Acronym Flashcards

(275 cards)

1
Q

AAA

A

Authentication, Authorization, Accounting:

  1. Authentication has 2 components: Identification (Username or email address) and the authentication factor (Something you know, Something you have, Something you are, Somewhere you are or are not, Something you do)
  2. Authorization: the rights and privileges assigned to a user to be able to perform their job.
  3. Accounting or Auditing: Accounting is the process of recording system activities and resource access. Auditing is part of accounting where an administrator examines logs of what was recorded.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ABAC

A

Attribute-based Access Control:

Access control based on different attributes: group membership, OS being used, IP address, the presence of up-to-date patches and anti-malware, geographic location. Typically used in an SDN (Software Defined Network).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Advanced Encryption Standard:

A symmetric block cipher. Three different block sizes; 128, 192, & 256 bit. Used in BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ALE

A

Annual Loss Expectancy:

The amount of money an organization would lose over the course of a year. The formula is the SLE (Single Loss Expectancy) times the ARO (Annual Rate of Occurrence). SLE x ARO = ALE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AP

A

Access Point:

Sometimes referred to as a WAP (Wireless Access Point). An AP is a bridge between wireless and wired networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

API

A

Application Programming Interface:

A software module or component that identifies inputs and outputs for an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

APT

A

Advanced Persistent Threat:

An attack that uses multiple attack vectors, attempt to remain hidden as to maintain a connection to compromised systems. You can normally tie this to nation-states (foreign countries)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARO

A

Annual Rate of Occurrence:

The number of times a year that a particular loss occurs. It is used to measure risk with ALE and SLE in a quantitative risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP

A

Address Resolution Protocol:

Matches the MAC address to a known IP address. Easily spoofed, used in MITM (Man-in-the-Middle) attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ASCII

A

American Standard Code for Information Interchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ATT&CK

A

Adversarial Tactics, Techniques, & Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AV

A

Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BCP

A

Business Continuity Planning

Need to identify critical business systems, which systems need to be protected the most, and have resources available to help recover them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BEC

A

Business Email Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BPA

A

Business Partnership Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CA

A

Certificate Authority:

Sometimes referred to as PKI (Public Key Infrastructure). Issues and signs certificates, and maintains the public / private key pair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CASB

