Abbreviations Flashcards

Learn the abbreviations for the terms (236 cards)

1
Q

XSS

A

Cross site scripting

Enables attackers to inject client side scripts into webpages viewed by other users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PHP

A

Hypertext Pre-processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RCE

A

Remote Code Execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

C2

A

Command and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

KDC

A

Key Distribution Centre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TGT

A

Ticket Granting Ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AS-REQ

A

Authentication Service Request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AS-REP

A

Authentication Service Reply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SAM

A

Security Account Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LLMNR

A

Local Link Multicast Name Resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RCE

A

Remote Code Execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RFI

A

Remote File Inclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3DES

A

Triple Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AAA

A

Authentication, Authorisation and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AES

A

Advancce Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AES256

A

Advance Encryption standards 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ALE

A

Authorised Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

APT

A

Advance Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ASP

A

Application Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ARO

A

Annualised Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
ARP
Address Resolution Protocol
26
AUP
Acceptable Use Policy
27
BAC
Business Availability Canter
28
BCP
Business Continuity Planning
29
BIA
Business impact analysis 
30
BIOS
Basic input/output system
31
BPA
Business partners agreement
32
BYOD
Bring your own device
33
CA
Certificate authority
34
CAC
Common access card
35
CAN
Controller area network
36
CAPTCHA
Completely automated public touring test to tell computers and humans apart
37
CAR
Corrective action report
38
CCMP
Counter mode/CBC Mac protocol
39
CCTV
Closed circuit television
40
CERT
Computer emergency response Team
41
CHAP
Challenge handshake authentication protocol
42
CIO
Chief information officer
43
CIRT
Computer incident response Team
44
COOP
Continuity of operation planning
45
CP
Contingency planning
46
CRC
Cyclical redundancy check
47
CRL
Certification revocation list
48
CSR
Control status register
49
CSU
Channel service unit
50
CTO
Chief technology officer
51
DAC
Discretionary access control
52
DBA
Database administrator
53
DDOS
Distributor denial of service
54
DEP
Data execution prevention
55
DES
Digital encryption standard
56
DHCP
Dynamic host configuration protocol
57
DHE
Data handling electronics
58
DLL
Dynamic link library
59
DLP
Data loss prevention
60
DMZ
Demilitarised zone
61
DNAT
Destination network address transaction
62
DNS
Domain name service (server)
63
DOS
Denial of service
64
DRP
Disaster recovery plan
65
DSA
Digital signature algorithm
66
DSL
Digital subscriber line
67
DSU
Data service unit
68
EAP
Extensible authentication protocol
69
ECC
Elliptic curve cryptography
70
EFS
Encrypted file system
71
EMI
Electromagnetic interference
72
ESN
Electronic serial number
73
ESP
Encapsulated security payload
74
FACL
File system access control list
75
FDE
Full disc encryption
76
FTP
File transfer protocol
77
FTPS
Secure file transfer protocol
78
GPG
GNU privacy guard
79
GPO
Group policy object
80
GPS
Global positioning system
81
GPU
Graphical processing unit
82
GRE
Generic routing encapsulation
83
HDD
Hard disk drive
84
HIDS
Host based intrusion detection system
85
HIPS
Host based intrusion prevention system
86
HMAC
Hashed Message Authentication Code
87
HOTP
HMAC based one time password
88
HSM
Hardware security module
89
HTML
Hypertext Markup language
90
HTTP
Hypertext transfer protocol
91
HTTPS
Hyper transfer protocol over SSL
92
HVAC
Heating ventilation air conditioning
93
IaaS
Infrastructure as a service
94
ICMP
Internet control message protocol
95
IDS 
Intrusion detection system
96
IKE
Internet key exchange
97
IMAP4
Internet message access protocol V4
98
IP
Internet protocol
99
IPSEC
Internet protocol security
100
IR
Incident response
101
IRC
Internet relay chat 
102
IRP
Incident response procedure
103
ISA
Interconnection security agreement
104
ISP
Internet service provider
105
ISSO
Information systems security officer
106
ITCP
IT contingency plan
107
IV
Initialisation vector
108
IV
Initialisation vector
109
L2TP
Layer 2 tunnelling protocol
110
LDAP
Lightweight directory access protocol
