Security Plus Acronyms Flashcards
3DES
Triple Data Encryption Standard
AAA
Authentication Authorization and Accounting
ACE
Access Control Entry
ACK
Acknowledge
ACL
Access Control List
AES
Advanced Encryption Standard
AES-256
Advanced Encryption Standard-256
AH
Authentication Header
ALE
Annual Lost Expectancy
AP
Access Point
API
Application Programming Interface
APT
Advanced Persistent Threat
ARO
Annual Rate of Occurrence
ARP
Address Resolution Protocol
ASCII
American Standard Code for Information Interchange
ASP
Application Service Provider
AUP
Acceptable Use Policy
BAC
Business Availability Center
BCP
Business Continuity Plan
BIA
Business Impact Analysis
BIND
Berkley Internet Name Domain
BIOS
Basic Input/Output System
BPA
Business Partners Agreement
BYOD
Bring Your Own Device
CA
Certificate Authority
CAC
Common Access Card
CAN
Controller Area Network
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
CAR
Corrective Action Report
CCMP
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
CCTV
Closed Circuit Television
CERT
Computer Emergency Response Team
CHAP
Challenge Handshake Authentication Protocol
CIA
Confidentiality, integrity, availability
CIO
Chief Information Officer
CIRT
Computer Incident Response Team
COOP
Continuity of Operations Planning
CP
Contingency Planning
CRC
Cyclical Redundancy Check
CSR
Certificate Signing Request
CRL
Certification Revocation List
CSR
Control Status Register
CSU
Channel Service Unit
CTO
Chief Technology Officer
CVE
Common Vulnerabilities and Exposures
DAC
Discretionary Access Control
DACL
Discretionary Access Control List
DBA
Database Administrator
dBd
Decibels-dipole
dBi
Decibels-isotropic
dBm
Decibels-milliwatt
DDoS
Distributed denial of service
DEP
Data Execution Prevention
DES
Data Encryption Standard
DHCP
Dynamic Host Configuration Protocol
DHE
Data-Handling Electronics
DHE
Diffie-Hellmann Ephemeral
DLL
Dynamic Link Library
DLP
Data Loss Prevention
DMZ
Demilitarize Zone
DNAT
Destination Network Access Translation
DNAT
Dynamic Network Address Translation
DNS
Domain Name System
DNSSEC
Domain Name System Security Extensions
DoS
Denial of Service
DRP
Disaster Recovery Plan
DSA
Digital Signature Algorithm
DSL
Digital Subscriber Line
DSU
Data Service Unit
EAP
Extensible Authentication Protocols
EAP-TLS
Extensible Authentication Protocol-Transport Layer Security
EAP-TTLS
Extensible Authentication Protocol-Tunneled Transport Layer Security
ECC
Elliptic Curve Cryptography
ECDHE
Elliptic Curve Diffe-Hellman Ephemeral
EFS
Encrypting File System
EMI
Electromagnetic Interference
ESD
Electrostatic discharge
ESN
Electronic Serial Number
ESP
Encapsulating Security Protocol
FACL
File Access System Control List
FCoE
Fiber Channel over Ethernet
FDE
Full Disk Encryption
FTP
File Transfer Protocol
FTPS
File Transfer Protocol Secure
GPG
GNU Privacy Guard
GPO
Group Policy Object
GPS
Global Positioning System
GRE
Generic Routing Encapsulation
GUI
Graphical user interface
HDD
Hard disk drive
HIDS
Host based intrusion detection system
HIPS
Host based intrusion prevention system
HMAC
Hash based Message Authentication Code
HOTP
HMAC-based One Time Password
HSM
Hardware Security Module
HTML
Hypertext Markup Language
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol Secure
HVAC
Heating, ventilation , and air conditioning
IaaS
Infrastructure of a service
ICMP
Internet Control Message Protocol
ID
Identification
IDS
Intrusion Detection System
IEEE
Institute of Electrical and Electronics Engineers
IGMP
Internet Group Management Protocol
IIS
Internet Information Services
IKE
Internet Key Exchange
IM
Instant Messaging
IMAP4
Internet Message Access Protocol version 4
IP
Internet Protocol
IPS
Intrusion Prevention System
IPsec
Internet Protocol Security
IPv4
Internet Protocol version 4
IPv6
Internet Protocol version 6
IR
Incident Response
IRC
Internet Relay Chat
IRP
Incident Response Procedure
IRT
Incident Response Team
ISA
Interconnection Security Agreement
iSCSI
Internet Small Computer System Interface
ISP
Internet Service Provider
ISSO
Information Systems Security Officer
IT
Information Technology
ITCP
IT Contingency Plan
IV
Initialization Vector
JBOD
Just a Bunch of Disks
KDC
Key Distribution Center
L2TP
Layer 2 Tunneling Protocol
LAN
Local Area Network
LANMAN
Local area network Manager
LDAP
Lightweight Directory Access Protocol
LEAP
Lightweight Extensible Authentication Protocol
LSO
Local Shared Object
MaaS
Monitoring as a Service or Management
MAC
Mandatory Access Control
MAC
Media Access Control
MAC
Message Authentication Code
Malware
Malicious Software
MAN
Metropolitan Area Network
MBR
Master Boot Record
MD5
Message Digest 5
MITM
Man in the Middle
MOU
Memorandum of Understanding
MPLS
Multi-Protocol Layer Switch
MS-CHAP
Microsoft Challenge Handshake Authentication Protocol
MTBF
Mean Time Between Failures
MTTF
Meant Time to Failure
MTTR
Mean Time To Recover
MTU
Maximum Transmission Unit
NAC