A

Cloud Access Security Broker

Enterprise management software
designed to mediate access to cloud services by users across all types of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CCA
Chosen Cipher Attack
26
CCTV
Closed-circuit Television Detective Control, Deterrent Control
27
CEO
Chief Executive Officer
28
CER
Cross-over Error Rate A metric for biometric technologies are rated. The CER is the point where the FRR (False Rejection Rate) and FAR (False Acceptance Rate) meet. The lowest possible CER is most desirable.
29
CERT
Computer Emergency Response Team
30
CFO
Chief Financial Officer
31
CHAP
Challenge Handshake Authentication Protocol An encrypted authentication protocol normally used for remote access.
32
CIA
Confidentiality, Integrity, Availability
33
CI/CD
Continuous Integration / Continuous Delivery
34
CIO
Chief Information Officer
35
CIRT
Computer Incident Response Team
36
CIS
Center for Internet Security
37
CISO
Chief Information Security Officer
38
COOP
Continuity of Operations Plan Designing operations and systems to be as little affected by an incident and to have resources to recover from them.
39
COPE
Corporate Owned, Personally Enabled Company owns and supplies the device. The employee may use the device for web browsing, personal email, and personal social media sites.
40
CPU
Central Processing Unit
41
CRC
Cyclic Redundancy Check
42
CRL
Certificate Revocation List A list of certificates that were revoked before they were configured to expire
43
CSF
Cybersecurity Framework
44
CSP
Cloud Service Provider
45
CSR
Certificate Signing Request When a subject wants a certificate, it completes a CSR and submits it to a CA (Certificate Authority)
46
CTO
Chief Technology Officer
47
CVE
Common Vulnerabilities and Exposures This is a place to find out what platforms have vulnerabilities
48
CVSS
Common Vulnerability Scoring System This scoring system lets you know the criticality / impact to the system
49
CYOD
Choose Your Own Device A mobile deployment model where the company gives the employees a list of approved mobile devices they can use on the corporate network. This helps keep the devices with more current models.
50
DAC
Discretionary Access Control Access control is set by the data owner, or possibly the administrator. The permissions can be applied to a group or an individual.
51
DBA
Database Administrator
52
dd command
Data Duplicator Linux command that makes a bit-by-bit copy of an input file, typically used for disk imaging
53
DDoS
Distributed Denial of Service Many devices attacking a single device. The devices can be PCs' laptops, DVRs, Webcams, etc. This type of attack is carried out via a botnet, and the devices are known as drones or zombies.
54
DES
Digital Encryption Standard Considered weak encryption, symmetric block cipher that encrypts in blocks of 64 bits and uses a 56-bit key. This method is deprecated and the easiest upgrade is 3DES (Triple DES). Considered weak encryption and has been deprecated
55
DHCP
Dynamic Host Configuration Protocol A protocol that provides an automated process of assigning IP addresses. Can also issue optional parameters such as DNS address, DNS suffix, Default Gateway, and subnet mask. Uses Ports 67 & 68 UDP
56
DKIM
Domain Keys Identified Mail
57
DLL
Dynamic Link Library Is a binary package used to implement functionality, such as cryptography or establishing a network connection
58
DLP
Data Loss Prevention A hardware or software solution that prevents a certain type of information from being exfiltrated from a device or network. Data like PII (Personally Identifiable Information), credit card numbers, Social Security numbers, data that is sensitive using keywords. USB blocking is a form of DLP. Preventing this type of information from being printed is another protection.
59
DMARC
Domain Message Authentication Reporting and Conformance Prevents phishing and spear phishing attacks against an organization's email server
60
DNS
Domain Name Service (Server) A service that maps / resolves host names to an IP address. Use Port 53 UDP for DNS queries, uses Port 53 TCP for Zone Transfers
61
DNSSEC
Domain Name System Security Extensions A security protocol that provides authentication of DNS data and upholds DNS data integrity
62
DoS
Denial of Service Is an attack that is one to one. Anything that can keep a device or user from accessing a service or information is a denial of service. One user flooding other user's accounts with email attachments until the email box is full, cut the network cable or power are just a few examples.
63
DPO
Data Protection Officer
64
DRP
Disaster Recovery Plan
65
DSA
Digital Signature Algorithm Public key encryption used for digital signatures. This is an asymmetric encryption method
66
EAP
Extensible Authentication Protocol EAP allows different authentication methods, most of using a digital certificate on the server and/or the client
67
EAP-TLS
Extensible Authentication Protocol-Transport Layer Security Requires certificates on the clients and server
68
EDR
Endpoint Detection and Response A software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats
69
EF
