

memorandum of agreement

document written between parties to cooperatively work together on agreed upon project or meet agreed upon objective

143
Q

MOU

A

Memorandum of Understanding

agreement between two or more parties outlined in a formal document

144
Q

MPLS

A

Multi-Protocol label switching

145
Q

MSA

A

Master Service Agreement

contract reached between parties in which parties agree to most of the terms that will govern future transactions

146
Q

MSCHAP

A

Microsoft challenge handshake authentication protocol

147
Q

MSP

A

Managed Service Provider

148
Q

MSSP

A

Managed Security Service Provider

149
Q

MTBF

A

meantime between failure

measure of how reliable a hardware product is

150
Q

MTTF

A

Meantime to Failure

length of time a device is expected to last in operation

151
Q

MTTR

A

Mean Time to Recover

average time that a device will take to recover from any failure

152
Q

MTU

A

Maximum Transmission Unit

largest packet that a network product will can transmit

153
Q

NAC

A

Network access control

security solution that enforces policy on devices the access networks

154
Q

NAT

A

Network address translation

method of remapping one address space into another

155
Q

NGFW

A

next generation firewall

156
Q

NIDS

A

Network-Based intrusion detection system

analyzes incoming Network traffic

157
Q

NIPS

A

Network based intrusion prevention system

158
Q

NIST

A

national institution of standards and technology

159
Q

NTFS

A

New technology file system

developed by Microsoft

160
Q

NTLM

A

New technology Lan manager

Suits of Microsoft security protocols

161
Q

NTP

A

Network Time Protocol

protocol for clock synchronization between computer systems

162
Q

OAUTH

A

Open authorization

Internet users Grant websites access their information

163
Q

OCSP

A

Online Certification Status Protocol

protocol used to obtaining revocation status of digital certification

164
Q

OID

A

Object Identifier

An internet protocol used for obtaining the revocation status of an X.509 digital certificate.

165
Q

OS

A

Operating System

166
Q

OSINT

A

Open Source Intelligence

167
Q

OSPF

A

Open Shortest path First

routing protocol for IP

168
Q

OT

A

Operational Technology

Hardware and software that detects or causes a change through the direct monitoring and/or control of physical devices, processes, and events in the enterprise.

169
Q

OTA

A

Over the Air

170
Q

OVAL

A

Open Vulnerability Assessment Language

171
Q

P12

A

PKCS 12

A portable format for storing or transporting a user’s private keys, certificates, and miscellaneous secrets.

172
Q

P2P

A

Peer to Peer

173
Q

Paas

A

Platform as a Service

174
Q

PAC

A

Proxy Auto Configuration

175
Q

PAM

A

Pluggable Authentication Mangement

176
Q

PAP

A

Pluggable Authentication Protocol

177
Q

PAT

A

Port Address Translation

178
Q

PBKDF2

A

Password-based Key Derivation Function 2

reduce the vulnerability of passwords to brute-force attacks.

179
Q

PBX

A

Private Branch Exchange

private telephone network used within a company or organization.

180
Q

PCAP

A

Packet Capture

181
Q

PCI DSS

A

Payment Card Industry Data Security Standard

182
Q

PDU

A

Power Distribution Unit

183
Q

PEAP

A

Protected Extensible Authentication Protocol

security protocol that encrypts authentication data using 802.11 Wi-Fi networks

184
Q

PED

A

Personal Electronic Device

185
Q

PEM

A

Privacy Enhanced Mail

186
Q

PFS

A

Perfect Forward Secrecy

187
Q

PGP

A

Pretty Good Privacy

188
Q

PHI

A

Personal Health Information

189
Q

PII

A

Personally Identifiable Information

190
Q

PIV

A

Personal Identity Verification

191
Q

PKCS

A

Public Key Cryptography Standards

192
Q

PKI

A

Public Key Infrastructure

193
Q

POTS

A

Plain Old Telephone Service

194
Q

PPP

A

Pont-to-Point Protocol

data link protocol commonly used to establish a direct connection between two networking nodes.

195
Q

PSK

A

Pre-shared Key

196
Q

PTZ

A

Pan-tilt-zoom

197
Q

PUP

A

Potentially Unwanted Program

198
Q

RA

A

Recovery Agent

199
Q

RA

A

Registration Authority

200
Q

RAD

A

Rapid Application Development

201
Q

RADIUS

A

Remote Authentication Dial-in User Service

protocol that provides centralized AAA

202
Q

RAID

A

Redundant Array of Inexpensive Disk

203
Q

RAS

A

Remote Access Server

204
Q

RAT

A

Remote Access Trojan

205
Q

RBAC 1/2

A

Role-Based Access Control

206
Q

RBAC 2/2

A

Rule-Based Access Control

207
Q

RC4

A

Rivest Cipher version 4

symmetric key stream cipher that encrypts messages one byte at a time.

208
Q

RDP

A

Remote Desktop Protocol

Port 3389

209
Q

RFID

A

Radio Frequency Identifier

210
Q

RIPEMD

A

(RACE Integrity Primitives Evaluation Message Digest):

hashing method no longer secure

211
Q

ROI

A

Return on Investment

212
Q

RPO

A

Recovery Point Objective

The maximum acceptable amount of data loss measured in time.

213
Q

RSA

A

Rivest, Shamir, Adleman

public-key cryptography system

214
Q

RTBH

A

Remotely Triggered Black Hole

technique used to block denial-of-service attacks in IP networks.

215
Q

RTO

A

Recovery Time Objective

The targeted duration of time and a service level within which a business process must be restored after a disaster or disruption.

