Acroynms Flashcards

1
Q

3DES

A

Triple Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AD

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES256

A

Advanced Encryption Standard 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AIS

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ALE

A

Annual Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARO

A

Annualized Rate of Occurence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ASP

A

Active Server Pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ATT&CK

A

Adversarial Tactics Techniques & Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AV

A

Anti Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BCP

A

Business Continuity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BIA
Business Impact Analysis
26
BIOS
Basic Input/Output System
27
BPA
Business Partnership Agreement
28
BPDU
Bridge Protocol Data Unit
29
BSSI
Basic Service Set Identifier
30
BYOD
Bring Your Own Device
31
CA
Certificate Authority
32
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
33
CAR
Corrective Action Report
34
CASB
Cloud Access Security Broker
35
CBC
Cipher Block Chaining
36
CBT
Computer-based Training
37
CCMP
Counter-Mode/CBC-MAC Protocol
38
CCTV
Closed-Circuit Television
39
CERT
Computer Emergency Response Team
40
CFB
Cipher Feedback
41
CHAP
Challenge-Handshake Authentication Protocol
42
CIO
Chief Information Officer
43
CIRT
Computer Incident Response Team
44
CIS
Center for Internet Security
45
CIS
Content Management System
46
CN
Common Name
47
COOP
Continuity of Operations Planning
48
COPE
Corporate-owned Personally Enabled
49
CP
Contingency Planning
50
CRC
Cyclic Redundancy Check
51
CRL
Certificate Revocation List
52
CSA
Cloud Security Alliance
53
CSIRT
Computer Security Incident Response Team
54
CSO
Chief Security Officer
55
CSP
Cloud Service Provider
56
CSR
Certificate Signing Request
57
CSR
Certificate Signing Request
58
CSRF
Cross-Site Request Forgery
59
CSU
Channel Service Unit
60
CTM
Counter Mode
61
CTO
Chief Technology Officer
62
CVE
Common Vulnerabilities and Exposures
63
CVSS
Common Vulnerability Scoring System
64
CYOD
Chose your own device
65
DAC
Discretionary Access Control
66
DBA
Database Administrator
67
DDos
Distributed Denial of Service
68
DEP
Data Execution Prevention
69
DER
Distinguished Encoding Rules
70
DES
Data Encryption Standard
71
DHCP
Dynamic Host Configuration Protocol
72
DHE
Diffie-Hellman Exchange
73
DKIM
Domain Keys Identified Mail
74
DLL
Dynamic Link Library
75
DLP
Data Loss Prevention
76
DMARC
Domain Message Authentication IAM Reporting and Conformance
77
DNAT
Destination Network Address Transaction
78
DNS
Domain Name System
79
DNSSEC
Domain Name System Security Extensions
80
Dos
Denial of Service
81
DPO
Data Protection Officer
82
DRP
Disaster Recovery Plan
83
DSA
Digital Signature Algorithm
84
DSL
Digital Subscriber Line
85
EAP
Extensible Authentication Protocol
86
Electronic Code Book
ECB
87
Elliptic-curve Cryptography
ECC
88
ECDHE
Elliptic-curve Diffie-Hellman Ephemeral
89
ECDSA
Elliptic-curve Digital Signature Algorithm
90
EDR
Endpoint Detection and Response
91
EFS
Encrypted File System
92
Extended Instruction Pointer
EIP
93
EOL
End of Life
94
EOS
End of Service
95
ERP
Enterprise Resource Planning
96
ESN
Electronic Serial Number
97
ESP
Encapsulating Security Payload
98
ESSID
Extended Service Set Identifier
99
FSACL
File System Access Control List
100
FDE
Full Disk Encryption
101
FIM
File Integrity Monitoring
102
FPGA
Field Programmable Gate Array
103
FRR
False Rejection Rate
104
FTP
File Transfer Protocol
105
FTPS
Secured File Transfer Protocol
106
GCM
Galois/Counter Mode
107
GDPR
General Data Protection Regulation
108
GPG
GNU Privacy Guard
109
GPO
Group Policy Object
110
GPS
Global Positioning System
111
GPU
Graphics Processing Unit
112
GRE
Generic Routing Encapsulation
113
HA
High Availability
114
HDD
Hard Disk Drive
115
HIDS
Host-based Intrusion Detection System
116
HIPS
Host-based Intrusion Prevention System
117
HMAC
Hash-based Message Authentication Code
118
HOTP
HMAC-based One Time Password
119
HSM
Hardware Security Module
120
HSMaaS
Hardware Security Module as a Service
121
HTML
