Key Cybersecurity Acronyms and Concepts Flashcards
What does SIEM stand for?
Security Information and Event Management
What does SOAR stand for?
Security Orchestration, Automation, and Response
What does IDS/IPS stand for?
Intrusion Detection System / Intrusion Prevention System
What does EDR stand for?
Endpoint Detection and Response
What does IOC and IOA stand for?
Indicator of Compromise and Indicator of Attack
What does APT stand for?
Advanced Persistent Threat
What does MITRE ATT&CK stand for?
MITRE Adversarial Tactics, Techniques, and Common Knowledge
What does CVSS stand for?
Common Vulnerability Scoring System
What does CVE stand for?
Common Vulnerabilities and Exposures
What does TTP stand for?
Tactics, Techniques, and Procedures
What does NIST CSF stand for?
National Institute of Standards and Technology Cybersecurity Framework
What does RBAC stand for?
Role-Based Access Control
What does BIA stand for?
Business Impact Analysis
What does PKI stand for?
Public Key Infrastructure
What does TLS/SSL stand for?
Transport Layer Security / Secure Sockets Layer
What does OSINT stand for?
Open-Source Intelligence
What does NAC stand for?
Network Access Control
What does OWASP stand for?
Open Web Application Security Project
What does GDPR stand for?
General Data Protection Regulation
What does SAST and DAST stand for?
Static Application Security Testing and Dynamic Application Security Testing
What does RTO and RPO stand for?
Recovery Time Objective and Recovery Point Objective
What does SLA stand for?
Service Level Agreement
What does DLP stand for?
Data Loss Prevention
What does XDR stand for?
Extended Detection and Response
What does DNS stand for?
Domain Name System
What does SIEM EDR stand for?
Security Information and Event Management Endpoint Detection and Response
What is threat intelligence?
Information about existing or emerging threats used to improve defensive strategies.
Define “lateral movement.”
The process by which attackers navigate through a network after initial compromise to gain further access.
What is a vulnerability?
A weakness in a system, application, or network that can be exploited by a threat actor.
Define “incident response.”
The process of identifying, managing, and mitigating security incidents.
What is defense-in-depth?
A security strategy that uses multiple layers of defenses to protect assets.
Define “zero-trust architecture.”
A security model that assumes no user or device should be trusted by default, even inside the network.