Abkürzungen Flashcards

(319 cards)

1
Q

3DES

A

Triple Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES256

A

Advanced Encryption Standards 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization

Address Space Layout Randomization ist eine Technik, die die Ausnutzung von Sicherheitslücken in Computersystemen erschwert. Durch ASLR werden Adressbereiche den Programmen auf zufälliger Basis zugewiesen, wodurch die Zuweisung der Adressbereiche eines Programms praktisch nicht mehr vorhersagbar ist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ASP

A

Application Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AV (Gefahr)

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AV (Management)

A

Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BAC

A

Business Availability Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BPDU

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BYOD
Bring Your Own Device
26
CA
Certificate Authority
27
CAC
Common Access Card
28
CAN
Controller Area Network
29
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
30
CAR
Corrective Action Report
31
CASB
Cloud Access Security Broker
32
CBC
Cipher Block Chaining
33
CCMP
Counter-Mode/CBC-Mac Protocol
34
CCTV
Closed-circuit Television
35
CER (PKI)
Certificate
36
CER (cabeling)
Cross-over Error Rate
37
CERT
Computer Emergency Response Team
38
CFB
Cipher Feedback
39
CHAP
Challenge Handshake Authentication Protocol
40
CIO
Chief Information Officer
41
CIRT
Computer Incident Response Team
42
CMS
Content Management System
43
COOP
Continuity of Operations Plan
44
COPE
Corporate Owned, Personally Enabled
45
CP
Contingency Planning
46
CRC
Cyclical Redundancy Check
47
CRL
Certificate Revocation List
48
CSIRT
Computer Security Incident Response Team
49
CSO
Chief Security Officer
50
CSP
Cloud Service Provider
51
CSR
Certificate Signing Request
52
CSRF
Cross-site Request Forgery
53
CSU
Channel Service Unit
54
CTM
Counter-Mode
55
CTO
Chief Technology Officer
56
CTR
counter
57
CYOD
Choose Your Own Device
58
DAC
Discretionary Access Control
59
DBA
Database Administrator
60
DDoS
Distributed Denial of Service
61
DEP
Data Execution Prevention
62
DER
Distinguished Encoding Rules
63
DES
Digital Encryption Standard
64
DFIR
Digital Forensics and Investigation Response
65
DHCP
Dynamic Host Configuration Protocol
66
DHE (processing)
Data-Handling Electronics
67
DHE (Crypto)
Diffie-Hellman Ephemeral
68
DLL
Dynamic Link Library
69
DLP
Data Loss Prevention
70
DMZ
Demilitarized Zone
71
DNAT
Destination Network Address Translation
72
DNS
Domain Name Service (Server)
73
DoS
Denial of Service
74
DRP
Disaster Recovery Plan
75
DSA
Digital Signature Algorithm
76
DSL
Digital Subscriber Line
77
DSU
Data Service Unit Die DSU kümmert sich um Zeitfehler und Signal-Auffrischung. Sie konvertiert den Input und den Output zwischen RS-232C-, RS-449- oder V. xx-Frames, die aus dem LAN kommen und DSX-Frames, die für das Time-Division Multiplex-Verfahren (TDM) auf einer T-1 Verbindung vorgesehen sind.
78
EAP
Extensible Authentication Protocol
79
ECB
Electronic Code Book
80
ECC
Elliptic Curve Cryptography
81
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
82
ECDSA
Elliptic Curve Digital Signature Algorithm
83
EF
Exposure Factor
84
EFS
Encrypted File System
85
EMI
Electromagnetic Interference
86
EMP
Electro Magnetic Pulse
87
EOL
End of Life
88
ERP
Enterprise Resource Planning
89
ESN
Electronic Serial Number
90
ESP
Encapsulated Security Payload
91
EULA
End User License Agreement
92
FACL
File System Access Control List
93
FAR
False Acceptance Rate
94
FDE
Full Disk Encryption
95
FRR
False Rejection Rate
96
FTP
File Transfer Protocol
97
FTPS
FTP over SSL / TLS
98
GCM
Galois Counter Mode
99
GPG
Gnu Privacy Guard
100
GPO
Group Policy Object
101
GPS
Global Positioning System
102
GPU
Graphic Processing Unit
103
GRE
Generic Routing Encapsulation
104
HA
High Availability
105