Exposure Factor
70
ELB
Electronic Load Balancer
71
EOL
End of Life When systems or applications are no longer supported by the manufacturer or developer.
72
ESP
Encapsulated Security Payload An IPSec protocol that does the same as for AH (Authentication Header), but also encrypts/encapsulates the entire payload/packet. Uses protocol # 50.
73
EULA
End User Licensing Agreement
74
EXIF
Exchangeable Image File Format
75
FAR
False Acceptance Rate A Type II error. The ratio of when a biometric system authenticates an unauthorized user as an authorized user.
76
FDE
Full Disk Encryption This means that the entire contents of the drive (or volume), including system files and folders, are encrypted. Two methods are BitLocker and PGP Whole Disk Encryption. This is a software-based or an operating system encryption method. These methods are more CPU intensive processes.
77
FIM
File Integrity Monitoring
78
FPGA
Field Programmable Gate Array
79
FRR
False Rejection Rate Type I error. The ratio in which a biometric system rejects an authorized user.
80
FTP
File Transfer Protocol Uploads and downloads large files to and from an FTP server. FTP transmits data in plaintext. FTP active mode uses TCP port 21 for control and TCP port 20 for data transfer. FTP passive mode (PASV) also uses TCP port 21 for control signals, but it uses a random TCP port for data. If the user can connect to the FTP but not upload or download, disable PASV (passive mode)
81
FTPS
Secure File Transfer Protocol / FTP over SSL Ports 989 & 990 TCP, transfer in plain text or encrypted via "Explicit" mode, forced to use encryption is "Implicit" mode
82
FWSM
Firewall Service Module
83
Gbps
Gigabit per second
84
GDPR
General Data Protection Regulation Provisions and requirements protecting the personal data of European Union (EU) citizens
85
GLBA
Gramm-Leach-Bliley Act
86
GPO
Group Policy Object Group Policy Object is a component of Group Policy (in Microsoft Active Directory) that can be used in Microsoft operating systems to control user accounts and user activity.
87
GPS
Global Positioning System GPS is a way of determining a device's position (its latitude and longitude) based on information received from GPS satellites. The device must have line-of-sight to the GPS satellites. GPS provides another means of locating the device.
88
HA
High Availability The key premise is that systems are resilient and redundant. HA is the percentage of uptime a system is able to maintain over a period of a year. For example, 99% would equal being down 3.65 per year of 14 minutes per day. The five 9's, 99.999%, would equal being down 5.25 minutes per year or .86 seconds per day.
89
HDD
Hard Disk Drive
90
HIDS
Host-Based Intrusion Detection System
91
HIPAA
Health Insurance Portability Accountability Act
92
HIPS
Host-Based Intrusion Prevention System
93
HR
Human Resources
94
HSM
Hardware Security Module Provides root of trust, stores cryptographic keys, can also work as an SSL accelerator
95
HTTP
Hypertext Transfer Protocol Port 80 TCP, plaintext
96
HTTPS
Hypertext Transfer Protocol Secure Port 443 TCP, requires certificates and TLS
97
HVAC
Heating, Ventilation, Air Conditioning Provides availability
98
IaaS
Infrastructure as a Service This type of service you have the most control.
99
IaC
Infrastructure as Code A provisioning architecture in which deployment of resources is performed by scripted automation and orchestration.
100
IAM
Identity and Access Management
101
ICMP
Internet Control Message Protocol Suite containing ping, tracert, and pathping
102
ICS
Industrial Control Systems
103
IdP
Identity Provider
104
IDS
Intrusion Detection System Out-of-band. If anomaly, heuristic, or behavioral-based, need to establish a baseline first. Detects attacks and sends an alert.
105
IKE
Internet Key Exchange
106
IoC
Indicators of Compromise
107
IoT
Internet of Things IoT includes any connecting to the Internet that is not a PC, tablet, or laptop.
108
IP
Internet Protocol
109
IPS
Intrusion Prevention System IPS are in-band, either Signature-based or Anomaly-based.
110
IPSec
Internet Protocol Security IPSec is used to secure data-in-transit. Works at Layer 3 of the OSI, and has two modes: transport and tunneling. In Transport mode, only the data is encrypted, not the header. in Tunnel mode, the packet and header are encrypted.
111
IR
Incident Response
112
IRC
Internet Relay Channel
113
IRP
Incident Response Plan Specific procedures that must be performed if a certain type of event is detected or reported
114
ISA
Interconnection Security Agreement
115
ISAC
Information Sharing and Analysis Center Not-for-profit group set up to share sector-specific threat intelligence and security best practices amongst its members.
116
ISO
International Organization for Standardization
117
ISP
Incident Service Provider
118
JSON
JavaScript Object Notation
119
KMS
Key Management System
120
L2TP
Layer 2 Tunneling Protocol Port 1701 UDP, uses IPSec
121
LAN
Local Area Network
122
LDAP
Lightweight Directory Access Protocol Port 389 TCP, plaintext
123
LDAPS
Secure Lightweight Directory Access Protocol Port 636 TCP, requires PKI/CA, uses TLS
124
LEAP
