Acronyms Flashcards

1
Q

OSI Model

A

Open Systems Interconnection Model:
Physical
Data Link
Network
Transport
Session
Presentation
Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TLS

A

Transport Layer Security. Secure form of TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RBAC

A

Role-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IP

A

Internet Protocol. Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standard. A symmetric block cipher chosen by the U.S. government to protect classified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IT

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SAML

A

Security Assertion Markup Language
Open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

REST

A

REpresentational State Transfer. A type of software architecture that was designed to ensure interoperability between different Internet computer systems. REST works by putting in place very strict constraints for the development of web services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SOAP

A

Simple Object Access Protocol. A lightweight XML-based protocol that is used for the exchange of information in decentralized, distributed application environments. You can transmit SOAP messages in any way that the applications require, as long as both the client and the server use the same method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

POSIX

A

Portable Operating System Interface
Standards for maintaining compatibility between operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ACID

A

Atomicity, Isolation, Durability. A set of properties of database transactions intended to guarantee data validity despite errors, power failures, and other mishaps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

I/O

A

Input/Output. Describes any operation, program, or device that transfers data to or from a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PNL

A

Profit and loss - talking about pre-sales

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PKI

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

API

A

Application Programming Interface -A mechanism whereby one software system asks another software system to perform a service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IIS Handler

A

Internet Information Services Handler. Components that are configured to process requests to specific content, typically to generate a response for the request resource. For example, an ASP.NET Web page is one type of handler.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SSH

A

Secure Shell Protocol. A network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

GPUs

A

Graphic Processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

HTTP

A

Hypertext Transfer Protocol. Stateless Request Response Cycle. Application Layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

HTTPS

A

Hypertext Transfer Protocol Secure. Uses certificates. Application Layer

21
Q

TCP

A

Transmission Control Protocol. Alternative to UDP. Gives high importance to reliability over performance. Transport Layer

22
Q

UDP

A

User Datagram Protocol. Alternative to TCP/TLS. Prizes performance over reliability. Transport Layer

23
Q

SMTP

A

Simple Mail Transfer Protocol. Email Transfer Protocol. Application Layer.

24
Q

SAST

A

Static Application Security Testing. Testing methodology that analyzes source code to find security vulnerabilities that make your organization’s applications susceptible to attack. Scans before code is compiled.

25
Q

DAST

A

Dynamic Application Security Testing. Process of analyzing a web application through the front-end to find vulnerabilities through simulated attacks. Scans after code is compiled.

26
Q

SCA

A

Software composition analysis. Process that identifies the open source software in a codebase.

27
Q

RACI

A

Responsible, accountable, consulted, and informed

28
Q

CIA Triad

A

Security. Confidentiality, Integrity, and Availability

29
Q

DHCP

A

Dynamic Host Configuration Protocol. A network management protocol used on Internet Protocol networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client–server architecture.

30
Q

VLAN

A

A virtual local area network is any broadcast domain that is partitioned and isolated in a computer network at the data link layer. In this context, virtual refers to a physical object recreated and altered by additional logic, within the local area network.

31
Q

CDN

A

Content Delivery Network. A group of geographically distributed servers that speed up the delivery of web content by bringing it closer to where users are.

32
Q

DDoS

A

Distributed denial-of-service attack. Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.

33
Q

802.1Q

A

This is the most common trunking protocol. It’s a standard and supported by many vendors, used in VLAN trunking.

34
Q

SNI

A

Server Name Indication. An extension to TLS that allows multiple hostnames to be served over HTTPS from the same IP address

35
Q

CA

A

Certificate Authority. A trusted entity that issues Secure Sockets Layer (SSL) certificates

36
Q

UAT

A

User acceptance testing. Also called application testing or end-user testing. User acceptance testing validates the testing done at the end of the development cycle.

37
Q

IPS

A

Intrusion Prevention System. A network security tool (which can be a hardware device or software) that continuously monitors a network for malicious activity and takes action to prevent it, including reporting, blocking, or dropping it, when it does occur.

38
Q

IDS

A

Intrusion Detection System. A monitoring system that detects suspicious activities and generates alerts when they are detected. Based upon these alerts, a security operations center (SOC) analyst or incident responder can investigate the issue and take the appropriate actions to remediate the threat.

39
Q

MSP

A

Managed Service Provider

40
Q

SOC

A

Security Operations Center. The SOC is responsible for protecting enterprises against cyberattacks

41
Q

GRC

A

Governance, risk management, and compliance. A holistic framework that helps organizations protect their data while operating efficiently and within the bounds of the law. The three components are interrelated yet distinct:

Governance ensures that organizational activities align with business objectives and stakeholder expectations.

Risk management involves identifying, assessing, and mitigating risks that could hinder the organization’s operations.

Compliance ensures adherence to both external regulations and internal policies.

42
Q

CIDR

A

Classless Inter-Domain Routing is an IP address allocation method that improves data routing efficiency on the internet.

43
Q

SIEM

A

Security Information and Event Management. A system or solution that aggregates large amounts of data regarding threat investigations. Because of this, SIEM is crucial for any organization looking to analyze and mitigate threats.

44
Q

SLO

A

Service Level Objective is an agreement within an SLA about a specific metric like uptime or response time.

45
Q

SLA

A

Service Level Agreement. It refers to a document that outlines a commitment between a service provider and a client, including details of the service, the standards the provider must adhere to, and the metrics to measure the performance.

46
Q

DORA

A

DevOps Research and Assessment provides a standard set of DevOps metrics used for evaluating process performance and maturity. These metrics provide information about how quickly DevOps can respond to changes, the average time to deploy code, the frequency of iterations, and insight into failures.

47
Q

SSL

A

Secure Sockets Layer. It is a standard technology for securing an internet connection by encrypting data sent between a website and a browser (or between two servers).

48
Q

OWASP

A

Open Web Application Security Project. A non-profit group focused on security of software.