Acronyms Flashcards

(322 cards)

1
Q

AAA

A

Authentication, Authorization, and Accounting: Framework for managing user access and maintaining activity logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List: A list of rules used to control network traffic and access to system resources based on permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard: A symmetric encryption algorithm used to secure data with key sizes of 128, 192, or 256 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES-256

A

Advanced Encryption Standard 256-bit: Utilizes a 256-bit key for encrypting data, offering high levels of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AH

A

Authentication Header: Part of the IPsec protocol suite used to authenticate data packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AI

A

Artificial Intelligence: Systems or machines that simulate human intelligence to perform tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AIS

A

Automated Indicator Sharing: CISA’s service that facilitates real-time sharing of cyber threat indicators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy: The expected monetary loss for an asset due to risk over a one-year period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point: Device that allows wireless devices to connect to a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface: A set of protocols and tools for building software and integrating different systems securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat: A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurrence: The estimated frequency at which a threat is expected to occur annually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol: Resolves IP addresses to MAC addresses within a local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization: Security technique that randomly arranges the memory addresses to prevent buffer overflow attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge: A knowledge base developed by MITRE for describing adversary behavior in cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AUP

A

Acceptable Use Policy: Defines how an organization’s IT resources may be used to ensure security and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Authentication

A

Protocol: A method of verifying the identity of a user or device before granting access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AV

A

Antivirus: Software designed to detect, prevent, and remove malicious software from systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BASH

A

Bourne Again Shell: A popular command-line interface and scripting language in Linux environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BCP

A

Business Continuity Planning: Process of creating systems of prevention and recovery to deal with potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BGP

A

Border Gateway Protocol: Routing protocol used to exchange routing information between autonomous systems on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BIA

A

Business Impact Analysis: Process that determines the effects of disruption to business operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BIOS

A

Basic Input/Output System: Firmware that initializes hardware during the booting process of a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BPA

