All Acronyms Flashcards
AUP
Acceptable Use Policy
ACL
Access Control List
AP
Access Point
ARP
Address Resolution Protocol
APT
Advanced Persistent Threat
GCMP
AES Galois Counter Mode Protocol
ALE
Annualized Loss Expectancy
ARO
Annualized Rate of Occurrence
A-V
Anti-Virus
AAA
Authentication
Authorization
Accounting
BYOD
Bring Your Own Device
BC
Business Continuity
BEC
Business E-mail Compromise
BIA
Business Impact Analysis
BPA
Business Partnership Agreement
CRL
Certificate Revocation List
CSR
Certificate Signing Request
CIO
Chief Information Officer
CSO
Chief Security Officer
CTO
Chief Technology Officer
CYOD
Choose Your Own Device
CIA Triad
Confidentiality
Integrity
Availability
(Non-Repudiation)
CSP
Cloud Service Provider
C2
Command and Control
CN
Common Name
CVE
Common Vulnerabilities and Exposures
CVSS
Common Vulnerability Scoring System
CIRT
Computer Incident Response Team
CBT
Computer-Based Training
COOP
Continuity of Operations Plan
COBO
Corporate Owned, Business Only
COPE
Corporate Owned, Personally Enabled
CSRF
Cross-site Request Forgery
XSS
Cross-Site Scripting
CTI
Cyber Threat Intelligence
CSF
Cybersecurity Framework
DLP
Data Loss Prevention
DoS
Denial of Service Attack
DevSecOps
Development
Security
Operations
DH
Diffie-Hellman
DR
Disaster Recovery
DAC
Discretionary Access Control
DN
Distinguished Name
DDoS
Distributed Denial-of-Service
DRDoS
Distributed Reflected DoS
DNS
Domain Name System
DOM
Document Object Model
DNSSEC
Domain Name System Security Extensions
DMARC
Domain-based Message authentication, Reporting, and Conformance
DKIM
DomainKeys Identified Mail (DKIM)
ESP
Encapsulating Security Payload
EDR
Endpoint Detection and Response
ERM
Enterprise Risk Management
EF
Exposure Factor
EAP
Extensible Authentication Protocol
EAPoL
Extensible Authentication Protocol over LAN
XML
eXtensible Markup Language
FAR
False Acceptance Rate
FRR
False Rejection Rate
FIM
File Integrity Monitoring
FTP
File Transfer Protocol
FTPS
File Transfer Protocol Secure
FDE
Full Disk Encryption
GPS
Global Positioning System
GPO
Group Policy Object
HMAC
Hash-Based Message Authentication Code
HIPAA
Health Insurance Portability and Accountability Act
HA
High Availability
HIDS
Host-Based Intrusion Detection System
HIPS
Host-Based Intrusion Prevention System
HMI
Human-Machine Interface
IAM
Identity and Access Management
IRP
Incident Response Plan
IoC
Indicator of Compromise
IPS
Indoor Positioning System
ICS
Industrial Control System
ISAC
Information Sharing and Analysis Center
IaaS
Infrastructure as a Service
IaC
Infrastructure as Code
IKE
Internet Key Exchange
IMAP
Internet Message Access Protocol
IoT
Internet of Things
IP
Internet Protocol
IPSec
Internet Protocol Security
IRC
Internet Relay Chat
IDS
Intrusion Detection System
IPS
Intrusion Prevention System
IPFIX
IP Flow Information Export
ITIL
IT Infrastructure Library
JSON
JavaScript Object Notation
KDC
Key Distribution Centre
KEK
Key Encryption Key
KRI
Key Risk Indicator
LLR
Lessons Learned Report
LDAP
Lightweight Directory Access Protocol
ML
Machine Learning
MAC
Mandatory Access Control
MSA
Master Service Agreement
MTD
Maximum Tolerable Downtime
MTBF
Mean Time Between Failures
MTTR
Mean Time to Repair/Replace/Recover
MAC Filtering
Media Access Control Filtering