Lightweight Extensible Authentication Protocol Does not require certificates, deprecated & replaced with EAP-FAST
125
MAC
Mandatory Access Control Resources (objects) and users (subjects) are allocated a clearance level (or label), or a "need to know" basis
126
MAC
Media Access Control: A network data transfer policy that determines how data is transmitted between two computer terminals through a network cable.
127
MAM
Mobile Application Management Enterprise management function that enables control over apps and storage for mobile devices and other endpoints
128
MD5
Message Digest 5 Hashing algorithm, 128 bit, fastest, provides an integrity check.
129
MDM
Mobile Device Management The process and supporting technologies for tracking, controlling, and securing the organization's mobile infrastructure
130
MFA
Multifactor Authentication Two or more factors from the following: 1. Something you know 2. Something you have 3. Something you are 4. Something you do 5. Somewhere you are or are not
131
MiTM
Man in the Middle: A man-in-the-middle (MITM) attack is a cyberattack where a criminal inserts themselves between two parties to intercept their communication. The attacker can then steal data or manipulate it without the victim's knowledge.
132
MOA
Memorandum of Agreement: A written contract between parties to work together on a project or goal
133
MOU
Memorandum of Understanding A non-binding agreement between two or more parties. It's a formal document that outlines the parties' intentions, roles, and objectives.
134
MPLS
Multiprotocol Label Switching A network routing technique that uses labels to direct data packets to their destinations.
135
MSA
Master Service Agreement A contract that establishes the terms and conditions of a business relationship between two parties.
136
MS-CHAP
Microsoft Challenge-Handshake Authentication Protocol A password-based authentication method that's used for secure user logins.
137
MSP
Managed Service Provider A third-party company that manages a customer's IT systems and information.
138
MSSP
Managed Security Service Provider A third-party company that offers cybersecurity services to organizations.
139
MTBF
Mean Time Between Failures The system can be repaired, the reliability of the system, need a redundant/fail-over system while the system is being repaired.
140
MTTF
Mean Time to Failure Life expectancy of a system, cannot be repaired.
141
MTTR
Mean Time to Repair The actual time it took to bring a system back online.
142
NAC
Network Access Control Make sure systems have current Operating System updates and Antivirus updates.
143
NAT
Network Address Translation Many internal IP addresses mapped to one external IP address.
144
NDA
Non-disclosure Agreement
145
NFC
Near-field Communication: A wireless technology that allows devices to communicate when they are very close together.
146
NGFW
Next-generation Firewall: A security device that protects networks by analyzing traffic and blocking potentially dangerous traffic.
147
NIC
Network Interface Card: An essential component of any computer that connects it to the network.
148
NIDS
Network-based Intrusion Detection System NIDS can also perform rogue system detection.
149
NIPS
Network-based Intrusion Prevention System A security technology that actively monitors network traffic for malicious activity and takes immediate action to block or mitigate potential threats
150
NIST
National Institute of Standards and Technology: Promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life
151
NSA
National Security Agency: Collects and analyzes intelligence to protect the United States from foreign threats.
152
NTLM
New Technology LAN Manager: A set of Microsoft security protocols that authenticates users and protects their activity.
153
NTP
Network Time Protocol: An internet standard that synchronizes clocks between devices.
154
OAuth
Open Authorization: A standard that allows users to grant third-party apps access to their information without sharing their passwords.
155
OCSP
Online Certificate Status Protocol: An internet protocol used to check the validity of a digital certificate, specifically whether it has been revoked, by querying a Certificate Authority (CA) in real-time.
156
OPSEC
Operational Security: A security process that protects sensitive information from adversaries.
157
OS
Operating System
158
OSI
Open Systems Interconnection: A framework that describes how different systems communicate on a network.
159
OSINT
Open Source Intelligence: Information gathered from publicly available sources. It's used by organizations like law enforcement, cybersecurity, and intelligence agencies.
160
OVAL
Open Vulnerability and Assessment Language Used with SCAP
161
OWASP
Open Web Application Security Project: A non-profit organization focused on improving the security of software applications by providing freely available resources like articles, methodologies, tools, and documentation to help developers and security professionals identify and mitigate common web application vulnerabilities.
162
PaaS
