acronyms Flashcards

(88 cards)

1
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ASLR

A

Address Space Layout Randomization

Address space layout randomization (ASLR) is a memory-protection process for operating systems (OSes) that guards against buffer-overflow attacks by randomizing the location where system executables are loaded into memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CAPTCHA

A

Completely Automated Public Turing Test to Tell Computers and Humans Apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CER

A

Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CIA

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CIRT

A

Computer Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CISO

A

Chief Information Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CMS

A

Content Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CPU

A

Central Processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CRC

A

Cyclic Redundancy Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CSRF

A

Cross-Site Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CSS

A

Cascading Style Sheets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CPT

A

Certified Penetration Tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DAC

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DBMS

A

Database Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DEP

A

Data Execution Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
DES
Data Encryption Standard
26
DHCP
Dynamic Host Configuration Protocol
27
DMZ
Demilitarized Zone
28
DNS
Domain Name System
29
DoS
Denial of Service
30
DDoS
Distributed Denial of Service
31
DRM
Digital Rights Management
32
ECC
Elliptic Curve Cryptography
33
EFS
Encrypting File System
34
EMI
Electromagnetic Interference
35
EULA
End User License Agreement
36
FDE
Full Disk Encryption
37
FTP
File Transfer Protocol
38
GPG
GNU Privacy Guard
39
GPS
Global Positioning System
40
GRE
Generic Routing Encapsulation
41
GRC
Governance, Risk, and Compliance
42
HMAC
Hashed Message Authentication Code Here's a concise explanation of HMAC: Purpose: HMAC is used to verify the integrity and authenticity of a message or data by generating a fixed-size hash value (digest) based on the message and a secret key. Process: HMAC utilizes a cryptographic hash function (e.g., SHA-256) and a secret key known only to the sender and receiver. The message is combined with the secret key, and the hash function is applied to this combination to generate the HMAC. Properties: HMAC provides two main security properties - integrity and authenticity. Integrity ensures that the data has not been altered in transit, and authenticity ensures that the data comes from the expected sender. Keyed Hashing: The use of a secret key distinguishes HMAC from regular hash functions. It prevents unauthorized parties from tampering with the message and generating valid HMACs. Applications: HMAC is commonly used in various security protocols, such as SSL/TLS, IPsec, and SSH, as well as in applications like digital signatures and message authentication in web services. Strengths: HMAC is resistant to known cryptographic attacks when using a secure hash function. It is computationally efficient and provides a high level of security. Key Management: Proper key management is crucial for the effectiveness of HMAC. Keys must be kept secret and should be changed regularly for enhanced security. In summary, HMAC is a widely used mechanism for ensuring the integrity and authenticity of data by generating a fixed-size hash value based on a message and a secret key. It provides a strong security foundation for many security protocols and applications, making it a fundamental tool in modern secure communication.
43
HTML
Hypertext Markup Language
44
HTTP
Hypertext Transfer Protocol
45
HTTPS
Hypertext Transfer Protocol Secure
46
ICMP
Internet Control Message Protocol
47
IDS
Intrusion Detection System
48
IPS
Intrusion Prevention System
49
IPsec
Internet Protocol Security
50
ISO
International Organization for Standardization
51
ITIL
Information Technology Infrastructure Library
52
JIT
Just-In-Time
53
LAN
Local Area Network
54
LDAP
Lightweight Directory Access Protocol
55
MAC
Mandatory Access Control Strict and uses predefined based on documented security labels or classifications. like TOP Secretor Confidential.
56
MBR
Master Boot Record
57
MDM
Mobile Device Management
58
MFA
Multi-Factor Authentication
59
MITM
Man-In-The-Middle
60
NAC
Network Access Control
61
NAS
Network-Attached Storage
62
NAT
Network Address Translation
63
NIDS
Network Intrusion Detection System
64
NIPS
Network Intrusion Prevention System
65
NIST
National Institute of Standards and Technology
66
NTFS
New Technology File System
67
OAUTH
Open Authorization
68
OTP
One-Time Password
69
PaaS
Platform-as-a-Service
70
PAT
Port Address Translation
71
PBKDF2
Password-Based Key Derivation Function 2
72
PCI
Payment Card Industry
73
PII
Personally Identifiable Information
74
PKI
Public Key Infrastructure
75
POP3
Post Office Protocol version 3
76
PPP
Point-to-Point Protocol
77
PPTP
Point-to-Point Tunneling Protocol 1723 TCP
78
RAID
Redundant Array of Independent Disks
79
RAS
Remote Access Service
80
RDP
Remote Desktop Protocol
81
RF
Radio Frequency
82
RFI
Radio Frequency Interference
83
RFID
Radio Frequency Identification
84
RIS
Remote Installation Service
85
RTO
Recovery Time Objective
86
UTM
Unified Threat Manager In cybersecurity, UTM stands for Unified Threat Management. It is a type of security solution that combines multiple security technologies into a single, integrated platform to protect against a wide range of threats. UTM solutions typically include features such as firewall, intrusion prevention, anti-virus and anti-malware, virtual private network (VPN), content filtering, and application control. These technologies work together to provide comprehensive protection against threats like viruses, malware, phishing attacks, and unauthorized access. By consolidating multiple security functions into one platform, UTM solutions offer several benefits, including simplified management and administration, reduced complexity and costs, and improved security posture. They are often used by small and medium-sized businesses that need comprehensive security but may not have the resources to manage multiple security products separately.
87
Cn
Common name
88
Idp
Identity Ptovider