A

Business Partners Agreement: A legal agreement outlining responsibilities and obligations between business partners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BPDU
Bridge Protocol Data Unit: Used in network switching to prevent loops in the spanning tree protocol.
26
BYOD
Bring Your Own Device: Policy allowing employees to use personal devices for work purposes, increasing security considerations.
27
CA
Certificate Authority: An entity that issues digital certificates to authenticate identities and secure data.
28
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart: A security feature used to distinguish human users from automated bots.
29
CAR
Corrective Action Report: A document that details actions taken to rectify a problem and prevent its recurrence.
30
CASB
Cloud Access Security Broker: A software tool that provides visibility and control over data and threats across cloud services.
31
CBC
Cipher Block Chaining: A mode of encryption where each plaintext block is XORed with the previous ciphertext block before being encrypted.
32
CCMP
Counter Mode/CBC-MAC Protocol: A security protocol used in WPA2 to ensure confidentiality, integrity, and authenticity of wireless communications.
33
CCTV
Closed-circuit Television: A surveillance system used to monitor and record activities in specific areas.
34
CERT
Computer Emergency Response Team: A team that handles and responds to cybersecurity incidents to mitigate damage and recover operations.
35
CFB
Cipher Feedback: A mode of operation for block ciphers that allows data to be encrypted in units smaller than the block size.
36
CHAP
Challenge Handshake Authentication Protocol: An authentication scheme that uses a challenge-response mechanism to verify the identity of a user.
37
CIA
Confidentiality, Integrity, Availability: The three core principles of cybersecurity, focusing on protecting data from unauthorized access, alteration, and ensuring availability.
38
CIO
Chief Information Officer: An executive responsible for the management, implementation, and usability of information and computer technologies.
39
CIRT
Computer Incident Response Team: A group tasked with identifying, analyzing, and responding to cybersecurity incidents.
40
CMS
Content Management System: A software application used to create, manage, and modify digital content.
41
COOP
Continuity of Operation Planning: Planning that ensures critical business operations continue during and after significant disruptions.
42
COPE
Corporate Owned, Personally Enabled: A policy where businesses provide devices to employees that they can use for both work and personal tasks.
43
CP
Contingency Planning: The process of preparing for unexpected adverse events to ensure business continuity.
44
CRC
Cyclical Redundancy Check: A method of verifying data integrity by detecting accidental changes to raw data.
45
CRL
Certificate Revocation List: A list of digital certificates that have been revoked by the certificate authority before their expiration date.
46
CSO
Chief Security Officer: The executive responsible for the security of an organization's personnel, physical assets, and information systems.
47
CSP
Cloud Service Provider: A company that offers cloud computing services such as servers, storage, databases, networking, and software.
48
CSR
Certificate Signing Request: A message sent from an applicant to a Certificate Authority to apply for a digital identity certificate.
49
CSRF
Cross-site Request Forgery: A type of attack where unauthorized commands are transmitted from a user that the web application trusts.
50
CSU
Channel Service Unit: A device used in telecommunications to connect a digital circuit to a data terminal equipment (DTE).
51
CTM
Counter Mode: An encryption mode that turns a block cipher into a stream cipher for processing data.
52
CTO
Chief Technology Officer: An executive responsible for an organization's technological development and innovation strategies.
53
CVE
Common Vulnerability Enumeration: A reference system used to identify and classify publicly known cybersecurity vulnerabilities.
54
CVSS
Common Vulnerability Scoring System: A standardized framework for rating the severity of security vulnerabilities in software.
55
CYOD
Choose Your Own Device: A policy allowing employees to select and use devices from an approved list for work purposes.
56
DAC
Discretionary Access Control: A type of access control where the owner of the resource determines who can access and modify it.
57
DBA
Database Administrator: A professional responsible for the installation, configuration, upgrade, administration, monitoring, and maintenance of databases.
58
DDoS
Distributed Denial of Service: An attack that overwhelms a target system with massive traffic from multiple sources to disrupt normal service.
59
DEP
Data Execution Prevention: A security feature that prevents code from being run in certain areas of memory to prevent exploits.
60
DES
Digital Encryption Standard: An older symmetric-key algorithm for encrypting digital data.
61
DHCP
Dynamic Host Configuration Protocol: A network management protocol used to automate the process of configuring devices on IP networks.
62
DSA
Digital Signature Algorithm: A standard for digital signatures to ensure data integrity and authenticity.
63
DSL
Digital Subscriber Line: A technology for high-speed internet access using traditional telephone lines.
64
EAP
Extensible Authentication Protocol: A framework frequently used in wireless networks for authentication.
65
