CYB SEC ACRONYMS Flashcards
MAC
Media Access Control
IP
Internal Protocol Address
TCP
Transmission Control Protocol
ARP
Address Resolution Protocol
UDP
User Datagram Protocol
HTTPS
Hypertext Transfer Protocol Secure
SMTP
Simple Mail Transfer Protocol
SSH
Secure Shell
FTP
File Transfer Protocol
DNS
Domain Name System
CSP
Cloud Service Provider
NCP
Network Control Protocol
HDLC
High Level Data Link Control
SDLC
Synchronous Data Link Control Protocol
VPN
Virtual Private Networks
SNMP
Simple Network Management Protocol
ICMP
Internet Control Message Protocol
AES
Advanced Encryption Standard
IANA
Internet Assigned Numbers Authority
NAT
Network Address Translation
DHCP
Dynamic Host Configuration Protocol
POP
Post Office Protocol
MTA
Message Transfer Agent
IEEE
Institute of Electrical and Electronic Engineers
WPA
Wifi Protected Access
TKIP
Temporary Key Integrity Protocol
CCMP
Counter Mode Cipher Block Chain Message Authentication Code Protocol
SAE
Simultaneous Authentication of Equals
IMAP
Internet Message Access Protocol
SFTP
Secure File Transfer Protocol
WEP
Wired Equivalent Privacy
FaaS
Firewall as a Service
NGFW
Next Generation Firewall
DMZ
Demilitarized Zone
CIDR
Classless Inter-Domain Routing
ISP
Internet Service Provider
Dos
Denial of Service
DFIR
Digital Forensic and Incident Response
DDoS
Distributed Denial of Service
SYN
Synchronized
IM
Instant Messaging
NIC
Network Interface Card
OS
Operating System
MFA
Multi-Factor Authenticator
VM
Virtual Machines
CAPTCHA
Completely Automated Public Turing test to tell Computers and Humans Apart
IDS
Intrusion Detection System
IPS
Intrusion Prevention System
IAM
Identity Access Management
TPM
Trusted Platform Module
CloudHSM
Cloud Hardware Security Module
BIOS
Basic Input/Output System
UEFI
Unified Extensible Firmware Interface
KVM
Kernel-Based Virtual Machine
GUI
Graphical User Interface
FHS
FileSystem Hierarchy Standard
CPU
Central Processing Unit
RAM
Random Access Memory
APT
Advanced Package Tool
YUM
Yellowdog Updater Modified
SaaS
Software as a Service
PaaS
Platform as a Service
IaaS
Infrastructure as a Service
GDPR
General Data Protection Regulation
PCI DSS
Payment Card Industry Data Service Standard
HIPAA
Health Insurance Probability and Accountability Act
PKI
Public Key Infrastructure
CA
Certificate Authority
(3)DES
(Triple) Data Encryption Standards
RSA
Rivest Shamir Adleman
DSA
Digital Signature Algorithm
FIPS 140-3
Federal Info Processing Standards 140-3
SHA
Secure Hashing Algorithm
SSO
Single Sign-On
LDAP
Lightweight Directory Access Protocol
SAML
Security Assertion Markup Language
DAC
Discretionary Access Control
RBAC
Role-Based Access Control
CVE list
Common Vulnerability and Exposures list
CNA
CVE Numbering Authority
CVSS
Common Vulnerability Scoring Systems
OWASP
Open Worldwide Application Security Project
SSRF
Service Side Request Forgery
OSINT
Open Source Intelligence
CISA
CyberSecurity and Infrastructure Security Agency
APThreat
Advanced Persistent Threat
PUA
Potentially Unwanted Application
XSS
Cross-site Scripting
URL
Uniform Resources Locator
PASTA
Process for Attack Simulation and Threat Analysis
STRIDE
Spoofing Tampering Repudiation Information Disclosure DoS Elevation of Privilege
VAST
Visual Agile Simple Text