Acronyms Flashcards

(326 cards)

1
Q

MTBF

A

Mean Times Between Failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Advanced Encryption Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES-256

A

Advanced Encryption Standards 256-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AIS

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BPDU
Bridge Protocol Data Unit
26
BYOD
Bring Your Own Device
27
CA
Certificate Authority
28
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
29
CAR
Corrective Action Report
30
CASB
Cloud Access Security Broker
31
CBC
Cipher Block Chaining
32
CCMP
Counter Mode/CBC-MAC Protocol
33
CCTV
Closed-circuit Television
34
CERT
Computer Emergency Response Team
35
CFB
Cipher Feedback
36
CHAP
Challenge Handshake Authentication Protocol
37
CIO
Chief Information Officer
38
CIA
Confidentiality, Integrity, Availability
39
CIRT
Computer Incident Response Team
40
CMS
Content Management System
41
COOP
Continuity of Operation Planning
42
COPE
Corporate Owned, Personally Enabled
43
CP
Contingency Planning
44
CRC
Cyclical Redundancy Check
45
CRL
Certificate Revocation List
46
CSO
Chief Security Officer
47
CSP
Cloud Service Provider
48
CSR
Certificate Signing Request
49
CSRF
Cross-site Request Forgery
50
CSU
Channel Service Unit
51
CTM
Counter Mode
52
CTO
Chief Technology Officer
53
CVE
Common Vulnerability Enumeration
54
CVSS
Common Vulnerability Scoring System
55
CYOD
Choose Your Own Device
56
DAC
Discretionary Access Control
57
DBA
Database Administrator
58
DDoS
Distributed Denial of Service
59
DEP
Data Execution Prevention
60
DES
Digital Encryption Standard
61
DHCP
Dynamic Host Configuration Protocol
62
DHE
Diffie-Hellman Ephemeral
63
DKIM
DomainKeys Identified Mail
64
DLL
Dynamic Link Library
65
DLP
Data Loss Prevention
66
DMARC
Domain Message Authentication Reporting and Conformance
67
DNAT
Destination Network Address Translation
68
DNS
Domain Name System
69
DoS
Denial of Service
70
DPO
Data Privacy Officer
71
DRP
Disaster Recovery Plan
72
DSA
Digital Signature Algorithm
73
DSL
Digital Subscriber Line
74
EAP
Extensible Authentication Protocol
75
ECB
Electronic Code Book
76
ECC
Elliptic Curve Cryptography
77
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
78
ECDSA
Elliptic Curve Digital Signature Algorithm
79
EDR
Endpoint Detection and Response
80
EFS
Encrypted File System
81
ERP
Enterprise Resource Planning
82
ESN
Electronic Serial Number
83
ESP
Encapsulated Security Payload
84
FACL
File System Access Control List
85
FDE
Full Disk Encryption
86
FIM
File Integrity Management
87
FPGA
Field Programmable Gate Array
88
FRR
False Rejection Rate
89
FTP
File Transfer Protocol
90
FTSP
Secured File Transfer Protocol
91
GCM
Galois Counter Mode
92
GDPR
General Data Protection Regulation
93
GPG
Gnu Privacy Guard
94
GPO
Group Policy Object
95
GPS
Global Positioning System
96
GPU
Graphics Processing Unit
97
GRE
Generic Routing Encapsulation
98
HA
High Availability
99
HHD
Hard Disk Drive
100
HIDA
Host-based Intrusion Detection System
101
HIPS
Host-based Intrusion Prevention System
102
HMAC
Hashed Message Authentication Code
103
HOTP
HMAC-based One-time Password
104
HSM
Hardware Security Module
105
HTML
Hypertext Markup Language
106
HTTP
Hypertext Transfer Protocol
107
HTTPS
Hypertext Transfer Protocol Secure
108
HVAC
Heating, Ventilation Air Conditioning
109
IaaS
Infrastructure as a Service
110
IaC
Infrastructure as Code
111
IAM
Identity and Access Management
112
ICMP
Internet Control Message Protocol
113
ICS
Industrial Control Systems
114
IDEA
International Data Encryption Algorithm
115
IDF
Intermediate Distribution Frame
116
IdP
Identity Provider
117
IDS
Intrusion Detection System
118
IEEE
Institute of Electrical and Electronics Engineers
119
IKE