Hypertext Markup Language
122
HTTP
Hypertext Translation Protocol
123
HTTPS
Hypertext Translation Protocol Secure
124
HVAC
Heating, Ventilation, Air Conditioning
125
Iaas
Infrastructure as a Service
126
Identity and Access Management
IAM
127
ICMP
Internet Control Message Protocol
128
ICS
Industrial Control Systems
129
IDEA
International Data Encryption Algorithm
130
IDF
Intermediate Distribution Frame
131
IdP
Identity Provider
132
IDS
Intrusion Detection System
133
IEEE
Institute of Electrical and Electronics Engineers
134
IKE
Internet Key Exchange
135
IM
Instant Messaging
136
IMAP4
Internet Message Protocol v4
137
IOC
Indicator of Compromise
138
IoT
Internet of Things
139
IP
Internet Protocol
140
IPS
Intrusion Prevention System
141
IPsec
Internet Protocol Security
142
IR
Incident Response
143
IRP
Incident Response Plan
144
IRC
Internet Relay Chat
145
ISA
Interconnection Security Agreement
146
ISFW
Internal Segmentation Firewall
147
ISO
International Organization for Standardization
148
ISP
Internet Service Provider
149
ISSO
Information Systems Security Officer
150
ITCP
IT Contingency Plan
151
IV
Initialization Vector
152
KDC
Key Distribution Center
153
KEK
Key Encryption Key
154
L2TP
Layer 2 Tunneling Protocol
155
LAN
Local Area Network
156
LDAP
Lightweight Directory Access Protocol
157
LEAP
Lightweight Extensible Authentication Protocol
158
MaaS
Monitoring as a Service
159
MAC
Media Access Control
160
MAM
Mobile Application Management
161
MAN
Metropolitan Area Network
162
MBR
Master Boot Record
163
MD5
Message Digest 5
164
MDF
Main Distribution Frame
165
MDM
Mobile Device Management
166
MFA
Multi-Factor Authentication
167
MFD
MultiFunction Device
168
MFP
Multifunction Printer
169
ML
Machine Learning
170
MMS
Multimedia Messaging service
171
MOA
Memorandum of Agreement
172
MOU
Memorandum of Understanding
173
MPLS
Multiprotocol Label Switching
174
MSA
Measurement System Analysis
175
MS-CHAP
Microsoft Challenge Handshake Authentication Protocol
176
MSP
Managed Service Provider
177
MSSP
Managed Security Service Provider
178
MTBF
Mean Time Between Failures
179
MTTF
Mean Time to Failure
180
MTTR
Mean Time to Repair
181
MTU
Maximum Transmission Unit
182
NAC
Network Access Control
183
NAS
Network Attached Storage
184
NAT
Network Address Translation
185
NDA
Non-Disclosure Agreement
186
NFC
Near Field Communication
187
NFV
Network Function Virtualization
188
NGFW
Next-generation Firewall
189
NG-SWG
Next-generation Secure Web Gateway
190
NIC
Network Interface Card
191
NGFW
Next-generation Firewall
192
NFV
Network Function Virtualization
193
NIDS
Network-based Intrusion Detection System
194
NIPS
Network-based Intrusion Prevention System
195
NIST
National Institute of Standards & Technology
196
NOS
Network Operations Center
197
NTFS
New Technology File System
198
NTLM
New Technology LAN Manager
199
NTP
Network Time Protocol
200
OCSP
Online Certificate Status Protocol
201
OID
Object Identifier
202
OS
Operating Systems
203
OSI
Open System Interconnection
204
OSINT
Open Source Intelligence
205
OSPF
Open Short Path First
206
OT
Operational Technology
207
OTA
Over-The-Air
208
OTG
On-The-Go
209
OVAL
Open Vulnerability and Assessment Language
210
OWASP
Open Web Application Security Project
211
P12
PKCS#12
212
P2P
Peer 2 Peer
213
PaaS
Platform as a Service
214
PAC
Proxy Auto Configuration
215
PAM
Privileged Access Management
216
PAM
Pluggable Authentication Modules
217
PAP
Password Authentication Protocol
218
PAT
Port Address Translation
219
PBKDF2
Password-based Key Derivation Function 2
220
PBX
Private Branch Exchange
221
PCAP
Packet Capture
222
PCIDSS
Payment Card Industry Data Security Standard
223
PDU
Power Distribution Unit
224
PE
Portable Executable
225
PEAP
Protected Extensible Authentication Protocol
226
PED
Portable Electronic Device
227
PEM
Privacy Enhanced Mail
228
PFS
Perfect Forward Secrecy
229
PGP
Pretty Good Privacy
230
PHI
Personal Health Information
231
PII
Personally Identifiable Information
232
PIN
Personal Identification Number
233
PIV
Personal Identity Validation
234
PKCS
Public Key Cryptography Standards
235
PKI
Public Key Infrastructure
236
PoC
Proof of Concept
237
POP
Post Office Protocol
