Acronyms (Security) Flashcards
AIS
Automated Indicator Sharing
ASLR
Address Space Layout Randomization
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge
AV
Antivirus
AAA
Authentication, Authorization, and Accounting
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
CASB
Cloud Access Security Broker
CIA
Confidentiality, Integrity, Availability
CVE
Common Vulnerability Enumeration
CVSS
Common Vulnerability Scoring System
DAC
Discretionary Access Control
DLP
Data Loss Prevention
EDR
Endpoint Detection and Response
FACL
File System Access Control List
ACL
Access Control List
FIM
File Integrity Management
GPO
Group Policy Object
HA
High Availability
HIDS
Host-based Intrusion Detection System
HIPS
Host-based Intrusion Prevention System
HOTP
HMAC-based One-time Password
IDS
Intrusion Detection System
IoC
Indicators of Compromise
NAC
Network access control
MAC
Access control
Mandatory Access Control
NIDS
Network-based Intrusion Detection System
NIPS
Network-based Intrusion Prevention System
OSINT
Open-source Intelligence
OVAL
Open Vulnerability Assessment Language
PAM
Privileged Access Management
PCAP
Packet Capture
RBAC
Not rule
Role-based Access Control
RBAC
Not role
Rule-based Access Control
SE Linux
Security-enhanced Linux
SIEM
Security Information and Event Management
SPIM
Spam over Internet Messaging
STIX
Structured Threat Information eXchange
TAXII
Trusted Automated eXchange of Indicator Information
TOTP
Time-based One-time Password
TTP
Tactics, Techniques, and Procedures
UEM
Unified Endpoint Management
UTM
Unified Threat Management
WIDS
Wireless Intrusion Detection System
WIPS
Wireless Intrusion Prevention System
XDR
Extended Detection and Response