Internet Key Exchange
120
IM
Instant Messaging
121
IMAP
Internet Message Access Protocol
122
IoC
Indicators of Compromise
123
IoT
Internet of Things
124
IP
Internet Protocol
125
IPS
Intrusion Prevention System
126
IPSec
Internet Protocol Security
127
IR
Incident Response
128
IRC
Internet Relay Chat
129
IRP
Incident Response Plan
130
ISO
International Standards Organization
131
ISP
Internet Service Provider
132
ISSO
Information Systems Security Officer
133
IV
Initialization Vector
134
KDC
Key Distribution Center
135
KEK
Key Encryption Key
136
L2TP
Layer 2 Tunneling Protocol
137
LAN
Local Area Network
138
LDAP
Lightweight Directory Access Protocol
139
LEAP
Lightweight Extensible Authentication Protocol
140
MaaS
Monitoring as a Service
141
MAC
1) Mandatory Access Control 2) Media Access Control 3) Message Authentication Code
142
MAN
Metropolitan Area Network
143
MBR
Master Boot Record
144
MD5
Message Digest 5
145
MDF
Main Distribution Frame
146
MDM
Mobile Device Management
147
MFA
Multifactor Authentication
148
MFD
Multifunction Device
149
MFP
Multifunction Printer
150
ML
Machine Learning
151
MMS
Multimedia Message Service
152
MOA
Memorandum of Agreement
153
MOU
Memorandum of Understanding
154
MPLS
Multi-protocol Label Switching
155
MSA
Master Service Agreement
156
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
157
MSP
Managed Service Provider
158
MSSP
Managed Security Service Provider
159
MTBF
Mean Time Between Failures
160
MTTF
Mean Time to Failure
161
MTTR
Mean Time to Recover
162
MTU
Maximum Transmission Unit
163
NAC
Network Access Control
164
NAT
Network Address Translation
165
NDA
Non-disclosure Agreement
166
NFC
Near Field Communication
167
NGFW
Next-generation Firewall
168
NIDS
Network-based Intrusion Detection System
169
NIPS
Network-based Intrusion Prevention System
170
NIST
National Institute of Standards & Technology
171
NTFS
New Technology File System
172
NTLM
New Technology LAN Manager
173
NTP
Network Time Protocol
174
OAUTH
Open Authorization
175
OCSP
Online Certificate Status Protocol
176
OID
Object Identifier
177
OS
Operating System
178
OSINT
Open-source Intelligence
179
OSPF
Open Shortest Path First
180
OT
Operational Technology
181
OTA
Over the Air
182
OVAL
Open Vulnerability Assessment Language
183
P12
PKCS #12
184
P2P
Peer to Peer
185
PaaS
Platform as a Service
186
PAC
Proxy Auto Configuration
187
PAM
1) Privileged Access Management 2) Pluggable Authentication Modules
188
PAP
Password Authentication Protocol
189
PAT
Port Address Translation
190
PBKDF2
Password-based Key Derivation Function 2
191
PBX
Private Branch Exchange
192
PCAP
Packet Capture
193
PCI DSS
Payment Card Industry Data Security Standard
194
PDU
Power Distribution Unit
195
PEAP
Protected Extensible Authentication Protocol
196
PED
Personal Electronic Device
197
PEM
Privacy Enhanced Mail
198
PFS
Perfect Forward Secrecy
199
PGP
Pretty Good Privacy
200
PHI
Personal Health Information
201
PII
Personally Identifiable Information
202
PIV
Personal Identity Verification
203
PKCS
Public Key Cryptography Standards
204
PKI
Public Key Infrastructure
205
POP
Post Office Protocol
206
POTS
Plain Old Telephone Service
207
PPP
Point-to-Point Protocol
208
PPTP
Point-to-Point Tunneling Protocol
209
PSK
Pre-shared Key
210
PTZ
Pan-tilt-zoom
211
PUP
Potentially Unwanted Program
212
RA
Recovery Agent
213
RA
Registration Authority
214
RACE
Research and Development in Advanced Communications Technologies in Europe
215
RAD
Rapid Application Development
216
RADIUS
Remote Authentication Dial-in User Service
217
RAID
Redundant Array of Inexpensive Disks
218
RAS
Remote Access Server
219
RAT
Remote Access Trojan
220
RBAC
Role-based Access Control
221
RBAC
Rule-based Access Control
222
RC4
Rivest Cipher version 4
