Security Plus Acronyms Flashcards
3DES
Triple Data Encryption Standard
AAA
Authentication Authorization and Accounting
ACE
Access Control Entry
ACK
Acknowledge
ACL
Access Control List
AES
Advanced Encryption Standard
AES-256
Advanced Encryption Standard-256
AH
Authentication Header
ALE
Annual Lost Expectancy
AP
Access Point
API
Application Programming Interface
APT
Advanced Persistent Threat
ARO
Annual Rate of Occurrence
ARP
Address Resolution Protocol
ASCII
American Standard Code for Information Interchange
ASP
Application Service Provider
AUP
Acceptable Use Policy
BAC
Business Availability Center
BCP
Business Continuity Plan
BIA
Business Impact Analysis
BIND
Berkley Internet Name Domain
BIOS
Basic Input/Output System
BPA
Business Partners Agreement
BYOD
Bring Your Own Device
CA
Certificate Authority
CAC
Common Access Card
CAN
Controller Area Network
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
CAR
Corrective Action Report
CCMP
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
CCTV
Closed Circuit Television
CERT
Computer Emergency Response Team
CHAP
Challenge Handshake Authentication Protocol
CIA
Confidentiality, integrity, availability
CIO
Chief Information Officer
CIRT
Computer Incident Response Team
COOP
Continuity of Operations Planning
CP
Contingency Planning
CRC
Cyclical Redundancy Check
CSR
Certificate Signing Request
CRL
Certification Revocation List
CSR
Control Status Register
CSU
Channel Service Unit
CTO
Chief Technology Officer
CVE
Common Vulnerabilities and Exposures
DAC
Discretionary Access Control
DACL
Discretionary Access Control List
DBA
Database Administrator
dBd
Decibels-dipole
dBi
Decibels-isotropic
dBm
Decibels-milliwatt
DDoS
Distributed denial of service
DEP
Data Execution Prevention
DES
Data Encryption Standard
DHCP
Dynamic Host Configuration Protocol
DHE
Data-Handling Electronics
DHE
Diffie-Hellmann Ephemeral
DLL
Dynamic Link Library
DLP
Data Loss Prevention
DMZ
Demilitarize Zone
DNAT
Destination Network Access Translation
DNAT
Dynamic Network Address Translation
DNS
Domain Name System
DNSSEC
Domain Name System Security Extensions
DoS
Denial of Service
DRP
Disaster Recovery Plan
DSA
Digital Signature Algorithm
DSL
Digital Subscriber Line
DSU
Data Service Unit
EAP
Extensible Authentication Protocols
EAP-TLS
Extensible Authentication Protocol-Transport Layer Security
EAP-TTLS
Extensible Authentication Protocol-Tunneled Transport Layer Security
ECC
Elliptic Curve Cryptography
ECDHE
Elliptic Curve Diffe-Hellman Ephemeral
EFS
Encrypting File System
EMI
Electromagnetic Interference
ESD
Electrostatic discharge
ESN
Electronic Serial Number
ESP
Encapsulating Security Protocol
FACL
File Access System Control List
FCoE
Fiber Channel over Ethernet
FDE
Full Disk Encryption
FTP
File Transfer Protocol
FTPS
File Transfer Protocol Secure
GPG
GNU Privacy Guard
GPO
Group Policy Object
GPS
Global Positioning System
GRE
Generic Routing Encapsulation
GUI
Graphical user interface
HDD
Hard disk drive
HIDS
Host based intrusion detection system
HIPS
Host based intrusion prevention system
HMAC
Hash based Message Authentication Code
HOTP
HMAC-based One Time Password
HSM
Hardware Security Module
HTML
Hypertext Markup Language
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol Secure
HVAC
Heating, ventilation , and air conditioning
IaaS
Infrastructure of a service
ICMP
Internet Control Message Protocol
ID
Identification
IDS
Intrusion Detection System
IEEE
Institute of Electrical and Electronics Engineers
IGMP
Internet Group Management Protocol
IIS
Internet Information Services
IKE
Internet Key Exchange
IM
Instant Messaging
IMAP4
Internet Message Access Protocol version 4
IP
Internet Protocol
IPS
Intrusion Prevention System
IPsec
Internet Protocol Security
IPv4
Internet Protocol version 4
IPv6
Internet Protocol version 6
IR
Incident Response
IRC
Internet Relay Chat
IRP
Incident Response Procedure
IRT
Incident Response Team
ISA
Interconnection Security Agreement