216
Q

RTOS

A

Real Time Operating System

217
Q

RTP

A

Real-time Transport Protocol

network protocol for delivering audio and video over IP networks.

218
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extension

219
Q

SaaS

A

Software as a Service

220
Q

SAE

A

Simultaneous Authentication of Equals

A security protocol used in Wi-Fi networks.

221
Q

SAML

A

Security Assertions Markup Language

open standard for exchanging authentication and authorization data between parties

222
Q

SAN 1/2

A

Storage Area Network

223
Q

SAN 2/2

A

Subject Alternative Name

extension to X.509 specification that allows users to specify additional host names for a single SSL certificate.

224
Q

SASE

A

Secure Access Service Edge

network architecture that combines WAN capabilities with comprehensive security functions.

225
Q

SCADA

A

Supervisory Control and Data Acquisition

226
Q

SCAP

A

Security Content Automation Protocol

specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation.

227
Q

SCEP

A

Simple Certificate Enrollment Protocol

protocol used for the secure issuance of digital certificates.

228
Q

SD-WAN

A

Software-defined Wide Area Network

229
Q

SDK

A

Software Development Kit

230
Q

SDLC

A

Software Development Lifecycle

231
Q

SDLM

A

Software Development Lifecycle Methodology

232
Q

SDN

A

Software-defined Network

233
Q

SE Linux

A

Security-enhanced Linux

234
Q

SED

A

Self-encrypting Drives

235
Q

SEH

A

Structure Exception Handler

236
Q

SFTP

A

Secured File Transfer Protocol

237
Q

SHA

A

Secure Hashing Algorithm

238
Q

SHTTP

A

Secure Hypertext Transfer Protocol

239
Q

SIEM

A

Security Information and Event Management

240
Q

SIM

A

Subscriber Identity Module

241
Q

SLA

A

Service-level Agreement

commitment between a service provider and a client. Particular aspects of the service – quality, availability, responsibilities – are agreed upon between the service provider and the service user.

242
Q

SLE

A

Single Loss Expectancy

term used in risk management referring to the monetary value expected from the occurrence of a risk on an asset.

243
Q

SMTP

A

Simple Mail Transfer Protocol

244
Q

SMTPS

A

Simple Mail Transfer Protocol Secure

245
Q

SNMP

A

Simple Network Management Protocol

246
Q

SOAP

A

Simple Object Access Protocol

247
Q

SOAR

A

Security Orchestration, Automation, and Response

a set of tools and services that automate cyberattack response and prevention.

248
Q

SoC

A

System on Chip

249
Q

SOC

A

Security Operations Center

250
Q

SOW

A

Statement of Work

It defines project-specific activities, deliverables, and timelines for a vendor providing services to the client.

251
Q

SPF

A

Sender Policy Framework

email authentication method lists the servers that can send emails from a domain

252
Q

SPIM

A

Spam over Internet Message

253
Q

SQLi

A

SQL Injection

254
Q

SRTP

A

Secure Real-Time Protocol

255
Q

SSD

A

Solid State Drive

256
Q

SSH

A

Secure Shell

257
Q

SSL

A

Secure Socket Layer

258
Q

SSO

A

Single Sign In

259
Q

STIX

A

Structured Threat Information eXchange

language and serialization format used to exchange cyber threat intelligence.

260
Q

SWG

A

Secure Web Gateway

261
Q

TACACS+

A

Terminal Access Controller Access Control System plus

262
Q

TAXII

A

Trusted Automated eXchange of Indicator Information

the format through which threat intelligence data is transmitted

263
Q

TCP/IP

A

Transmission Control Protocol/Internet Protocol

264
Q

TGT

A

Ticket Granting Ticket

part of the Kerberos protocol used for authenticating requests for service tickets within the network.

265
Q

TKIP

A

Temporal Key Integrity Protocol

security protocol used in the IEEE 802.11 wireless networking standard.

266
Q

TLS

A

Transport Layer Security

267
Q

TOC

A

Time-of-Check

problem where the state of a system can change between the time it is checked and the time it is used.

268
Q

TOTP

A

Time-Based One-Time Password

269
Q

TOU

A

Time of Use

270
Q

TPM

A

Trusted Platform Module

271
Q

TTP

A

Tactics, Techniques and Procedures

272
Q

TSIG

A

Transaction Signature

protocol used for securing updates to DNS, which is based on shared secret key cryptography.

273
Q

UAT

A

User Acceptance Testing

274
Q

UAV

A

Unmanned Arial Vehicle

275
Q

UDP

A

User Datagram Protocol

messages between computing devices in a network. It’s used for time-sensitive transmissions.

276
Q

UEFI

A

Unified Extensible Firmware Interface

replaces BIOS

277
Q

UEM

A

Unified Endpoint Mangement

278
Q

UPS

A

Uninterruptible Power Supply

279
Q

URI

A

Uniform Resource Identifier

280
Q

UTM

A

Unified Threat Management

281
Q

UTP

A

Unshielded Twisted Pair

282
Q

VBA

A

Visual Basic for Applications

computer programming language

283
Q

VDE

A

Virtual Desktop Environment

284
Q

VDI

A

Virtual Desktop Infrastructure

285
Q

VLAN

A

Virtual Local Area Network

286
Q

VLSM

A

Variable Length Subnet Masking

287
Q

VM

A

Virtual Machine

288
Q

VoIP

A

Voice over Internet Protocol

289
Q

VPC

A

Virtual Private Cloud

290
Q

VPN

A

Virtual Private Network

291
Q

VTC

A

Video Teleconferencing

292
Q

WAF

A

Web Application Firewall

293
Q

WAP

A

Wirless Access Point

294
Q

WEP

A

Wired Equivalent Prvacy