HDD
Hard Disk Drive
106
HIDS
Host-based Intrusion Detection System
107
HIPS
Host-based Intrusion Prevention System
108
HMAC
Hashed Message Authentication Code
109
HOTP
HMAC-based One-Time Password
110
HSM
Hardware Security Module
111
HTML
Hypertext Markup Language
112
HTTP
Hypertext Transfer Protocol
113
HTTPS
Hypertext Transfer Protocol over SSL/TLS
114
HVAC
Heating, Ventilation and Air Conditioning
115
IaaS
Infrastructure as a Service
116
ICMP
Internet Control Message Protocol
117
ICS
Industrial Control Systems
118
ID
Identification
119
IDEA
International Data Encryption Algorithm
120
IDF
Intermediate Distribution Frame
121
IdP
Identity Provider
122
IDS
Intrusion Detection System
123
IEEE
Institute of Electrical and Electronic Engineers
124
IIS
Internet Information System
125
IKE
Internet Key Exchange
126
IM
Instant Messaging
127
IMAPv4
Internet Message Access Protocol v4
128
IoT
Internet of Things
129
IP
Internet Protocol
130
IPsec
Internet Protocol Security
131
IR (CyberSec)
Incident Response
132
IR (physics)
Infrared
133
IRC
Internet Relay Chat
134
IRP
Incident Response Plan
135
ISA
Interconnection Security Agreement
136
ISP
Internet Service Provider
137
ISSO
Information Systems Security Officer
138
ITCP
IT Contingency Plan
139
IV
Initialization Vector
140
KDC
Key Distribution Center
141
KEK
Key Encryption Key
142
L2TP
Layer 2 Tunneling Protocol
143
LAN
Local Area Network
144
LDAP
Lightweight Directory Access Protocol
145
LEAP
Lightweight Extensible Authentication Protocol
146
MaaS
Monitoring as a Service
147
MAC (Gonvernment)
Mandatory Access Control
148
MAC (ISO/OSI)
Media Access Control
149
MAC (Crypto)
Message Authentication Code
150
MAN
Metropolitan Area Network
151
MBR
Master Boot Record
152
MD5
Message Digest 5
153
MDF
Main Distribution Frame
154
MDM
Mobile Device Management
155
MFA
Multifactor Authentication
156
MFD
Multi-function Device
157
MIME
Multipurpose Internet Mail Exchange
158
MMS
Multimedia Message Service
159
MOA
Memorandum of Agreement
160
MOTD
Message of the Day
161
MOU
Memorandum of Understanding
162
MPLS
Multi-Protocol Label Switching
163
MSCHAP
Microsoft Challenge Handshak Authentication Protocol
164
MSP
Managed Service Provider
165
MTBF
Mean Time Between Failures
166
MTTF
Mean Time to Failure
167
MTTR
Mean Time to Recover or Mean Time to Repair
168
MTU
Maximum Transmission Unit
169
NAC
Network Access Control
170
NAT
Network Address Translation
171
NDA
Non-disclosure Agreement
172
NFC
Near Field Communication
173
NGAC
Next Generation Access Control
174
NIDS
Network-based Intrusion Detection System
175
NIPS
Network-based Intrusion Prevention System
176
NIST
National Institute of Standards & Technology
177
NTFS
New Technology File System
178
NTLM
New Technology LAN Manager
179
NTP
Network Time Protocol
180
OAUTH
Open Authorization
181
OSCP
Online Certificate Status Protocol
182
OID
Object Identifier
183
OS
Operating System
184
OTA
Over The Air
185
OVAL
Open Vulnerability Assessment Language
186
P12
PKCS #12
187
P2P
Peer to Peer
188
PaaS
Platform as a Service
189
PAC
Proxy Auto Configuration
190
PAM
Pluggable Authentication Modules
191
PAP
Password Authentication Protocol
192
PAT
Port Address Translation
193
PBKDF2
Password-based Key Derivation Function 2
194
PBX
Private Branch Exchange
195
PCAP
Packet Capture
196
PEAP
Protected Extensible Authentication Protocol
197
PED
Personal Electronic Device
198
PEM
Privacy-enhanced Electronic Mail
199
PFS
Perfect Forward Secrecy
200
PFX
Personal Exchange Format
201
PGP
Pretty Good Privacy
202
PHI
Personal Health Information
203
PII
Personally Identifiable Information
204
PIV
Personal Identity Verification
205
PKI
Public Key Infrastructure
206
POODLE
Padding Oracle on Downgrade Legacy Encryption
207
POP
Post Office Protocol
208
POTS
Plain Old Telephone Service
209
PPP
Point-to-Point Protocol
210
PPTP
Point-to-Point Tunneling Protocol
211
PSK
Pre-shared Key
