Acronyms Flashcards

(349 cards)

1
Q

3DES

A

Triple Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AD

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES256

A

Advanced Encryption Standards 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AIS

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ASP

A

Active Server Pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ATT&CK

A

Adversarial Tactics, Techniques,
and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BIA
Business Impact Analysis
26
BIOS
Basic Input/Output System
27
BPA
Business Partnership Agreement
28
BPDU
Bridge Protocol Data Unit
29
BSSID
Basic Service Set Identifier
30
BYOD
Bring Your Own Device
31
CA
Certificate Authority
32
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
33
CAR
Corrective Action Report
34
CASB
Cloud Access Security Broker
35
CBC
Cipher Block Chaining
36
CBT
Computer-based Training
37
CCMP
Counter-Mode/CBC-MAC Protocol
38
CCTV
Closed-Circuit Television
39
CERT
Computer Emergency Response Team
40
CFB
Cipher Feedback
41
CHAP
Challenge-Handshake Authentication Protocol
42
CIO
Chief Information Officer
43
CIRT
Computer Incident Response Team
44
CIS
Center for Internet Security
45
CMS
Content Management System
46
CN
Common Name
47
COOP
Continuity of Operations Planning
48
COPE
Corporate-owned Personally Enabled
49
CP
Contingency Planning
50
CRC
Cyclic Redundancy Check
51
CRL
Certificate Revocation List
52
CSA
Cloud Security Alliance
53
CSIRT
Computer Security Incident Response Team
54
CSO
Chief Security Officer
55
CSP
Cloud Service Provider
56
CSR
Certificate Signing Request
57
CSRF
Cross-Site Request Forgery
58
CSU
Channel Service Unit
59
CTM
Counter-Mode
60
CTO
Chief Technology Officer
61
CVE
Common Vulnerabilities and Exposures
62
CVSS
Common Vulnerability Scoring System
63
CYOD
Choose Your Own Device
64
DAC
Discretionary Access Control
65
DBA
Database Administrator
66
DDoS
Distributed Denial-of-Service
67
DEP
Data Execution Prevention
68
DER
Distinguished Encoding Rules
69
DES
Data Encryption Standard
70
DHCP
Dynamic Host Configuration Protocol
71
DHE
Diffie-Hellman Ephemeral
72
DKIM
Domain Keys Identified Mail
73
DLL
Dynamic-link Library
74
DLP
Data Loss Prevention
75
DMARC
Domain Message Authentication Reporting and Conformance
76
DNAT
Destination Network Address Transaction
77
DNS
Domain Name System
78
DNSSEC
Domain Name System Security Extensions
79
DoS
Denial-of-Service
80
DPO
Data Protection Officer
81
DRP
Disaster Recovery Plan
82
DSA
Digital Signature Algorithm
83
DSL
Digital Subscriber Line
84
EAP
Extensible Authentication Protocol
85
ECB
Electronic Code Book
86
ECC
Elliptic-curve Cryptography
87
ECDHE
Elliptic-curve Diffie-Hellman Ephemeral
88
ECDSA
Elliptic-curve Digital Signature Algorithm
89
EDR
Endpoint Detection and Response
90
EFS
Encrypted File System
91
EIP
Extended Instruction Pointer
92
EOL
End of Life
93
EOS
End of Service
94
ERP
Enterprise Resource Planning
95
ESN
Electronic Serial Number
96
ESP
Encapsulating Security Payload
97
ESSID
Extended Service Set Identifier
98
FACL
File System Access Control List
99
FDE
Full Disk Encryption
100
FIM
File Integrity Monitoring
101
FPGA
Field Programmable Gate Array
102
FRR
False Rejection Rate
103
FTP
File Transfer Protocol
104
FTPS
Secured File Transfer Protocol
105
GCM
Galois/Counter Mode
106
GDPR
General Data Protection Regulation
107
GPG
GNU Privacy Guard
108
GPO
Group Policy Object
109
GPS
Global Positioning System
110
GPU
Graphics Processing Unit
111
GRE
Generic Routing Encapsulation
112
HA
High Availability
113
HDD
Hard Disk Drive
114
HIDS
Host-based Intrusion Detection System
115
HIPS
Host-based Intrusion Prevention System
116
HMAC
Hash-based Message Authentication Code
117
HOTP
HMAC-based One-time Password
118
HSM
Hardware Security Module
119
HSMaaS
Hardware Security Module as a Service
120
HTML
Hypertext Markup Language
121
HTTP
Hypertext Transfer Protocol
122
HTTPS
Hypertext Transfer Protocol Secure
123
HVAC
Heating Ventilation Air Conditioning
124
IaaS
Infrastructure as a Service