Network Access Control
NAT
Network Address Translation
NDA
Non-disclosure Agreement
NDP
Neighborhood Discovery Protocol
NetBIOS
Network Basic Input/Output System
NFC
Near Field Communication
NIDS
Network-based intrusion detection system
NIC
Network interface Card
NIPS
Network-based intrusions prevention system
NIST
National Institute of Standards of Technology
NOP
No Operation
NOS
Network Operating System
NoSQL
Not Only Structured Query Language
NTFS
NT File System
NTLM
Net Technology LANMAN
NTP
Network Time Protocol
OCSP
Online Certificate Status Protocol
OLA
Open License Agreement
OS
Operating System
OSI
Open Systems Interconnection
OVAL
Open Vulnerability Assessment Language
P2P
Peer-2-Peer
PaaS
Platform as a Service
PAC
Proxy Auto Configuration
PAM
Pluggable Authentication Modules
PAN
Personal Area Network
PAP
Password Authentication Protocol
PAT
Port Address Translation
PBKDF2
Password-Based Key Derivation Function 2
PBX
Private Branch Exchange
PCAP
Packet Capture
Portable Document Format
PEAP
Protected Extensible Authentication Protocol
PED
Personal Electronic Device
PGP
Pretty Good Privacy
PII
Personal Identifiable Information
PIN
Personal Identification Number
PIV
Personal Identity Verification Card
PKI
Public Key Infrastructure
POP3
Post Office Protocol Version 3
POTS
Plain Old Telephone Service
PPP
Point to Point Protocol
PPTP
Point to Point Tunneling Protocol
PSK
Preshared Key
PTZ
Pan Tilt Zoom
RA
Recovery Agent
RADIUS
Remote Authentication Dial-In User Service
RAID
Redundant array of inexpensive disks
RAID 0
Disk striping, no fault tolerance
RAID 1
Disk mirroring, two disks provides fault tolerance
RAID 5
Disk striping with parity, 3 or more disks and fault tolerance
RAID 6
Disk striping with parity. RAID-6 uses four or more disks and provides fault tolerance
RAM
Random Access Memory
RAS
Remote Access Service
RAT
Remote access tool
RC
Ron’s Code
RC4
Rivest Cipher
RDP
Remote Desktop Protocol
RFI
Radio Frequency Interference
RFID
Radio frequency identification
RIPEMD
RACE integrity Primitive Evaluation Message Digest
ROI
Return On Investment
Role-BAC
Role-based Access Control
RPO
Recovery Point Objective
RSA
Rivest, Shamir, Adelman
RSTP
Rapid Spanning Tree Protocol
RTO
Recovery Time Objective
RTP
Real Time Transport Protocol
Rule-BAC
Rule based Access Control
S/MIME
Secure/Multipurpose Internet Mail Extensions
SaaS
Software as a Service
SAML
Security Assertions Markup Language
SAN
Storage Area Network
SCADA
Supervisory control and data acquisition
SCAP
Security Content Automation Protocol
SCEP
Simple Certificate Enrollment Protocol
SCP
Secure Copy
SCSI
Small Computer System Interface
SDLM
Software Development Life Cycle Methodology
SEH
Structured Exception Handler
SELinux
Security Enhanced Linux
SFTP
Secure File Transfer Protocol
SHA
Secure Hash Algorithm
SHTTP
Secure Hypertext Transfer Protocol
SID
Security Identifier
SIEM
Security Information and Event Management
SIM
Subscriber Identity Module
SIRT
Security Incident Response Team
SLA
Service Level Agreement
SLE
Single Loss Expectancy
SMTP
Simple Mail Transfer Protocol
SNMP
Simple Network Management Protocol
SONET
Synchronous Optical Network Technologies
SPIM
Spam over Internet Messaging
SPOF
Single Point of Failure
SQL
Structured Query Language
SSD
Solid State Drive
SSH
Secure Shell
SSID
Service Set Identifier
SSL
Secure Sockets Layer
SSO
Single Sign On
SSTP
Secure Socket Tunneling Protocol
STP
Shielded twisted-pair
STP
Spanning Tree Protocol
SYN
Synchronize
TACACS+
Terminal Access Controller Access-Control System +
TCO
Total Cost of Ownership
TCP
Transmission Control Protocol
TCP/IP
Transmission Control Protocol/Internet Protocol
TFTP
Trivial File Transfer Protocol
TGT
Ticket Granting Ticket
TKIP
Temporal Key Integrity Protocol
TLS
Transport Layer Security
TOTP
Time Based One Time Password
TPM
Trusted Platform Module
TSIG
Transaction Signature
UAT
User Acceptance Testing
UDP
User Datagram Protocol
UEFI
Unified Extensible Firmware Interface
UPS
Uninterruptible Power Supply
URI
Uniform Resource Identifier
URL
Uniform Resource Locator
USB
Universal Serial Bus
UTM
Unified Threat Management
UTP
Unshielded Twisted Pair
VDI
Virtualization Desktop Infrastructure
VLAN
Virtual local area network
VM
Virtual Machine
VoIP
Voice Over IP
VPN
Virtual Private Network
VSAN
Virtual Storage Area Network
VTC
Video Teleconferencing
WAF
Web Application Firewall
WAP
Wireless Access Point
WEP
Wired Equivalent Privacy
WIDS
Wireless Intrusion Detection System
WIPS
Wireless Intrusion Prevention System
WLAN
Wireless Local Area Network
WPA
Wi-Fi Protected Access
WPA2
Wi-Fi Protected Access II
WPS
Wi-Fi Protected Setup
WTLS
Wireless Transport Layer Security
XML
Extensible Markup Language
XSRF
Cross-site request forgery
XSS
Cross Site Scripting Attack
XTACACS
Extended Terminal Access Controller
VMI
Virtual Mobile Information
COPE
Corporate Owned and Personally Enabled
TPM
Trusted Platform Module