Platform as a Service: A cloud computing model where a third-party provider delivers a complete development environment, including tools, middleware, operating systems, and databases, allowing users to build, test, deploy, and manage applications without having to manage the underlying infrastructure.
163
PAM
Privileged Access Management: A cybersecurity strategy that protects an organization's sensitive systems and data.
164
PAP
Password Authentication Protocol Username and password sent in cleartext
165
PCAP
Packet Capture
166
PCI DSS
Payment Card Industry Data Security Standard
167
PDU
Power Distribution Unit
168
PEAP
Protected Extensible Authentication Protocol
169
PEM
Privacy-Enhanced Mail
170
PHI
Personal Health Information
171
PII
Personally Identifiable Information
172
PIN
Personal Identification Number Something you know
173
PKI
Public Key Infrastructure: A system of policies, hardware, software, and procedures that manage digital certificates and public-key encryption.
174
PNG
Portable Network Graphics: A raster image file format that supports lossless compression.
175
PPPoE
Point-to-Point over Ethernet Encapsulation
176
PPTP
Point-to-Point Tunneling Protocol: A network protocol that creates virtual private networks (VPNs).
177
PSK
Pre-Shared Key Password or passphrase
178
RADIUS
Remote Authentication Dial-in User Server
179
RAID
Redundant Array of Inexpensive Disks: A data storage technology that combines multiple physical hard drives into a single logical unit, allowing for increased reliability and performance by distributing data across the drives, creating redundancy in case of a single drive failure; essentially, it lets you use several inexpensive disks to create a more reliable storage system.
180
RAM
Random Access Memory: Your computer or laptop's short-term memory. It's where the data is stored that your computer processor needs to run your applications and open your files.
181
RAS
Remote Access Server: A combination of hardware and software that allows users to connect to a network from a remote location.
182
RAT
Remote Access Trojan: Is malicious software designed to allow attackers to monitor and control a computer system or network remotely.
183
RBAC
Role-Based Access Control: A security model that limits access to systems and data based on a user's role in an organization.
184
RBAC
Rule-Based Access Control: A system that controls access to resources based on predetermined rules.
185
RDP
Remote Desktop Protocol Port 3389
186
RFID
Radio Frequency Identifier: A wireless system that uses radio waves to identify objects, people, or animals.
187
ROI
Return on Investment
188
ROM
Read-only Memory Non-volatile
189
RPO
Recovery Point Objective Amount of data an organization is willing to lose.
190
RSA
Rivest, Shamir, & Adleman Asymmetric encryption, used to encrypt email, digital signatures, and X.509 certificates.
191
RSH
Remote Shell: A command-line program that allows users to run commands on a remote computer as if they were logged in locally.
192
RSTP
Rapid Spanning Tree Protocol: A network protocol that acts as an improved version of the standard Spanning Tree Protocol (STP), designed to significantly reduce the time it takes for a network to recover from topology changes by providing faster convergence when network links fail.
193
RTO
Recovery Time Objective An allotted, expected, or maximum amount of time to get a system online.
194
RTOS
Real Time Operating System: A specialized operating system designed to handle tasks with strict time constraints, ensuring that data is processed and events are responded to within a predictable timeframe.
195
RTP
Real-time Transfer Protocol Audio, Video, VoIP
196
S/MIME
Secure/Multipurpose Internet Mail Extensions Used for encrypting email and creating digital signatures
197
SA
Security Associations
198
SaaS
Software as a Service You have no control over, can only use the program.
199
SAE
Simultaneous Authentication of Equals Used with WPA-3, replaces PSK
200
SAM
Security Accounts Manager
201
SAML
Security Assertions Markup Language: An open standard that allows applications to exchange authentication and authorization data between different parties.
202
SAN
Storage Area Network: A high-speed network that connects servers to storage devices.
203
SAN
Subject Alternative Name
204
SASE
Secure Access Service Edge
204
SCADA
System Control and Data Acquisition: A system that monitors and controls industrial processes by collecting real-time data from sensors and field devices, allowing operators to remotely manage equipment and conditions within a facility or network, often used in applications like power grids, water treatment plants, and oil pipelines.
205
SCAP
Security Content Automation Protocol
206
SCEP
Simple Certificate Enrollment Protocol: An open-source protocol that allows devices to easily and automatically request and receive digital certificates from a Certificate Authority (CA) by using a standardized method to communicate, typically through a shared secret and a URL.
207
SCM
Supply Chain Management
208
SDLC
Software Development Life Cycle: A structured process that software development teams follow, encompassing all stages from initial planning and requirement analysis to design, development, testing, deployment, and ongoing maintenance.