238
POTS
Plain Old Telephone Service
239
PPP
Point to Point Protocol
240
PPTP
Point to Point Tunneling Protocol
241
PSK
Preshared Key
242
PTZ
Pan-Tilt-Zoom
243
PUP
Potentially Unwanted Program
244
RA
Registration Authority
245
RAD
Rapid Application Development
246
RADIUS
Remote Authentication Dial-In User Service
247
RAID
Redundant Array of Inexpensive Disk
248
QA
Quality Assurance
249
QoS
Quality of Service
250
RAM
Random Access Memory
251
RAS
Remote Access Server
252
RAT
Remote Access Trojan
253
RC4
Rivest Cipher Verison 4
254
RCS
Rich Communication Services
255
RFC
Request For Comments
256
RFID
Radio Frequency Identification
257
RIPEMD
Race Integrity Primitives Evaluation Message Digest
258
ROI
Return On Investment
259
RPO
Recovery Point Objective
260
RSA
Rivest, Shamir, & Adleman
261
RTBH
Remotely Triggered Black Hole
262
RTO
Recovery Time Objective
263
RTOS
Real Time Operating System
264
RTTP
Real Time Transport Protocol
265
S/MIME
Secure/Multipurpose Internet Mail Extensions
266
SaaS
Software as a Service
267
SAE
Simultaneous Authentication of Equals
268
SAML
Security Assertions Markup Language
269
SCADA
Supervisory Control and Data Acquisition
270
SCAP
Security Content Automation Protocol
271
SCEP
Simple Certificate Enrollment Protocol
272
SDK
Software Development Kit
273
SDLC
Software Development Life Cycle
274
SDLM
Software Development Life Cycle Methodology
275
SDN
Software defined Networking
276
SDP
Service Delivery Platform
277
SDV
Software Defined Visibility
278
SED
Self Encrypting Drive
279
SEH
Structured Exception Handling
280
SFTP
SSH File Transfer Protocol
281
SHA
Secure Hashing Algorithm
282
SIEM
Security Information and Event Management
283
SIM
Subscriber Identity Module
284
SIP
Session Initiation Protocol
285
SLA
Service-level agreement
286
SLE
Single Loss Expectancy
287
SMB
Server Message Block
288
SMTP
Simple Mail Transfer Protocol
289
SMTPS
Simple Mail Transfer Protocol Secure
290
SNMP
Simple Network Management Protocol
291
SOAP
Simple Object Access Protocol
292
SOAR
Security Orchestration, Automation, Response
293
SMS
Short Message Service
294
SoC
System on Chip
295
SOC
Security Operations Center
296
SPF
Sender Policy Framework
297
SPIM
Spam Over Instant Messenger
298
SQL
Structured Query Language
299
SQLi
SQL Injection
300
SRTP
Secure Real-Time Protocol
301
SSD
Solid State Drive
302
SSH
Secure Shell
303
SSID
Service Set Identifier
304
SSL
Secure Sockets Layer
305
SSO
Single Sign-On
306
STIX
Structured Threat Information eXpression
307
STP
Shielded Twisted Pair
308
SWG
Secure Web Gateway
309
TACACS+
Terminal Access Controller Access Control System
310
TAXII
Trusted Automatic eXchange of Intelligence Information
311
TCP/IP
Transmission Control Protocol / Internet Protocol
312
TGT
Ticket Granting Ticket
313
TKIP
Temporal Key Integrity Protocol
314
TLS
Transport Layer Security
315
TOPT
Time-based One Time Password
316
TPM
Trusted Platform Module
317
TSIG
Transaction Signature
318
TTP
Techniques, Tactics, and Procedures
319
UAT
User Acceptance Testing
320
UDP
User Datagram Protocol
321
UEBA
User and Entity Behavior Analytics
322
UEFI
Unified Extensible Firmware Interface
323
UEM
Unified Endpoint Management
324
UPS
Uninterrupted Power Supply
325
URI
Uniform Resource Identifier
326
URL
Uniform Resource Locater
327
USB
Universal Serial Bus
328
USB
USB On-The-Go
329
UTM
Unified Threat Management
330
UTP
Unshielded Twisted Pair
331
VBA
Visual Basic for Applications
332
VDE
Virtual Desktop Environment
333
VDI
Virtual Desktop Infrastructure
334
VLAN
Virtual Local Area Network
335
VLSM
Variable-length Subnet Masking
336
VM
Virtual Machine
337
VoIP
Voice over IP
338
VPC
Virtual Private Cloud
339
VPN
Virtual Private Network
340
VTC
Video Teleconferencing
341
WAF
Web Application Firewall
342
WAP
Wireless Access Point
343
WEP
Wired Equivalent Policy
344
WIDS
Wireless Intrusion Detection System
345
WIPS
Wireless Intrusion Prevention System
346
WORM
Write Once Read Many
347
WPA
Wifi Protected Access
348
WPS
Wifi Protected Setup
349
XaaS
Anything as a Service
350
XML
eXtensible Markup Langauge
351
XOR
Exclusive OR
352
XSRF
Cross Site Request Forgery
353
XSS
Cross Site Scripting