More Acronyms Flashcards

1
Q

FTP-S

A

File Transfer Protocol - Secure. FTPS uses SSL, SFTP uses SSH (secure shell FTP). They are not the same..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

GCM

A

Galois Counter Mode : mode of operation for symmetric-key cryptographic block ciphers which is widely adopted for its performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

GDPR

A

General Data Protection Regulation: data collected on EU citizens must be stored in the EU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

GPG

A

GNU Privacy Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

GPO

A

Group Policy Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

GPS

A

Global Positioning System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GPU

A

Graphics Processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

GRE

A

Generic Routing Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HA

A

High Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HDD

A

Hard Disk Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HIDS

A

Host Based Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HIPS

A

Host Based Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HMAC

A

Hashed message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HOTP

A

HMAC-based One Time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HSM

A

Hardware Security Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HTML

A

Hypertext Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

HTTP/HTTPS

A

Hypertext Transfer Protocol / sSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IaaS

A

Infrastructure as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ICMP

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ICS

A

Industrial Control System- A network that manages embedded devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ID

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IDEA

A

International Data Encryption Algorythm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IDF

A

Intermediate Distribution Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IdP

A

Identity Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
IDS
Intrusion Detection System
26
IEEE
Institute of Electrical and Electronic Engineers
27
IIS
Internet Information System
28
IKE
Internet Key Exchange
29
IM
Instant Messaging
30
IMAP4, not authentication
Internet Message Access Protocol 4
31
IoT
Internet of Things
32
IP
Internet Protocol
33
IPSec
Internet Protocol Security
34
IR (two different cases)
Incident Response and Infrared
35
IRC
Internet Relay Chat
36
IRP
Incident Response Plan
37
ISA
Interconnection Security Agreement
38
ISP
Internet Service Provider
39
ISSO
Information Systems Security Officer
40
ITCP
IT Contingency Plan
41
IV
Initialization Vector
42
KDC
Key Distribution Center
43
KEK
Key Encryption Key
44
L2TP
Layer 2 Tunneling Protocol
45
LAN
Local Area Network
46
LDAP
Lightweight Directory Access Protocol
47
LEAP
Lightweight Extensible Access Protocol
48
MaaS
Monitoring as a Service
49
MAC (3 use cases)
Media Access Controller, Mandatory Access Control, Message Authentication Code
50
MAN
Metropolitan Area Network
51
MBR
Master Boot Record
52
MD5
Message Digest 5
53
MDF
Main Distribution Frame
54
MDM
Mobile Device Management
55
MFA
Multi Factor Authentication
56
MFD
Multi-Function Device
57
MITM
Man In The Middle
58
MMS
Multimedia Message Service
59
MOA
Memorandum of Agreement
60
MOU
Memorandum of Understanding
61
MPLS
Multi-Protocol Label Switching
62
MSCHAP
Microsoft Challange Handshake Authentication Protocol
63
MSP
Managed Service Provider
64
IoC
Indicators of Compromise - A type of forensic evidence that can be used to detect unauthorized access attempts or other malicious activities
65
MTBF and calculation
Mean Time Between Failures, # of operational hours/# of failures
66
MTTF
Mean Time To Failure
67
MTTR and calculation
Mean Time To Repair, total time spent o. Repairs/# of repairs
68
MTU
Maximum Transmission Unit
69
NAC
Network Access Control
70
NAT
Network Address Translation
71
NDA
Non-disclosure Agreement
72
NFC
Near Field Communication
73
NGAC
Next Generation Access Control
74
NIDS
Network Intrusion Detection System
75
NIPS
Network Intrusion Prevention System
76
NIST
National Institute of Standards and Technologies
77
NTFS
New Technology File System: timestamps are in GMT and not local to the computer.
78
NTLM
New Technology Lan Manager
79
NTP
Network Time Protocol
80
OAUTH
Open Authorization
81
OCSP
Online Certificate Status Protocol. PKI, checks validity of certificate in real tume
82
OID
Object Identifier
83
OS
Operating System
84
OTA
Over the Air
85
OVAL
Open Vulnerability Assignment Language
86
P12
PKCS12 - defines an archive file format for storing many cryptography objects as a single file. .p12 or .pfx file extensions.
87
P2P
Peer to Peer
88
PaaS
Platform as a Service
89
PAC
Proxy Auto Configuration
90
PAM
Pluggable Authentication Module
91
PAP, not access
Password Authentication Protocol
92
PAT
Port Address Translation
93
PBKDF2
Password-based Key Derivation Function 2 - Key stretching algorithm
94
PBX
Private Branch Exchange
95
PCAP
Packet Capture
96
PEAP
Protected Extensible Authentication Protocol
97
PED
Personal Electronic Device
98
PEM
Privacy-enhanced Electronic Mail -private key extension files: .crt, .pem, .cer, and .key
99
PFS
Perfect Forward Secrecy
100
PFX
Personal Information Exchange = .pfx file or password protected file
101
HID
Human Interface Device: mouse, wireless keyboards, etc
102
OSINT
Open Source Intellegence
103
NVD
National Vulnerability Database
104
STIX
Structured Threat Information eXpression: format to transfer threat data (AIS database)
105
TAXII
Trusted Automated eXchange of Indicator Information: securely share STIX data between organizations.