212
PTZ
Pan-Tilt-Zoom
213
RA (OSCP)
Recovery Agent
214
RA (PKI)
Registration Authority
215
RAD
Rapid Application Development
216
RADIUS
Remote Authentication Dial-in User Server
217
RAID
Redundant Array of Inexpensive Disks
218
RAS
Remote Access Server
219
RAT
Remote Access Trojan
220
RBAC (Group membership)
Role-based Access Control
221
RBAC (pre defined requirements)
Rule-based Access Control
222
RC4
Rivest Cipher version 4
223
RDP
Remote Desktop Protocol
224
REST
Representational State Transfer
225
RFID
Radio Frequency Identifier
226
RIPEMD
RACE Integrity Primitives | Evaluation Message Diges
227
ROI
Return on Investment
228
RMF
Risk Management Framework
229
RPO
Recovery Point Objective
230
RSA
Rivest, Shamir, & Adleman
231
RTBH
Remotely Triggered Black Hole
232
RTO
Recovery Time Objective
233
RTOS
Real-time Operating System
234
RTP
Real-time Transport Protocol
235
S/MIME
Secure/Multipurpose Internet Mail Extensions
236
SaaS
Software as a Service
237
SAML
Security Assertions Markup Language
238
SAN (Speicher)
Storage Area Network
239
SAN (CERT)
Subject Alternative Name
240
SCADA
System Control and Data Acquisition
241
SCAP
Security Content Automation Protocol
242
SCEP
Simple Certificate Enrollment Protocol
243
SCP
Secure Copy
244
SCSI
Small Computer System Interface
245
SDK
Software Development Kit
246
SDLC
Software Development Life Cycle
247
SDLM
Software Development Life Cycle Methodology
248
SDN
Software Defined Network
249
SED
Self-encrypting Drive
250
SEH
Structured Exception Handler
251
SFTP
Secured File Transfer Protocol
252
SHA
Secure Hashing Algorithm
253
SHTTP
Secure Hypertext Transfer Protocol
254
SIEM
Security Information and Event Management
255
SIM
Subscriber Identity Module
256
SIP
Session Initiation Protocol
257
SIPS
Session Initiation Protocol Secure
258
SLA
Service Level Agreement
259
SLE
Single Loss Expectancy
260
SMB
Server Message Block
261
SMS
Short Message Service
262
SMTP
Simple Mail Transfer Protocol
263
SMTPS
Simple Mail Transfer Protocol Secure
264
SNMP
Simple Network Management Protocol
265
SOAP
Simple Object Access Protocol
266
SoC
System on Chip
267
SPF
Sender Policy Framework
268
SPIM
Spam over Internet Messaging
269
SPoF
Single Point of Failure
270
SQL
Structured Query Language
271
SRTP
Secure Real-Time Protocol
272
SSD
Solid State Drive
273
SSH
Secure Shell
274
SSID
Service Set Identifier
275
SSL
Secure Sockets Layer
276
SSO
Single Sign-on
277
SSP
System Security Plan
278
STP
Shielded Twisted Pair
279
TACACS+
Terminal Access Controller Access | Control System Plus
280
TCO
Total Cost of Ownership
281
TCP/IP
Transmission Control Protocol/Internet Protocol
282
TGT
Ticket Granting Ticket
283
TKIP
Temporal Key Integrity Protocol
284
TLS
Transport Layer Security
285
TOTP
Time-based One-time Password
286
TPM
Trusted Platform Module
287
TSIG
Transaction Signature
288
UAT
User Acceptance Testing
289
UDP
User Datagram Protocol
290
UEFI
Unified Extensible Firmware Interface
291
UPS
Uninterruptable Power Supply
292
URI
Uniform Resource Identifier
293
URL
Universal Resource Locator
294
USB
Universal Serial Bus
295
USB OTG
USB On The Go
296
UTM
Unified Threat Management
297
UTP
Unshielded Twisted Pair
298
VDE
Virtual Desktop Environment
299
VDI
Virtual Desktop Infrastructure
300
VLAN
Virtual Local Area Network
301
VLSM
Variable Length Subnet Masking
302
VM
Virtual Machine
303
VoIP
Voice over IP
304
VPN
Virtual Private Network
305
VTC
Video Teleconferencing
306
WAF
Web Application Firewall
307
WAP
Wireless Access Point
308
WEP
Wired Equivalent Privacy
309
WIDS
Wireless Intrusion Detection System
310
WIPS
Wireless Intrusion Prevention System
311
WORM
Write Once Read Many
312
WPA
WiFi Protected Access
313
WPA2
WiFi Protected Access 2
314
WPS
WiFi Protected Setup
315
WTLS
Wireless TLS
316
XML
Extensible Markup Language
317
XOR
Exclusive Or
318
XSRF
Cross-site Request Forgery
319
XSS
Cross-site Scripting