sec Flashcards
DAC
Discretionary Access Control
RBAC
Rule-based Access Control
SOAR
Security Orchestration Automation Response
GCM
Galois Counter Mode
OSINT
Open-source Intelligence
SQLi
SQL Injection
TOU
Time-of-use
ML
Machine Learning
RSA
Rivest Shamir & Adleman
UAT
User Acceptance Testing
HDD
Hard Disk Drive
SoC
System on Chip
XSS
Cross-site Scripting
ASLR
Address Space Layout Randomization
ISP
Internet Service Provider
NTFS
New Technology File System
UAV
Unmanned Aerial Vehicle
AP
Access Point
CIA
Confidentiality Integrity Availability
DPO
Data Privacy Officer
ISSO
Information Systems Security Officer
NDA
Non-disclosure Agreement
ROI
Return on Investment
TOTP
Time-based One-time Password
EDR
Endpoint Detection and Response
CRL
Certificate Revocation List
FRR
False Rejection Rate
MTTF
Mean Time to Failure
CTO
Chief Technology Officer
MTTR
Mean Time to Recover
MTU
Maximum Transmission Unit
SLA
Service-level Agreement
WTLS
Wireless TLS
CASB
Cloud Access Security Broker
GDPR
General Data Protection Regulation
S/MIME
Secure/Multipurpose Internet Mail Extensions
TPM
Trusted Platform Module
VLAN
Virtual Local Area Network
BCP
Business Continuity Planning
GRE
Generic Routing Encapsulation
CCMP
Counter Mode/CBC-MAC Protocol
HMAC
Hashed Message Authentication Code
ICS
Industrial Control Systems
IM
Instant Messaging
SNMP
Simple Network Management Protocol
FIM
File Integrity Management
SE
Linux Security-enhanced Linux
SED
Self-encrypting Drives
ACL
Access Control List
PFS
Perfect Forward Secrecy
AAA
Authentication Authorization and Accounting
P12
PKCS #12
SQL
Structured Query Language
STIX
Structured Threat Information eXchange
WPS
Wi-Fi Protected Setup
CA
Certificate Authority
CFB
Cipher Feedback
NTP
Network Time Protocol
SPF
Sender Policy Framework
DEP
Data Execution Prevention
MOU
Memorandum of Understanding
TSIG
Transaction Signature
LEAP
Lightweight Extensible Authentication Protocol
SDN
Software-defined Networking
OAUTH
Open Authorization
WO
Work Order
WAF
Web Application Firewall
AV
Antivirus
COOP
Continuity of Operation Planning
ECDSA
Elliptic Curve Digital Signature Algorithm
LAN
Local Area Network
OVAL
Open Vulnerability Assessment Language
RTP
Real-time Transport Protocol
SMTP
Simple Mail Transfer Protocol
DDoS
Distributed Denial of Service
IMAP
Internet Message Access Protocol
MOA
Memorandum of Agreement
PAP
Password Authentication Protocol
GPS
Global Positioning System
ICMP
Internet Control Message Protocol
SHA
Secure Hashing Algorithm
IDF
Intermediate Distribution Frame
SWG
Secure Web Gateway
CRC
Cyclical Redundancy Check
SSH
Secure Shell
CMS
Content Management System
CYOD
Choose Your Own Device
OT
Operational Technology
RACE
Research and Development in Advanced Communications Technologies in Europe
SASE
Secure Access Service Edge
CCTV
Closed-circuit Television
DoS
Denial of Service
RDP
Remote Desktop Protocol
API
Application Programming Interface
NAT
Network Address Translation
PED
Personal Electronic Device
RAD
Rapid Application Development
DBA
Database Administrator
DLL
Dynamic Link Library
DSA
Digital Signature Algorithm
MSA
Master Service Agreement
Authentication
Protocol
XDR
Extended Detection and Response
XSRF
Cross-site Request Forgery
AUP
Acceptable Use Policy
PaaS
Platform as a Service
URI
Uniform Resource Identifier
VDE
Virtual Desktop Environment
BYOD
Bring Your Own Device
TAXII
Trusted Automated eXchange of Indicator Information
DHCP
Dynamic Host Configuration Protocol
DRP
Disaster Recovery Plan
HTTP
Hypertext Transfer Protocol
SHTTP
Secure Hypertext Transfer Protocol
NIPS
Network-based Intrusion Prevention System
NTLM
New Technology LAN Manager
ARP
Address Resolution Protocol
BIOS
Basic Input/Output System
MAN
Metropolitan Area Network
UEM
Unified Endpoint Management
CHAP
Challenge Handshake Authentication Protocol
MD5
Message Digest 5
PTZ
Pan-tilt-zoom
SAE
Simultaneous Authentication of Equals
SEH
Structured Exception Handler
OSPF
Open Shortest Path First
IAM
Identity and Access Management
SDLC
Software Development Lifecycle