111
LEAP
Lightweight extensible authentication protocol
112
Maas
Monitoring as a service
113
Maas
Monitoring as a service
114
MAC
Mandatory access control/media access control
115
MAC
Mandatory access control/media access control
116
MAN
Metropolitan area network
117
MBR
Master boot record
118
MD5
Message digest five
119
MPLS
Multi protocol layer switch
120
MSCHAP
Microsoft challenge handshake authentication
121
MTBF
Meantime between failures
122
MTTR
Meantime to recover
123
MTTF
Meantime to failure
124
MTU
Maximum transmission unit
125
NAC
Network access control
126
NAT
Network address translation
127
NDA
Non-disclosure agreement
128
NFC
Near field communication
129
NIDS
Network based intrusion detection system
130
NIPS
Network based intrusion prevention system
131
NIST
National Institute of standards and technology
132
NOS
Network operating system
133
NFTS
New technology file system
134
NTLM
New technology LANMAN
135
NTP
Network time protocol
136
OCSP
Online certificate status protocol
137
OLA
Open license agreement
138
OS
Operating system
139
OVAL
Open vulnerability assessment language
140
OWASP
Open Webb application security project
141
P2P
Peer to peer
142
PAC
Proxy auto configuration
143
PAM
Pluggable authentication modules
144
PAP
Password authentication protocol
145
PAT
Port address translation
146
PASTA
Process for attack simulation and threat analysis
147
PBKDF2
Password based key derivation function two
148
PBX
Private branch exchange
149
PCAP
Packet capture
150
PEAP
Protected extensible authentication protocol
151
PED
Personal electronic device
152
PGP
Pretty good privacy
153
PII
Personally identifiable information
154
PIV
Personal identity verification
155
PKI
Public key infrastructure
156
PPP
Point to point protocol
157
PPTP
Point to point tunnelling protocol
158
PSK
Pre-shared key
159
RA
Recovery agent
160
RAD
Rapid application development
161
RADIUS
Remote authentication dial in user service
162
RAID
Redundant array of inexpensive discs
163
RAS
Remote access server
164
RBAC
Role -based access control /rule-based access control
165
RC4
RSA variable key size encryption algorithm
166
RIPEMD
RACE integrity primitives evaluation message digest
167
ROI
Return of investment
168
RPO
Recovery point objective
169
RTO
Recovery time objective
170
RTP
Real-time transport protocol
171
S/MIME
Secure/multipurpose Internet Mail extensions
172
SAML
Security assertions markup language
173
SaaS
Software as a service
174
SAN
Storage area network
175
SCADA
System control and data acquisition
176
SCAP
Security content automation protocol
177
SCEP
Simple certificate enrolment protocol
178
SCSI
Small computer system interface
179
SDLC
Software development life cycle
180
SDLM
Software development life cycle methodology
181
SEH
Structured exception handler
182
SHA
Secure hashing algorithm
183
SFTP
Secured file transfer protocol
184
SHTTP
Secure hypertext transfer protocol
185
SIEM
Security information and event management
186
SIM
Subscriber identity module
187
SLA
Service level agreement
188
SLE
Single loss expectancy
189
SMTP
Simple mail transfer protocol
190
SNMP
Simple network management protocol
191
SOAP
Simple object access protocol
192
SONET
 synchronous optical network technologies
193
SPIM
Spam over Internet messaging
194
SQL
Structured query language
195
SSD
Solid state Drive
196
SSH
Secure shell
197
SSL
Secure sockets layer
198
SSO
Single sign on
199
STP
Shielded twisted pair
200
STRIDE
Spoofing, tampering, repudiation, information disclosure, DoS (denial of service), elevation of privilege
201
TACACS+
Terminal access controller access control system
202
TCP/IP
Transmission control protocol/Internet protocol
203
TKIP
Temporal key integrity protocol
204
TLS
Transport layer security
205
TOTP
Time based on one time password
206
TPM
Trusted platform module
207
TSIG
Transaction signature
208
UAT
User acceptance testing
209
UEFI
Unified extensible firmware interface
210
UDP
User diagram protocol
211
UPS
Uninterrupted power supply
212
URI
Uniform resource identifier
213
URL
Universal resource locator
214
USB
Universal serial bus
215
UTM
Unified threat management
216
UTP
Unshielded twisted pair
217
VDI
Visualisation desktop infrastructure
218
VLAN
Virtual local area network
219
VOIP
Voice over IP
220
VPN
Virtual private network
221
VTC
Video teleconferencing
222
WAF
Webb application firewall
223
WAP
Wireless access point
224
WEP
Wired equivalent privacy
225
WIDS
Wireless intrusion detection system
226
WIPS
Wireless intrusion prevention system
227
WPA
Wireless protected access
228
WPA2
Wi-Fi protected access 2
229
WPS
Wi-Fi protected set up
230
WTLS
Wireless TLS
231
XML
Extensible markup language
232
XSRF
Cross site request forgery
233
EOL
End of Life
234
EOSL
End of Service Life
235
236