Acronyms S-Z Flashcards

1
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extensions - standard for secure email messaging that provides encryption and digital signing capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SAN

A

Storage Area Network - specialized, high-speed network that provides network access to storage devices. SANs are typically composed of hosts, switches, storage elements, and storage devices that are interconnected using a variety of technologies, topologies, and protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SaaS

A

Software as a Service - a cloud computing model in which a third-party provider offers software applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SAE

A

Simultaneous Authentication of Equals - key exchange protocol that provides stronger security and that replaced PSK in WPA2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SATCOM

A

Secure Satellite Communications - refers to the use of satellite technology for communication purposes, including voice, data, and video transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SCADA

A

Supervisory Control and Data Acquisition - a system used to control and monitor industrial processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SCP

A

Secure Copy Protocol - a protocol used to securely transfer files between two devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SHA

A

Secure Hash Algorithm - SHA stands for secure hashing algorithm. SHA is a modified version of MD5 and used for hashing data and certificates. A hashing algorithm shortens the input data into a smaller form that cannot be understood by using bitwise operations, modular additions, and compression functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SID

A

Security Identifier - a unique identifier used to identify a user or group in Windows operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SIEM

A

Security Information and Event Management - type of security solution that provides real-time analysis of security alerts and events generated by network hardware and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SLA

A

Service Level Agreement - a contract between a client and a service provider that defines cybersecurity expectations and responsibilities. Security standards: Minimum service levels, incident response times, and protection against cyber threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SNMP

A

Simple Network Management Protocol - a protocol used to manage and monitor network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SMTP

A

Simple Mail Transfer Protocol - a protocol used to send email messages between servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SOAR

A

Security Orchestration, Automation and Response - security technology that helps organizations automate and streamline their security operations and incident response processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SoC

A

System on Chip - integrated circuit (IC) that combines various components of a computer or electronic system into a single chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SQL

A

Structured Query Language - a programming language used for managing and manipulating data in relational databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SQLi

A

SQL Injection)- SQL injection is a code injection technique that might destroy your database. SQL injection is one of the most common web hacking techniques. SQL injection is the placement of malicious code in SQL statements, via web page input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SSH

A

Secure Shell - a protocol used for secure remote access to a device. Uses Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SSL

A

Secure Sockets Layer - SSL, or Secure Sockets Layer, is an encryption-based Internet security protocol. It was first developed by Netscape in 1995 for the purpose of ensuring privacy, authentication, and data integrity in Internet communications. SSL is the predecessor to the modern TLS encryption used today. A website that implements SSL/TLS has “HTTPS” in its URL instead of “HTTP”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SSO

A

Single Sign-On - an authentication method that lets users access multiple applications and services using a single set of login credentials.

21
Q

STP

A

Spanning Tree Protocol - a protocol used to prevent loops in a network topology.

22
Q

STIX

A

Structured Threat Information Exchange - designed to support the sharing of cybersecurity threat intelligence between different organizations and cybersecurity technologies.

23
Q

TACACS+

A

Terminal Access Controller Access Control System Plus) - protocol used for providing centralized authentication, authorization, and accounting (AAA) services for network devices such as routers, switches, and firewalls.

24
Q

TAXII

A

Trusted Automated Exchange of Indicator Information - application protocol for exchanging Cyber Threat Intelligence over HTTPS. It works with STIX.

25
Q

TCP

A

Transmission Control Protocol - a protocol used to establish a reliable connection between two devices. Uses three way handshake.

26
Q

TOTP

A

Time Based One Time Password - TOTP uses a timestamp and a time-based factor to generate the password. Specifically, TOTP calculates the message authentication code based on the current time and a time interval (usually 30 seconds).

27
Q

TPM

A

Trusted Platform Module - chip on motherboard that can be used to store critical information such as encryption keys. TPM can be used for FDE (Full Disk Encryption).

28
Q

UAT

A

User Acceptance Testing - the final phase of the software testing process. In the UAT phase, real users test the software to ensure it works as expected in real-world scenarios.

29
Q

UBA

A

User Behaviour Analysis - checks whether user activity sticks out from their usual activity.

30
Q

UDP

A

User Datagram Protocol - a protocol used for sending datagrams over a network. Connectionless.

31
Q

UEFI

A

Unified Extensible Firmware Interface - modern version of BIOS. UEFI can be used for securely starting a device.

32
Q

URL

A

Uniform Resource Locator - a unique identifier used to locate a resource on the Internet. It is also referred to as a web address.

33
Q

VLAN

A

Virtual Local Area Network - a logical grouping of devices on a network that are grouped together based on factors such as function, department, or location, rather than physical location.

34
Q

VM

A

Virtual Machine - a software environment that emulates a physical computer.

35
Q

VPN

A

Virtual Private Network - a virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely. VPN technology is widely used in corporate environments.

36
Q

VTP

A

VLAN Trunking Protocol - proprietary protocol used by Cisco switches to exchange VLAN information. With VTP, you can synchronize VLAN information (such as VLAN ID or VLAN name) with switches inside the same VTP domain.

37
Q

WAF

A

Web Application Firewall - firewall used to protect web applications.

38
Q

WAP

A

Wireless Access Point) - network device that receives and transmits data over WLAN

39
Q

WEP

A

Wired Equivalent Privacy - wired equivalent privacy is meant to protect Wi-Fi transmissions by encrypting the data so outsiders who are not inside the encrypted network will not be able to read the messages or data contained within. WEP is better than no security at all, and it is still used on older devices that do not support WPA or WPA2.

40
Q

WIDS

A

Wireless Intrusion Detection System - a system used to detect unauthorized access to a wireless network.

41
Q

WPA

A

Wi-Fi Protected Access - a security protocol used for wireless networks. There is WPA, WPA2, WPA3.

42
Q

X.509

A

a standard for public key certificates used for authentication in network communication.

43
Q

XML

A

Extensible Markup Language - a markup language used for encoding documents in a format that is both human-readable and machine-readable.

44
Q

XSS

A

Cross-Site Scripting - a type of attack in which an attacker injects malicious code into a web page viewed by other users. Usually this code is javascript code. There are 3 main versions of XSS: DOM Based, Stored and Reflected XSS.

45
Q

SASE

A

Secure Access Service Edge - technology used to deliver wide area network and security controls as a cloud computing service

46
Q

SCAP

A

Security Content Automation Protocol - a set of open standards used to organize and express security-related information, enabling automated vulnerability management, policy compliance evaluation, and security measurement across different systems within an organization

47
Q

SLE

A

Single Loss Expectancy - estimated monetary loss an organization could expect to incur from a single occurrence of a specific security incident

48
Q

SPF

A

Sender Policy Framework - an email authentication protocol designed to prevent email spoofing by allowing domain owners to specify which mail servers are authorized to send emails on their behalf