Acronyms Flashcards

(125 cards)

1
Q

SIP

A

Session Initial Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PFS

A

Port Forward Secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

XaaS

A

Anything as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TLS

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PUP

A

Potentially Unwanted Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ECC

A

Elliptic Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HMI

A

Human-machine Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SAN

A

Storage Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NAS

A

Network Attached Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DMZ

A

Demilitarized Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RPO

A

Recovery Point Objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ICS

A

Industrial Control Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PLC

A

Programmable Logic Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WORM

A

Write Once Read Many

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OCSP

A

Online Certificate Status Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SCADA

A

Supervisory Control and Data Acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

WPA

A

WiFi Protected Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SoC

A

System on a Chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

EPS

A

Extrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

NFC

A

Near Field Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CAN

A

Controller Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PBX

A

Private Branch Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

NTLM Hash

A

NT LAN Manager Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
EMI
Electromagnetic Interference
26
MD5
Message Digest 5
27
ISA
Interconnection Security Agreement
28
SOX
Sarbanes-Oxley Act
29
MOU
Memorandum of Understanding
30
ABAC
Attribute-based Access Control
31
SSID
Service Set identifier
32
AV
Anti-Virus
33
TOS
Trusted Operation System
34
UAC
User Account Control
35
NAC
Network Access Control
36
RAID
Redundant Array of Independent Disks
37
BYOD
Bring Your Own Device
38
AES
Advanced Encryption Standard
39
BIA
Business Impact Analysis
40
SDN
Software Defined Networking
41
MAC
Media Access Control
42
CUS
Center for Internet Security
43
CYOD
Choose Your Own Device
44
IMSI
International Mobile Subscriber
45
SA
Security Association
46
NAT
Network Address Translation
47
IKE
Internet Key Exchange
48
MITM
Man-in-the-middle (On-path)
49
HMAC
Hash-based Message Authentication Code
50
HAVA
Help America Vote Act of 2002
51
UEFI
Unified Extensible Firmware Interface
52
WPS
WiFi Protected Setup
53
XSS
Cross-site Scripting
54
CI/CD
Continuous Integration/Continuous Delivery
55
SSL
Secure Sockets layer
56
VDI
Virtual Desktop Infrastructure
57
IaaS
Infrastructure as a Service
58
UTM
Unified Threat Management
59
XSRF
Cross-site Request Forgery
60
SDLC
Software Development Life Cycle
61
GLBA
Gramm-Leach-Bliley Act
62
BIOS
Basic Input/Output System
63
HSM
Hardware Security Module
64
ACL
Access Control List
65
RTO
Recovery Time Objective
66
SSO
Single Sign On
67
RFI
Radio Frequency Interference
68
VNC
Virtual Network Computing
69
CORS
Cross-Origin Resource Sharing
70
FIDM
Federated Identity Management
71
PACS
Physical Access Control System
72
ROT
Root of Trust
73
LSO
Locally Shared Object
74
SAML
Security Assertions Markup Language
75
DLP
Data Loss Prevention
76
ESP
Encapsulated Security Payload
77
PAP
Password Authentication Protocol
78
CSF
Cybersecurity Framework
79
BER
Basic Encoding Rules
80
RTOS
Real-time Operating System
81
GDPR
General Data Protection Regulation
82
CRL
Certificate Revocation List
83
SED
Self-encypting drive
84
RAT
Remote Acess Trojan
85
PAT
Port Address Translation
86
STP
Shielded Twisted Pair
87
VPC
Virtual Private Cloud
88
OT
Operational Technology
89
ILP
Information Leak Protection
90
FAR
False Acceptance Rate
91
DoS
Denial of Service
92
FPG
Field Programmable Gate Array
93
UEBA
User and Entity Behavior Analytics
94
PKI
Public Key Infrastructure
95
PII
Personally Identifiable Information
96
SLA
Service Level Agreement
97
ALE
Annualized Loss Expectancy
98
SOAR
Security Orchestration, Automation, Response
99
MITB
Man-in-the-browser
100
HOTP
HMAC-based One-time Password
101
FISMA
Federal Information Security Management Act of 2002
102
SHA-1, SHA-2, SHA-3
Secure Hashing Algorithm
103
PDS
Protected Distribution System
104
FRR
False Rejection Rate
105
RMF
Risk Management Framework
106
SABSA
Sherwood Applied Business Security Archicture
107
DAC
Discretionary Access Control
108
ARO
Annualized Rate of Occurrence
109
IRM
Information Rights Management
110
CASB
Cloud Access Security Broker
111
OVAL
Open Vulnerability Assessment Language
112
S/MIME
Secure/Multipurpose Internet Mail Extensions
113
WRT
Work Recovery Time
114
GPO
Group Policy Object
115
RBAC
Role Based Access Control
116
SIM
Subscriber Identity Module
117
VoIP
Voice Over Internet Protocol
118
FaaS
Function as a Service
119
SaaS
Software as a Service
120
MSSP
Managed Security Servicce Provider | provides SECaaS
121
SECaaS
Security as a Service
122
PCI-DSS
Payment Card Industry Data Security Standard
123
PHI
Protected Health Information
124
MTTR
Mean Time to Repair
125
MTBF
Mean Time Between Failure