MoA
Memorandum of Agreement
MoU
Memorandum of Understanding
MD5
Message Digest Algorithm version 5
MEF
Mission Essential Function
MDM
Mobile Device Management
MFA
Multifactor Authentication
NIST
National Institute of Standards and Technology
NFC
Near-Field Communication
NAC
Network Access Control
NBAD
Network Behavior Anomaly Detection
NFV
Network Functions Virtualization
NGFW
Next-Generation Firewall
NDA
Nondisclosure Agreement
NTLM Authentication
Windows New Technology LAN Manager Authentication
OTP
One-Time Password
OCSP
Online Certificate Status Protocol
OAuth
Open Authorization
OSINT
Open-Source Intelligence
OOB Management
Out of Band Management
PCI DSS
Payment Card Industry Data Security Standard
PFS
Perfect Forward Secrecy
PAN
Personal Area Network
PIN
Personal Identification Number
PaaS
Platform as a Service
PAM
Pluggable Authentication Module
PPTP
Point-to-Point Tunneling Protocol
SPAN
Switched Port Analyzer
POP
Post Office Protocol
PUP
Potentially Unwanted Program
PDU
Power Distribution Unit
PSK
Pre-shared key
PAM
Privileged Access Management
PKCS
Public Key Cryptography Standards
PKI
Public Key Infrastructure
RFID
Radio-Frequency ID
RTOS
Real-Time Operating System
RPO
Recovery Point Objective
RTO
Recovery Time Objective
RAT
Remote Access Trojan
RADIUS
Remote Authentication Dial-In User Service
RCE
Remote Code Execution
RDP
Remote Desktop Protocol
REST
Representational State Transfer
RBAC
Role-Based Access Control
ROE
Rules of Engagement
SOX
Sarbanes-Oxley Act
SASE
Secure Access Service Edge
SFTP
Secure File Transfer Protocol
SHA
Secure Hash Algorithm
SSH
Secure Shell
SAML
Security Assertion Markup Language
SCAP
Security Content Automation Protocol
SID
Security Identifier
SIEM
Security Information and Event Management
SELinux
Security-Enhanced Linux
SED
Self-Encrypting Drive
SPF
Sender Policy Framework
SSRF
Server-Side Request Forgery
SLA
Service Level Agreement
SSID
Service Set Identifier
SMTP
Simple Mail Transfer Protocol
SNMP
Simple Network Management Protocol
SOAP
Simple Object Access Protocol
SAE
Simultaneous Authentication of Equals
SLE
Single Loss Expectancy
SPoF
Single Point of Failure
SSO
Single Sign-On
SaaS
Software as a Service
SBOM
Software Bill of Materials
SCA
Software Composition Analysis
SD-WAN
Softwared Defined WAN
SDLC
Software Development Life Cycle
SDN
Software-Defined Networking
SOW
Statement of Work
SEH
Structured Exception Handler
SQL Injection
Structured Query Language Injection
SAN
Subject Alternative Name
SCADA
Supervisory Control and Data Acquisition
TTP
Tactics
Techniques
Procedures
TKIP
Temporal Key Integrity Protocol
TAP
Test Access Point
TGT
Ticket Granting Ticket
TOCTOU
Time Of Check to Time Of Use
TLS
Transport Layer Security
TLS VPN
Transport Layer Security Virtual Private Network
TPM
Trusted Platform Module
UTM
Unified Threat Management
URL
Uniform Resource Locator
UPS
Uninterruptible Power Supply
UEBA
User and Entity Behavior Analytics
VLAN
Virtual Local Area Network
VNC
Virtual Network Computing
VPC
Virtual Private Cloud
VPN
Virtual Private Network
WAF
Web Application Firewall
WPA
Wi-Fi Protected Access
WPS
Wi-Fi Protected Set-Up
WEP
Wired Equivalent Privacy
WRT
Work Recovery Time
ISA
Interconnection Security Agreements
WAN
Wide Area Network