125
IAM
Identity and Access Management
126
ICMP
Internet Control Message Protocol
127
ICS
Industrial Control Systems
128
IDEA
International Data Encryption Algorithm
129
IDF
Intermediate Distribution Frame
130
IdP
Identity Provider
131
IDS
Intrusion Detection System
132
IEEE
Institute of Electrical and Electronics Engineers
133
IKE
Internet Key Exchange
134
IM
Instant Messaging
135
IMAP4
Internet Message Access Protocol v4
136
IoC
Indicators of Compromise
137
IoT
Internet of Things
138
IP
Internet Protocol
139
IPS
Intrusion Prevention System
140
IPSec
Internet Protocol Security
141
IR
Incident Response
142
IRC
Internet Relay Chat
143
IRP
Incident Response Plan
144
ISA
Interconnection Security Agreement
145
ISFW
Internal Segmentation Firewall
146
ISO
International Organization for Standardization
147
ISP
Internet Service Provider
148
ISSO
Information Systems Security Officer
149
ITCP
IT Contingency Plan
150
IV
Initialization Vector
151
KDC
Key Distribution Center
152
KEK
Key Encryption Key
153
L2TP
Layer 2 Tunneling Protocol
154
LAN
Local Area Network
155
LDAP
Lightweight Directory Access Protocol
156
LEAP
Lightweight Extensible Authentication Protocol
157
MaaS
Monitoring as a Service
158
MAC
Media Access Control
159
MAM
Mobile Application Management
160
MAN
Metropolitan Area Network
161
MBR
Master Boot Record
162
MD5
Message Digest 5
163
MDF
Main Distribution Frame
164
MDM
Mobile Device Management
165
MFA
Multifactor Authentication
166
MFD
Multifunction Device
167
MFP
Multifunction Printer
168
ML
Machine Learning
169
MMS
Multimedia Message Service
170
MOA
Memorandum of Agreement
171
MOU
Memorandum of Understanding
172
MPLS
Multiprotocol Label Switching
173
MSA
Measurement Systems Analysis
174
MS-CHAP
Microsoft Challenge-Handshake Authentication Protocol
175
MSP
Managed Service Provider
176
MSSP
Managed Security Service Provider
177
MTBF
Mean Time Between Failures
178
MTTF
Mean Time to Failure
179
MTTR
Mean Time to Repair
180
MTU
Maximum Transmission Unit
181
NAC
Network Access Control
182
NAS
Network-attached Storage
183
NAT
Network Address Translation
184
NDA
Non-disclosure Agreement
185
NFC
Near-field Communication
186
NFV
Network Function Virtualization
187
NGFW
Next-generation Firewall
188
NG-SWG
Next-generation Secure Web Gateway
189
NIC
Network Interface Card
190
NIDS
Network-based Intrusion Detection System
191
NIPS
Network-based Intrusion Prevention System
192
NIST
National Institute of Standards & Technology
193
NOC
Network Operations Center
194
NTFS
New Technology File System
195
NTLM
New Technology LAN Manager
196
NTP
Network Time Protocol
197
OCSP
Online Certificate Status Protocol
198
OID
Object Identifier
199
OS
Operating System
200
OSI
Open Systems Interconnection
201
OSINT
Open-source Intelligence
202
OSPF
Open Shortest Path First
203
OT
Operational Technology
204
OTA
Over-The-Air
205
OTG
On-The-Go
206
OVAL
Open Vulnerability and Assessment Language
207
OWASP
Open Web Application Security Project
208
P12
PKCS #12
209
P2P
Peer-to-Peer
210
PaaS
Platform as a Service
211
PAC
Proxy Auto Configuration
212
PAM (2 answers)
Pluggable Authentication Modules Privileged Access Management
213
PAP
Password Authentication Protocol
214
PAT
Port Address Translation
215
PBKDF2
Password-based Key Derivation Function 2
216
PBX
Private Branch Exchange
217
PCAP
Packet Capture
218
PCI DDS
Payment Card Industry Data Security Standard
219
PDU
Power Distribution Unit
220
PE
Portable Executable
221
PEAP
Protected Extensible Authentication Protocol
222
PED
Portable Electronic Device
223
PEM
Privacy Enhanced Mail
224
PFS
Perfect Forward Secrecy
225
PGP
Pretty Good Privacy
226
PHI
Personal Health Information
227
PII
Personally Identifiable Information
228
PIN
Personal Identification Number
229
PIV
Personal Identity Verification
230
PKCS
Public Key Cryptography Standards
231
PKI
Public Key Infrastructure
232
PoC
Proof of Concept
233
POP
Post Office Protocol
234
POTS
Plain Old Telephone Service
235
PPP
Point-to-Point Protocol
236
PPTP
Point-to-Point Tunneling Protocol
237
PSK