ECB
Electronic Code Book: A simple mode of operation for block ciphers that encrypts each block of data independently.
66
ECC
Elliptic Curve Cryptography: An approach to public-key cryptography based on the algebraic structure of elliptic curves.
67
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral: A key exchange protocol that uses elliptic curve cryptography and ephemeral keys.
68
ECDSA
Elliptic Curve Digital Signature Algorithm: A digital signature algorithm that uses elliptic curve cryptography.
69
EDR
Endpoint Detection and Response: Security solutions focused on detecting and responding to threats on endpoint devices.
70
EFS
Encrypted File System: A Microsoft feature that provides filesystem-level encryption.
71
ERP
Enterprise Resource Planning: Integrated management systems for business processes using software and technology.
72
ESN
Electronic Serial Number: A unique identifier embedded in mobile devices for identification and tracking.
73
ESP
Encapsulated Security Payload: A component of the IPsec suite used to provide encryption and authentication for IP packets.
74
FACL
File System Access Control List: A list specifying the permissions attached to an object in a file system.
75
FDE
Full Disk Encryption: A method of encrypting all data on a disk to prevent unauthorized access.
76
FIM
File Integrity Management: A security process that ensures files have not been altered or corrupted.
77
FPGA
Field Programmable Gate Array: An integrated circuit designed to be configured by a customer after manufacturing.
78
FRR
False Rejection Rate: The rate at which a biometric system incorrectly rejects authorized users.
79
FTP
File Transfer Protocol: A standard network protocol used to transfer files from one host to another over TCP.
80
FTPS
File Transfer Protocol Secure: An extension of FTP that adds support for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols.
81
GCM
Galois Counter Mode: A mode of operation for symmetric key cryptographic block ciphers that provides both data confidentiality and authenticity.
82
GDPR
General Data Protection Regulation: A regulation in EU law on data protection and privacy.
83
GPG
Gnu Privacy Guard: A free software for encryption and signing data and communications.
84
GPO
Group Policy Object: A feature of Windows that controls the working environment of user accounts and computer accounts.
85
GPS
Global Positioning System: A satellite-based navigation system providing geolocation and time information.
86
GPU
Graphics Processing Unit: A specialized processor designed to accelerate graphics rendering.
87
GRE
Generic Routing Encapsulation: A tunneling protocol that encapsulates a wide variety of network layer protocols.
88
HA
High Availability: Systems or components that are continuously operational for a desirably long length of time.
89
HDD
Hard Disk Drive: A data storage device used for storing and retrieving digital information.
90
HIDS
Host-based Intrusion Detection System: A system that monitors and analyzes the internals of a computing system as well as the network packets on its interfaces.
91
HIPS
Host-based Intrusion Prevention System: A security solution that monitors and prevents malicious activity on individual host systems.
92
HMAC
Hashed Message Authentication Code: A type of message authentication code involving a cryptographic hash function and a secret key to verify data integrity and authenticity.
93
HOTP
HMAC-based One-time Password: A one-time password algorithm based on HMAC that is event-based and changes with each authentication attempt.
94
HSM
Hardware Security Module: A physical device that safeguards and manages digital keys for strong authentication and cryptographic processing.
95
HTML
Hypertext Markup Language: The standard markup language used for creating and structuring web pages.
96
HTTP
Hypertext Transfer Protocol: The protocol used for transmitting web pages over the internet.
97
HTTPS
Hypertext Transfer Protocol Secure: An extension of HTTP that uses TLS (Transport Layer Security) to encrypt data transmitted over the internet.
98
HVAC
Heating, Ventilation, and Air Conditioning: Systems that regulate environmental comfort in buildings and server rooms.
99
IaaS
Infrastructure as a Service: A cloud computing service model that provides virtualized computing resources over the internet.
100
IaC
Infrastructure as Code: The process of managing and provisioning computing infrastructure through machine-readable definition files.
101
IAM
Identity and Access Management: A framework of policies and technologies to ensure that the right individuals access the right resources at the right times.
102
ICMP
Internet Control Message Protocol: A network protocol used for sending error messages and operational information, commonly used in ping operations.
103
ICS
Industrial Control Systems: Systems used to control industrial processes, including SCADA systems and distributed control systems.
104
IDEA
International Data Encryption Algorithm: A symmetric encryption algorithm used for securing data.
105
IDF
Intermediate Distribution Frame: A cable rack that interconnects and manages telecommunications wiring between an MDF and workstations.
106
IdP
Identity Provider: A system that creates, maintains, and manages identity information and provides authentication services to applications.
107
IDS
Intrusion Detection System: A system that monitors network or system activities for malicious activities or policy violations.
108
IEEE
