Acronyms Flashcards

(132 cards)

1
Q

3DES

A

Triple Data Encryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BEC

A

Business Email Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CAN

A

Controller Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CASB

A

Cloud Access Security Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CI/CD

A

Continuous Integration/Continuous Delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CIS

A

Center for Internet Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

COBIT

A

Control Objectives for Information and Related Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CPU

A

Central Processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CRM

A

Customer Relations Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CVSS

A

Common Vulnerability Scoring System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DDoS

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DGA

A

Domain Generation Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DHCP

A

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DKIM

A

Domain Keys Identified Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
DMARC
Domain-based Message Authentication, Reporting, and Conformance
26
DMZ
Demilitarized Zone
27
DNS
Domain Name System
28
DNSSEC
Domain Name System Security Extensions
29
DOM
Document Object Model
30
DRM
Digital Rights Management
31
EDR
Endpoint Detection and Response
32
ELK
Elasticsearch, Logstash, Kibana
33
ERP
Enterprise Resource Planning
34
FaaS
Function as a Service
35
FPGA
Field-programmable Gate Array
36
FTK
Forensic Toolkit
37
FTP
File Transfer Protocol
38
HIDS
Host Intrusion Detection System
39
HIPS
Host Intrusion Prevention System
40
HSM
Hardware Security Module
41
HTTP
Hypertext Transfer Protocol
42
IaaS
Infrastructure as a Service
43
IaC
Infrastructure as Code
44
ICMP
Internet Control Message Protocol
45
IDS
Intrusion Detection System
46
IMAP
Internet Message Access Protocol
47
IoC
Indicator of Compromise
48
IoT
Internet of Things
49
IP
Internet Protocol
50
IPS
Intrusion Prevention System
51
ISAC
Information Sharing and Analysis Center
52
ISO
International Organization for Standardization
53
ITIL
Information Technology Infrastructure Library
54
LAN
Local Area Network
55
LDAP
Lightweight Directory Access Protocol
56
MaaS
Monitoring as a Service
57
MAC
Mandatory Access Control
58
MD5
Message Digest 5
59
MDM
Mobile Device Management
60
MFA
Multifactor Authentication
61
MOA
Memorandum of Agreemnent
62
MOU
Memorandum of Understanding
63
MRTG
Multi Router Traffic Grapher
64
NAC
Network Access Control
65
NAS
Network-attached Storage
66
NAT
Network Address Translation
67
NDA
Non-disclosure Agreement
68
NIC
Network Interface Card
69
NIDS
Network Intrusion Detection System
70
NIST
National Institute of Standards and Technology
71
OEM
Original Equipment Manafacturer
72
OSSIM
Open Source Security Information Management
73
OVAL
Open Vulnerability and Assessment Language
74
OWASP
Open Web Application Security Project
75
PaaS
Platform as a Service
76
PAM
Pluggable Authentication Module
77
PCAP
Packet Capture
78
PCI
Payment Card industry
79
PHI
Personal Health Information
80
PID
Process Identification Number
81
PII
Personally Identifiable Information
82
PKI
Public Key Infrastructure
83
RADIUS
Remote Authentication Dial-in User Service
84
RDP
Remote Desktop Protocol
85
REST
Representational State Transfer
86
RTOS
Real-time Operating System
87
SaaS
Software as a Service
88
SAML
Security Assertions Markup Language
89
SCADA
Supervisory Control and Data Acquisition
90
SCAP
Security Content Automation Protocol
91
SDLC
Software Development Life Cycle
92
SFTP
SSH File Transfer Protocol
93
SHA
Secure Hash Algorithm
94
SIEM
Security Information and Event Management
95
SLA
Service Level Agreement
96
SMB
Secure Message Block
97
SOAP
Simple Object Access Protocol
98
SOAR
Security Orchestration, Automation, and Response
99
SOC
Security Operations Center
100
SoC
System on Chip
101
SPF
Sender Policy Framework
102
SPI
Sensitive Personal Information
103
SQL
Structured Query Language
104
SSH
Secure Shell
105
SSHD
Solid-state Hybrid Drive
106
SSID
Service Set Identifier
107
SSL
Secure Sockets Layer
108
SSO
Single Sign-On
109
STIX
Structured Threat Information eXpression
110
TACACS+
Terminal Access Controller Access Control System Plus
111
TAXII
Trusted Automated eXchange of Intelligence Information
112
TCP
Transmission Control Protocol
113
TFTP
Trivial File Transfer Protocol
114
TLS
Transport Layer Security
115
TPM
Trusted Platform Module
116
UDP
User Datagram Protocol
117
UEBA
User and Entity Behavior Analytics
118
UEFI
Unified Extensible Firmware Interface
119
UEM
Unified Endpoint Management
120
URL
Uniform Resource Locator
121
USB
Universal Serial Bus
122
UTM
Unified Threat Management
123
VDI
Virtual Desktop Infrastructure
124
VLAN
Virtual Local Area Network
125
VoIP
Voice over Internet Protocol
126
VPC
Virtual Private Cloud
127
VPN
Virtual Private Network
128
WAF
Web Application Firewall
129
WAN
Wide Area Network
130
XML
Extensible Markup Language
131
XSS
Cross-site Scripting
132
ZAP
Zed Attack Proxy