Preshared Key
238
PTZ
Pan-Tilt-Zoom
239
PUP
Potentially Unwanted Program
240
QA
Quality Assurance
241
QoS
Quality of Service
242
RA
Registration Authority
243
RAD
Rapid Application Development
244
RADIUS
Remote Authentication Dial-in User Service
245
RAID
Redundant Array of Inexpensive Disks
246
RAM
Random Access Memory
247
RAS
Remote Access Server
248
RAT
Remote Access Trojan
249
RC4
Rivest Cipher version 4
250
RCS
Rich Communication Services
251
RFC
Request for Comments
252
RFID
Radio Frequency Identification
253
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
254
ROI
Return on Investment
255
RPO
Recovery Point Objective
256
RSA
Rivest Shamir & Adleman
257
RTBH
Remotely Triggered Black Hole
258
RTO
Recovery Time Objective
259
RTOS
Real-time Operating System
260
RTP
Real-time Transport Protocol
261
SaaS
Software as a Service
262
SAE
Simultaneous Authentication of Equals
263
SAML
Security Assertions Markup Language
264
SCADA
Supervisory Control and Data Acquisition
265
SCAP
Security Content Automation Protocol
266
SCEP
Simple Certificate Enrollment Protocol
267
SDK
Software Development Kit
268
SDLC
Software Development Life Cycle
269
SDLM
Software Development Life-cycle Methodology
270
SDN
Software-defined Networking
271
SDP
Service Delivery Platform
272
SDV
Software-defined Visibility
273
SED
Self-Encrypting Drives
274
SEH
Structured Exception Handling
275
SFTP
SSH File Transfer Protocol
276
SHA
Secure Hashing Algorithm
277
SIEM
Security Information and Event Management
278
SIM
Subscriber Identity Module
279
SIP
Session Initiation Protocol
280
SLA
Service-level Agreement
281
SLE
Single Loss Expectancy
282
SMB
Server Message Block
283
S/MIME
Secure/Multipurpose Internet Mail Extensions
284
SMS
Short Message Service
285
SMTP
Simple Mail Transfer Protocol
286
SMTPS
Simple Mail Transfer Protocol Secure
287
SNMP
Simple Network Management Protocol
288
SOAP
Simple Object Access Protocol
289
SOAR
Security Orchestration Automation Response
290
SoC
System on Chip
291
SOC
Security Operations Center
292
SPF
Sender Policy Framework
293
SPIM
Spam over Instant Messaging
294
SQL
Structured Query Language
295
SQLi
SQL Injection
296
SRTP
Secure Real-time Transport Protocol
297
SSD
Solid State Drive
298
SSH
Secure Shell
299
SSID
Service Set Identifier
300
SSL
Secure Sockets Layer
301
SSO
Single Sign-on
302
STIX
Structured Threat Information eXpression
303
STP
Shielded Twisted Pair
304
SWG
Secure Web Gateway
305
TACACS+
Terminal Access Controller Access Control System
306
TAXII
Trusted Automated eXchange of Intelligence Information
307
TCP/IP
Transmission Control Protocol/Internet Protocol
308
TGT
Ticket Granting Ticket
309
TKIP
Temporal Key Integrity Protocol
310
TLS
Transport Layer Security
311
TOTP
Time-based One Time Password
312
TPM
Trusted Platform Module
313
TSIG
Transaction Signature
314
TTP
Tactics Techniques and Procedures
315
UAT
User Acceptance Testing
316
UDP
User Datagram Protocol
317
UEBA
User and Entity Behavior Analytics
318
UEFI
Unified Extensible Firmware Interface
319
UEM
Unified Endpoint Management
320
UPS
Uninterruptible Power Supply
321
URI
Uniform Resource Identifier
322
URL
Universal Resource Locator
323
USB
Universal Serial Bus
324
USB OTG
USB On-The-Go
325
UTM
Unified Threat Management
326
UTP
Unshielded Twisted Pair
327
VBA
Visual Basic for Applications
328
VDE
Virtual Desktop Environment
329
VDI
Virtual Desktop Infrastructure
330
VLAN
Virtual Local Area Network
331
VLSM
Variable-length Subnet Masking
332
VM
Virtual Machine
333
VoIP
Voice over IP
334
VPC
Virtual Private Cloud
335
VPN
Virtual Private Network
336
VTC
Video Teleconferencing
337
WAF
Web Application Firewall
338
WAP
Wireless Access Point
339
WEP
Wired Equivalent Privacy
340
WIDS
Wireless Intrusion Detection System
341
WIPS
Wireless Intrusion Prevention System
341
WORM
Write Once Read Many
342
WPA
WiFi Protected Access
343
WPS
WiFi Protected Setup
344
XaaS
Anything as a Service
345
XML
Extensible Markup Language
346
XOR
Exclusive OR
347
XSRF
Cross-site Request Forgery
348
XSS
Cross-site Scripting