Lesson 8 Acronyms Flashcards
AI
Artificial Intelligence
API
Application Programming Interface
CASB
Cloud Access Security Broker
CTI
Cyber Threat Intelligence
CVE
Common Vulnerability and Exposures
CVSS
Common Vulnerability Scoring System
DOM
Document Object Model
EF
Exposure Factor
EOL
End Of Life
ISACs
Information Sharing and Analysis Centers
KRACK
Key Reinstallation Attacks
OSINT
Open-Source Intelligence
PCI DSS
Payment Card Industry Data Security Standard
SCA
Software Composition Analysis
SBOM
Software Bill of Materials
SCAP
Security content Automation Protocol
SQL
Structured Query Language
SQLi
SQL Injection
TOCTOU
Time of Check to Time Of use
TTPs
Tactics
Techniques
Procedures
AES
Advanced Encryption Standard
ASLR
Address Space Layout Randomization
BEAST
Browser Exploit Against SSL/TLS
CSRF
Cross-Site Request Forgery
DEP
Data Execution Prevention
DES
Data Encryption Standard
HSMs
Hardware Security modules
KMS
Key Management Systems
NVD
National Vulnerability
NVTs
Network Vulnerability Tests
OS
Operating System
OTX
Open Threat Exchange
POODLE
Padding Oracle On Downgraded Legacy Encryption
SPDX
Software Package Data Exchange
TOR
The Onion Router