All Acronyms Flashcards
AUP
Acceptable Use Policy
ACL
Access Control List
AP
Access Point
ARP
Address Resolution Protocol
APT
Advanced Persistent Threat
GCMP
AES Galois Counter Mode Protocol
ALE
Annualized Loss Expectancy
ARO
Annualized Rate of Occurrence
A-V
Anti-Virus
AAA
Authentication
Authorization
Accounting
BYOD
Bring Your Own Device
BC
Business Continuity
BEC
Business E-mail Compromise
BIA
Business Impact Analysis
BPA
Business Partnership Agreement
CRL
Certificate Revocation List
CSR
Certificate Signing Request
CIO
Chief Information Officer
CSO
Chief Security Officer
CTO
Chief Technology Officer
CYOD
Choose Your Own Device
CIA Triad
Confidentiality
Integrity
Availability
(Non-Repudiation)
CSP
Cloud Service Provider
C2
Command and Control
CN
Common Name
CVE
Common Vulnerabilities and Exposures
CVSS
Common Vulnerability Scoring System
CIRT
Computer Incident Response Team
CBT
Computer-Based Training
COOP
Continuity of Operations Plan
COBO
Corporate Owned, Business Only
COPE
Corporate Owned, Personally Enabled
CSRF
Cross-site Request Forgery
XSS
Cross-Site Scripting
CTI
Cyber Threat Intelligence
CSF
Cybersecurity Framework
DLP
Data Loss Prevention
DoS
Denial of Service Attack
DevSecOps
Development
Security
Operations
DH
Diffie-Hellman
DR
Disaster Recovery
DAC
Discretionary Access Control
DN
Distinguished Name
DDoS
Distributed Denial-of-Service
DRDoS
Distributed Reflected DoS
DNS
Domain Name System
DOM
Document Object Model
DNSSEC
Domain Name System Security Extensions
DMARC
Domain-based Message authentication, Reporting, and Conformance
DKIM
DomainKeys Identified Mail (DKIM)
ESP
Encapsulating Security Payload
EDR
Endpoint Detection and Response
ERM
Enterprise Risk Management
EF
Exposure Factor
EAP
Extensible Authentication Protocol
EAPoL
Extensible Authentication Protocol over LAN
XML
eXtensible Markup Language
FAR
False Acceptance Rate
FRR
False Rejection Rate
FIM
File Integrity Monitoring
FTP
File Transfer Protocol
FTPS
File Transfer Protocol Secure
FDE
Full Disk Encryption
GPS
Global Positioning System
GPO
Group Policy Object
HMAC
Hash-Based Message Authentication Code
HIPAA
Health Insurance Portability and Accountability Act
HA
High Availability
HIDS
Host-Based Intrusion Detection System
HIPS
Host-Based Intrusion Prevention System
HMI
Human-Machine Interface
IAM
Identity and Access Management
IRP
Incident Response Plan
IoC
Indicator of Compromise
IPS
Indoor Positioning System
ICS
Industrial Control System
ISAC
Information Sharing and Analysis Center
IaaS
Infrastructure as a Service
IaC
Infrastructure as Code
IKE
Internet Key Exchange
IMAP
Internet Message Access Protocol