Institute of Electrical and Electronics Engineers: A professional association that develops standards for electronics and electrical engineering.
109
IKE
Internet Key Exchange: A protocol used to set up a secure, authenticated communications channel within IPsec.
110
IM
Instant Messaging: Real-time communication between two or more people over a network.
111
IMAP
Internet Message Access Protocol: A protocol used by email clients to retrieve messages from a mail server.
112
IoC
Indicators of Compromise: Pieces of forensic data that identify potentially malicious activity on a system or network.
113
IoT
Internet of Things: A network of interconnected devices that can collect and exchange data.
114
IP
Internet Protocol: The set of rules governing the format of data sent over the internet or local network.
115
IPS
Intrusion Prevention System: A network security solution that identifies and blocks potential threats in real-time.
116
IPSec
Internet Protocol Security: A suite of protocols designed to secure IP communications by authenticating and encrypting each IP packet.
117
IR
Incident Response: The process of managing and addressing a security breach or cyberattack.
118
IRC
Internet Relay Chat: A protocol for real-time text communication over the internet.
119
IRP
Incident Response Plan: A set of procedures designed to help organizations detect, respond to, and recover from security incidents.
120
ISO
International Standards Organization: An independent organization that develops and publishes international standards.
121
ISP
Internet Service Provider: A company that provides individuals and organizations with access to the internet.
122
ISSO
Information Systems Security Officer: A role responsible for ensuring the security of information systems within an organization.
123
IV
Initialization Vector: A random value used in cryptography to ensure distinct encryption results for identical plaintexts.
124
KDC
Key Distribution Center: A part of Kerberos authentication that issues ticket-granting tickets for secure communications.
125
KEK
Key Encryption Key: A key used to encrypt and protect other cryptographic keys.
126
L2TP
Layer 2 Tunneling Protocol: A tunneling protocol used to support VPNs by encapsulating data for secure transmission.
127
LAN
Local Area Network: A network that connects devices within a limited geographic area such as a home or office.
128
LDAP
Lightweight Directory Access Protocol: A protocol used to access and maintain distributed directory information services over an IP network.
129
LEAP
Lightweight Extensible Authentication Protocol: A Cisco proprietary EAP authentication protocol used in wireless networks.
130
MaaS
Monitoring as a Service: A cloud service model that provides monitoring capabilities for IT systems and infrastructure.
131
MAC
Message Authentication Code: A short piece of information used to authenticate a message and provide integrity and authenticity assurances.
132
MAN
Metropolitan Area Network: A network that connects users and resources in a geographic area larger than a LAN but smaller than a WAN.
133
MBR
Master Boot Record: The first sector of a storage device that contains boot information and partition tables.
134
MD5
Message Digest 5: A cryptographic hash function used for data integrity verification, now considered weak against collision attacks.
135
MDF
Main Distribution Frame: A central point in a telecommunications system where external lines connect to internal networks.
136
MDM
Mobile Device Management: A security framework for managing and securing mobile devices within an organization.
137
MFA
Multifactor Authentication: A security process that requires multiple forms of verification to authenticate a user.
138
MFD
Multifunction Device: A single device that performs multiple functions, such as printing, scanning, copying, and faxing.
139
MFP
Multifunction Printer: A printer that includes additional features like scanning, copying, and faxing.
140
ML
Machine Learning: A branch of artificial intelligence focused on developing algorithms that allow computers to learn from and make predictions based on data.
141
MMS
Multimedia Message Service: A service that allows sending multimedia content such as images, audio, and video over mobile networks.
142
MOA
Memorandum of Agreement: A formal agreement between two or more parties detailing responsibilities and expectations.
143
MOU
Memorandum of Understanding: A non-binding agreement that outlines the intent and responsibilities of the involved parties.
144
MPLS
Multi-protocol Label Switching: A routing technique that directs data from one node to another using short path labels rather than long network addresses.
145
MS-CHAP
Microsoft Challenge-Handshake Authentication Protocol: A Microsoft proprietary protocol used for authenticating remote users.
146
MSA
Master Service Agreement: A contract that outlines the terms and conditions of future transactions or agreements between two parties.
147
MSP
Managed Service Provider: A company that remotely manages a customer's IT infrastructure and end-user systems.
148
MSSP
Managed Security Service Provider: A provider that offers outsourced monitoring and management of security systems and devices.
149
MTBF
Mean Time Between Failures: The average time expected between equipment failures in a system.
150
MTTF
Mean Time to Failure: The average time a non-repairable system operates before failing.
151
MTTR
Mean Time to Recover: The average time required to repair and restore a system or device after a failure.
152
MTU
