Exam Acronyms1 Flashcards
ABAC
Attribute-based Access control
AH - IKE
Authentication Header
ALE
Annualized Loss Expectancy
AIS
Automated Indicator Sharing
ARO
Annualized Rate of Occurance
BCP
Business Continuity Planning
BGP
Border gateway protocol
BIA
Business impact Analysis
BPA
Business Partner Agreement
CASB
Cloud Access Security Broker
CBT
Computer based training
CCMP
Counter-Mode/CBC-MAC protocol
CERT
Computer emergency Response Team
CFB
Cipher Feedback
CHAP
Chanllenge Handshake Auth Protocol
CIRT
Computer incident response Team
CIS
Center for Internet security
CMS
Content Management System
CN
Common Name
COOP
Continuity of Operations Plan
CSA
Cloud Security Alliance
CSP
Cloud Service Provider
CSR
Certificate Signing Request
CVE
Common Vulnerability Exposure
CVSS
Common Vulnerability Scoring System
DEP
Data Execution Prevention
MOA
Memorandum of Agreement
MOU
Memorandum of Understanding
MPLS
Multiprotocol Label Switching
MTBF
Mean time between failures
MTTR
Mean time to repair
MTU
Maximum Transmission Unit
NFV
Network Function Virtualization
NG-SWG
Next Gen Secure Web Gateway
OCSP
Online Certificate Status Protocol
OTA
Over the air
OVAL
Open Vulnerability and assessment language
OWASP
Open Web Application Security Project
PAC
Proxy Auto Config
PAM
Privileged Access Management
PAM
Pluggable Authentication Module
PE
Portable Executable
PEAP
Protected EAP
PEM
Privacy Enhanced Mail
PFS
Perfect Forward Secracy
PIV
Personal Identity Verification
PTZ
Pan, Tilt, Zoom
RA
Registration authority
RAD
Rapid application deployment
RTO
Recovery time objective
S/MIME
Secure/Multipurpose Internet mail extension
SAE
Simultanious Authentication of Equals
DHE
Diffie-Helman Ephemral
DPO
Data Protection Officer
DSA
Digital Signature Algorithm
ECB
Electronic Code Book
ECDHE
EC Diffie Helman Ephemral
ECDSA
ECC Digital signature Algorithm
EFS
Encrypted File System
EDR
Endpoint Detection and Response
ERP
Enterprise Resource planning
ESP - IKE
Encapsulating Security Payload
FACL
File Access Control List
FDE
Full disk encryption
FIM
File Integrity Monitoring
FRR
False Rejection Rate
IRP
Incident Response Plan
ISA
Interconnection Security Agreement
ITCP
IT contingency Plan
KDC
Key Distrobution Center
KEK
Key Encryption Key
SCEP
Simple Certificate Enrollment Protocol
SDN
Software Defined Networking
SEH
Structured Exception Handling
SDP
Software Delivery Platform
SIP
Session Initiation Protocol
SLE
Single loss expectancy
SOAR
Security Orchestration, automation, Response
SPF
Sender Policy Framework
TGT
Ticket Granting ticket
TKIP
Temporal Key Integration policy
TSIG
Transaction Signature
TTP
Tactics, Techniques, and Procedures
UEBA
User and Entity Behavior Analytixs
UEM
Unified Endpoint Management
URI
Uniform Resource Identifier
VBA
Visual Basic for Applications
VPC
Virtual Private Cloud
WAF
Web application firewall
WIDS
Wireless IDS
WORM
Write Once Read Many
WPS
Wifi Protected Setup