223
RDP
Remote Desktop Protocol
224
RFID
Radio Frequency Identifier
225
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
226
ROI
Return on Investment
227
RPO
Recovery Point Objective
228
RSA
Rivest, Shamir, & Adleman
229
RTBH
Remotely Triggered Black Hole
230
RTO
Recovery Time Objective
231
RTOS
Real-time Operating System
232
RTP
Real-time Transport Protocol
233
S/MIME
Secure/Multipurpose Internet Mail Extensions
234
SaaS
Software as a Service
235
SAE
Simultaneous Authentication of Equals
236
SAML
Security Assertions Markup Language
237
SAN
1) Storage Area Network 2) Subject Alternative Name
238
SASE
Secure Access Service Edge
239
SCADA
Supervisory Control and Data Acquisition
240
SCAP
Security Content Automation Protocol
241
SCEP
Simple Certificate Enrollment Protocol
242
SD-WAN
Software-defined Wide Area Network
243
SDK
Software Development Kit
244
SDLC
Software Development Lifecycle
245
SDLM
Software Development Lifecycle Methodology
246
SDN
Software-defined Networking
247
SE Linux
Security-enhanced Linux
248
SED
Self-encrypting Drives
249
SEH
Structured Exception Handler
250
SFTP
Secured File Transfer Protocol
251
SHA
Secure Hashing Algorithm
252
SHTTP
Secure Hypertext Transfer Protocol
253
SIEM
Security Information and Event Management
254
SIM
Subscriber Identity Module
255
SLA
Service-level Agreement
256
SLE
Single Loss Expectancy
257
SMS
Short Message Service
258
SMTP
Simple Mail Transfer Protocol
259
SMTPS
Simple Mail Transfer Protocol Secure
260
SNMP
Simple Network Management Protocol
261
SOAP
Simple Object Access Protocol
262
SOAR
Security Orchestration, Automation, Response
263
SoC
System on Chip
264
SOC
Security Operations Center
265
SOW
Statement of Work
266
SPF
Sender Policy Framework
267
SPIM
Spam over Internet Messaging
268
SQL
Structured Query Language
269
SQLi
SQL Injection
270
SRTP
Secure Real-Time Protocol
271
SSD
Solid State Drive
272
SSH
Secure Shell
273
SSL
Secure Sockets Layer
274
SSO
Single Sign-on
275
STIX
Structured Threat Information eXchange
276
SWG
Secure Web Gateway
277
TACACS+
Terminal Access Controller Access Control System
278
TAXII
Trusted Automated eXchange of Indicator Information
279
TCP/IP
Transmission Control Protocol/Internet Protocol
280
TGT
Ticket Granting Ticket
281
TKIP
Temporal Key Integrity Protocol
282
TLS
Transport Layer Security
283
TOC
Time-of-check
284
TOTP
Time-based One-time Password
285
TOU
Time-of-use
286
TPM
Trusted Platform Module
287
TTP
Tactics, Techniques, and Procedures
288
TSIG
Transaction Signature
289
UAT
User Acceptance Testing
290
UAV
Unmanned Aerial Vehicle
291
UDP
User Datagram Protocol
292
UEFI
Unified Extensible Firmware Interface
293
UEM
Unified Endpoint Management
294
UPS
Uninterruptable Power Supply
295
URI
Uniform Resource Identifier
296
URL
Universal Resource Locator
297
USB
Universal Serial Bus
298
USB OTG
USB On the Go
299
UTM
Unified Threat Management
300
UTP
Unshielded Twisted Pair
301
VBA
Visual Basic
302
VDE
Virtual Desktop Environment
303
VDI
Virtual Desktop Infrastructure
304
VLAN
Virtual Local Area Network
305
VLSM
Variable Length Subnet Masking
306
VM
Virtual Machine
307
VoIP
Voice over IP
308
VPC
Virtual Private Cloud
309
VPN
Virtual Private Network
310
VTC
Video Teleconferencing
311
WAF
Web Application Firewall
312
WAP
Wireless Access Point
313
WEP
Wired Equivalent Privacy
314
WIDS
Wireless Intrusion Detection System
315
WIPS
Wireless Intrusion Prevention System
316
WO
Work Order
317
WAP
Wi-Fi Protected Access
318
WPS
Wi-Fi Protected Setup
319
WTLS
Wireless TLS
320
XDR
Extended Detection and Response
321
XML
Extensible Markup Language
322
XOR
Exclusive Or
323
XSRF
Cross-site Request Forgery
324
XSS
Cross-site Scripting
325
PEP
Policy Enforcement Point
326
PDP
Policy Decision Point