Maximum Transmission Unit: The largest size of a packet that can be transmitted over a network medium.
153
NAC
Network Access Control: A security solution that controls access to networks by enforcing security policies.
154
NAT
Network Address Translation: A method of remapping one IP address space into another by modifying network address information.
155
NDA
Non-disclosure Agreement: A legally binding contract establishing confidentiality between parties to protect sensitive information.
156
NFC
Near Field Communication: A short-range wireless communication technology used for contactless data exchange.
157
NGFW
Next-generation Firewall: An advanced firewall that provides deeper inspection capabilities by integrating additional security features like application awareness and intrusion prevention.
158
NIDS
Network-based Intrusion Detection System: A system that monitors network traffic for suspicious activity and potential threats.
159
NIPS
Network-based Intrusion Prevention System: A system designed to monitor network traffic and actively block identified threats.
160
NIST
National Institute of Standards & Technology: A U.S. federal agency that develops and promotes measurement standards, including cybersecurity frameworks.
161
NTFS
New Technology File System: A proprietary file system developed by Microsoft for Windows that supports security, large volumes, and file permissions.
162
NTLM
New Technology LAN Manager: A suite of Microsoft security protocols intended to provide authentication, integrity, and confidentiality.
163
NTP
Network Time Protocol: A protocol used to synchronize the clocks of computers over a network.
164
OAUTH
Open Authorization: An open standard for token-based authorization that allows third-party services to access user information without sharing passwords.
165
OCSP
Online Certificate Status Protocol: A protocol used to check the revocation status of digital certificates in real-time.
166
OID
Object Identifier: A globally unique identifier used to name an object, often used in certificates and protocols.
167
OS
Operating System: Software that manages computer hardware, software resources, and provides common services for computer programs.
168
OSINT
Open-source Intelligence: The collection and analysis of publicly available information for intelligence purposes.
169
OSPF
Open Shortest Path First: A link-state routing protocol used for routing internet protocol (IP) packets within a single routing domain.
170
OT
Operational Technology: Hardware and software that detects or causes changes through direct monitoring and control of industrial equipment.
171
OTA
Over the Air: A method of distributing software updates, configurations, or patches wirelessly.
172
OVAL
Open Vulnerability Assessment Language: An international standard for encoding security information.
173
P12
PKCS #12: A binary format for storing a private key with the associated public key certificate.
174
P2P
Peer to Peer: A decentralized communications model in which each party has equal privileges and can initiate a communication session.
175
PaaS
Platform as a Service: A cloud computing service model that provides a platform allowing customers to develop, run, and manage applications.
176
PAC
Proxy Auto Configuration: A file that enables web browsers to automatically choose the appropriate proxy server for fetching a URL.
177
PAM
Pluggable Authentication Modules: A mechanism to integrate multiple low-level authentication schemes into a high-level API.
178
PAP
Password Authentication Protocol: A simple authentication protocol where usernames and passwords are sent in plaintext.
179
PAT
Port Address Translation: A type of NAT that translates multiple private IP addresses to a single public IP address by using different ports.
180
PBKDF2
Password-based Key Derivation Function 2: A key derivation function that applies a pseudorandom function to derive a secure cryptographic key from a password.
181
PBX
Private Branch Exchange: A private telephone network used within an organization.
182
PCAP
Packet Capture: A file format used to capture and record network packet data for analysis.
183
PCI DSS
Payment Card Industry Data Security Standard: A set of security standards designed to ensure that all companies processing credit card information maintain a secure environment.
184
PDU
Power Distribution Unit: A device designed to distribute electric power to multiple devices within a data center or server rack.
185
PEAP
Protected Extensible Authentication Protocol: A version of EAP that encapsulates the EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel.
186
PED
Personal Electronic Device: A portable device such as smartphones, tablets, or laptops.
187
PEM
Privacy Enhanced Mail: A base64 encoded format for storing and sending cryptographic keys, certificates, and data.
188
PFS
Perfect Forward Secrecy: A property of secure communication protocols ensuring that session keys are not compromised even if the private key is compromised.
189
PGP
Pretty Good Privacy: An encryption program used for securing emails and files.
190
PHI
Personal Health Information: Any information about health status, provision of healthcare, or payment for healthcare that can be linked to an individual.
191
PII
Personally Identifiable Information: Information that can be used to identify an individual, such as name, address, or Social Security number.
192
PIV
Personal Identity Verification: A U.S. federal government standard for secure identity verification.
193