209
SDN
Software Defined Networking: A network architecture that uses software to manage and control a network.
210
SD-WAN
Software-Defined Wide Area Network: A network technology that uses software-based principles to manage and optimize wide area networks (WANs), allowing organizations to securely connect users and applications across multiple locations while improving performance, reliability, and scalability through centralized control and visibility over the network.
211
SED
Self-Encrypting Drives: A hard disk drive (HDD) or solid state drive (SSD) that encrypts data as it's written and decrypts it when it's read.
212
SFTP
Secured File Transfer Protocol Also known as FTP over SSH, uses port 22 TCP
213
SHA
Secure Hashing Algorithm: A cryptographic function that turns an input of any size into a fixed-sized output, or hash value.
214
SIEM
Security Information and Event Management This is a detective control.
215
SIP
Session Initiation Protocol VoIP credentials
216
SLA
Service Level Agreement: A contract between a service provider and a customer that defines the level of service expected.
217
SLE
Single Loss Expectancy: The estimated amount of money lost if an asset is damaged or compromised.
218
SMS
Short Message Service Test message
219
SMTP
Simple Mail Transfer Protocol Port 25 TCP, sends email in plaintext
220
SNMP
Simple Network Management Protocol Port 161 UDP, only secure version is version 3.
221
SOAR
Security Orchestration, Automation, Response
222
SoC
System on Chip
223
SOC
Security Operation Center
224
SOC
Service Organization Control
225
SOP
Standard Operating Procedure
226
SOW
Statement of Work
227
SPAN
Switched Port Analyzer: A dedicated port on a switch that takes a mirrored copy of network traffic from within the switch to be sent to a destination.
228
SPF
Sender Policy Framework: An email authentication method that verifies that an email's sender is authorized to send mail from a domain.
229
SPIM
Spam over Internet Messaging
230
SQL
Structured Query Language
231
SQLi
SQL Injection: A code injection technique that might destroy your database. SQL injection is one of the most common web hacking techniques.
232
SRTP
Secure Real-Time Protocol Encrypts audio & video streaming, and VoIP
233
SSD
Solid State Drive: Is a type of solid-state storage device that uses integrated circuits to store data persistently.
234
SSH
Secure Shell Port 22 TCP
235
SSID
Service Set Identifier: A unique name that identifies a wireless network.
236
SSL
Secure Sockets Layer: A security protocol that encrypts data sent between a user's device and a website or server.
237
SSO
Single Sign On: System that lets users log in to multiple applications using one set of credentials.
238
STIX
Structured Threat Information eXchange: A standardized language used to express and share cyber threat intelligence information in a consistent format.
239
STP
Spanning Tree Protocol Prevents switching loops
240
SWG
Secure Web Gateway URL filter, Content Filter
241
TAP
Test Access Point
242
TAXII
Trusted Automated eXchange of Indicator Information
243
TCP
Transmission Control Protocol: A set of rules that govern how data is sent and received over a network.
244
TFTP
Trivial File Transfer Protocol Uses port 69 UDP, mainly used for deploying images
245
TGT
Ticket Granting Ticket
246
TKIP
Temporal Key Integrity Protocol: A security protocol used in wireless networking, primarily within the IEEE 802.11 standard, designed to provide more secure encryption than the older "Wired Equivalent Privacy" (WEP) while still working with existing hardware.
247
TLS
Transport Layer Security: A cryptographic protocol that protects data sent over networks like the internet.
248
TOC/TOU
Time of Check / Time of Use Used in a Race Condition attack
249
TOR
The Onion Router
250
TOTP
Time-based One Time Password
251
TPM
Trusted Platform Module: A chip on a computer's motherboard that helps protect sensitive information and verifies the authenticity of the operating system and firmware.
252
UAT
User Acceptance Testing
253
UBA
User Behavior Analytics
254
UDP
User Datagram Protocol
255
UPS
Uninterruptable Power Supply
256
URL
Universal Resource Locator
257
UTM
Unified Threat Management
258
VDI
Virtual Desktop Infrastructure
259
VLAN
Virtual Local Area Network
260
VM
Virtual Machine
261
VPC
Virtual Private Cloud
262
VPN
Virtual Private Network
263
VSAN
Virtual Storage Area Network
264
WAF
Web Application Firewall
265
WAP
Wireless Access Point
266
WEP
Wired Equivalent Privacy
267
WPA
Wi-Fi Protected Access
268
WPS
Wi-Fi Protected Setup
269
XaaS
Anything as a Service
270
XDR
Extended Detection and Response
271
XML
Extensible Markup Language: A text-based format for storing, sharing, and exchanging data.
272
XSRF
Cross-Site Request Forgery: A cyber attack that tricks a user into performing actions they didn't intend. This can include transferring funds, changing passwords, or making purchases.
273
XSS
Cross-Site Scripting: A web security flaw that allows attackers to inject malicious scripts into websites.
274
NAS
Network Attached Server