Acronyms Flashcards

(74 cards)

1
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APIPA

A

Automatic Private IP Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CIA

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CSMA/CD

A

Carrier Sense Multiple Access with Collision Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CYOD

A

Choose Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DCS

A

Distributed Control System

An industrial automation system. Unlike SCADA, which is remote, DCS is generally local process control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DOCSIS

A

Data Over Cable Service Interface Specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DTLS

A

Datagram Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ESP

A

Encapsulating Security Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

GRE

A

Generic Routing Encapsulation

A tunneling protocol developed by Cisco. It encapsulates Layer 3 packets inside another IP packet. It allows protocols that wouldn’t normally be routable over an IP network to be tunneled. Almost any layer 3 protocol can be encapsulated.

– It is often combined with IPsec –

It does not provide any encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

H.323

A

Not an Acronym!

It’s the standard used for VoIP and video conferencing over IP networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

HDLC

A

High-Level Data Link Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

HMI

A

Human-Machine Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IANA

A

Internet Assigned Numbers Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ICS

A

Industrial Control System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IDS

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IEEE

A

Institute of Electrical and Electronics Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IKE

A

Internet Key Exchange

Two Phases:
Phase 1: Create a secure, authenticated tunnel
– Negotiate encryption and authentication
– Perform Diffie-Hellman to create shared secret
– Authenticate the peers (e.g., digital certs, pre-shared key, etc.)

Phase 2: Establish the IPsec Security Associations
– Agree on which IPsec protocols to use (ESP, AH)
– Set up keys
– Define lifetimes and parameters for the tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IoT

A

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
IPS
Intrusion Prevention System
26
IT
Information Technology
27
L2F
Layer 2 Forwarding Protocol
28
L2TP
Layer 2 Tunneling Protocol
29
MDM
Mobile Device Management
30
MIB
Management Information Base
31
MIMO
Multiple Input Multiple Output
32
MTBF
Mean Time Between Failures
33
MTTR
Mean Time To Recover
34
MTU
Maximum Transmission Unit
35
NAC
Network Access Control
36
NAS
Network Attached Storage
37
OFDM
Orthogonal Frequency-Division Multiplexing
38
OID
Object Identifier
39
AES
Advanced Encryption Standard
40
OT
Operational Technology
41
PDU
Protocol Data Unit
42
PLC
Programmable Logic Controller
43
POTS
Plain Old Telephone Service
44
PPP
Point-to-Point Protocol
45
PPTP
Point-to-Point Tunneling Protocol
46
QoS
Quality of Service
47
RADIUS
Remote Authentication Dial-In User Service
48
RDG
Remote Desktop Gateway
49
RPO
Recovery Point Objective
50
RTO
Recovery Time Objective
51
SAN
Storage Area Network
52
SASE
Secure Access Secure Edge
53
SCADA
Supervisory Control and Data Acquisition SCADA is a system used for remote monitoring and control of industrial processes, often across multiple locations.
54
SIEM
Security Information and Event Management
55
SMF
Single Mode Fiber
56
SOAP
Simple Object Access Protocol
57
SSE
Security Service Edge
58
SSL
Secure Socket Layer
59
STP
Spanning Tree Protocol
60
SQL
Structured Query Language
61
TACACS+
Terminal Access Controller Access Control System Plus
62
TCP
Transport Control Protocol
63
TLS
Transport Layer Security
64
UDP
User Datagram Protocol
65
UPS
Uninterruptible Power Supply
66
VDI
Virtual Desktop Infrastructure
67
VLAN
Virtual Local Area Network
68
NGFW
Next Generation Firewall
69
VNC
Virtual Network Computing
70
VPC
Virtual Private Cloud
71
VPN
Virtual Private Network
72
VXLAN
Virtual Extensible LAN It extends Layer 2 network over a Layer 3 network. Essentially you are creating a VLAN that can exist across different physical locations and even networks! It does this by encapsulating a Layer 2 frame inside a UDP packet. While traditional VLANs are limited to 4,094 (12-bit field; e.g., tag) segments, VXLANs can have 16 million+ segments (24-bit field)
73
IPsec
Internet Protocol Security It takes the original message and encapsulates it within a new, encrypted message. It uses IKE (Internet Key Exchange) to agree on encryption and hashing and establish what's called a Security Association. It also provides for authentication. Transport Mode -- Only the payload (data) is encrypted. The header stays visible. Good for host-to-host. Tunnel Mode -- The entire IP packet is encrypted. Good for VPNs.
74
SA
Security Association