PKCS
Public Key Cryptography Standards: A set of standards for public-key cryptography developed by RSA Security.
194
PKI
Public Key Infrastructure: A framework for managing digital certificates and public-key encryption.
195
POP
Post Office Protocol: A protocol used by email clients to retrieve emails from a server.
196
POTS
Plain Old Telephone Service: The traditional analog telephone service.
197
PPP
Point-to-Point Protocol: A data link protocol commonly used to establish a direct connection between two networking nodes.
198
PPTP
Point-to-Point Tunneling Protocol: A method for implementing virtual private networks (VPNs).
199
PSK
Pre-shared Key: A shared secret used for authentication in wireless networks and VPNs.
200
PTZ
Pan-Tilt-Zoom: A feature of cameras that allows remote control of movement and zoom functions.
201
PUP
Potentially Unwanted Program: Software that may be unwanted despite being installed with consent, often bundled with other software.
202
RA
Registration Authority: An entity responsible for accepting requests for digital certificates and authenticating the entity making the request.
203
RACE
Research and Development in Advanced Communications Technologies in Europe: A European program focused on the development of advanced communication technologies.
204
RAD
Rapid Application Development: A software development methodology that emphasizes quick development and iteration of prototypes.
205
RADIUS
Remote Authentication Dial-in User Service: A protocol for providing centralized Authentication, Authorization, and Accounting (AAA) for users accessing a network.
206
RAID
Redundant Array of Inexpensive Disks: A data storage virtualization technology that combines multiple physical disk drives into one unit for redundancy or performance.
207
RAS
Remote Access Server: A server that provides access to an internal network from a remote location.
208
RAT
Remote Access Trojan: A type of malware that allows attackers to remotely control an infected system.
209
RBAC
Role-based Access Control: An approach to restricting system access based on the roles of individual users within an organization.
210
RC4
Rivest Cipher version 4: A stream cipher once widely used in protocols like SSL but now considered insecure.
211
RDP
Remote Desktop Protocol: A Microsoft protocol that allows remote connection to another computer over a network.
212
RFID
Radio Frequency Identifier: A technology that uses electromagnetic fields to automatically identify and track tags attached to objects.
213
RIPEMD
RACE Integrity Primitives Evaluation Message Digest: A family of cryptographic hash functions developed as an alternative to MD5 and SHA.
214
ROI
Return on Investment: A performance measure used to evaluate the efficiency or profitability of an investment.
215
RPO
Recovery Point Objective: The maximum tolerable period in which data might be lost due to a major incident.
216
RSA
Rivest, Shamir, & Adleman: A widely used public-key cryptographic algorithm for secure data transmission.
217
RTBH
Remotely Triggered Black Hole: A technique for mitigating distributed denial-of-service (DDoS) attacks by dropping traffic at a network's edge.
218
RTO
Recovery Time Objective: The maximum acceptable length of time that a system can be offline after a failure.
219
RTOS
Real-time Operating System: An operating system intended to serve real-time applications that process data as it comes in.
220
RTP
Real-time Transport Protocol: A network protocol for delivering audio and video over IP networks.
221
S/MIME
Secure/Multipurpose Internet Mail Extensions: A standard for public key encryption and signing of MIME data.
222
SaaS
Software as a Service: A cloud computing service model where applications are provided over the internet.
223
SAE
Simultaneous Authentication of Equals: An authentication method used in WPA3 for enhanced Wi-Fi security.
224
SAML
Security Assertions Markup Language: An open standard for exchanging authentication and authorization data between parties.
225
SAN
Subject Alternative Name: An extension to an X.509 certificate that allows multiple domain names to be protected by a single certificate.
226
SASE
Secure Access Service Edge: A cloud-based architecture that combines networking and security services.
227
SCADA
Supervisory Control and Data Acquisition: Systems used for remote monitoring and control of industrial processes.
228
SCAP
Security Content Automation Protocol: A method for automating vulnerability management and policy compliance evaluation.
229
SCEP
Simple Certificate Enrollment Protocol: A protocol that simplifies certificate issuance for large-scale systems.
230
SD-WAN
Software-defined Wide Area Network: A virtual WAN architecture that allows enterprises to securely connect users to applications.
231
SDK
Software Development Kit: A set of tools and libraries for developing software applications for a specific platform.
232
SDLC
Software Development Lifecycle: The process of developing software through stages like planning, development, testing, and maintenance.
233
SDLM
Software Development Lifecycle Methodology: The framework or approach used to define and manage the SDLC process.
234
SDN
Software-defined Networking: A network architecture approach that enables programmable network configurations.
235
SE Linux
Security-enhanced Linux: A Linux kernel security module that provides a mechanism for supporting access control security policies.
236
SED
Self-encrypting Drives: Storage devices with built-in encryption capabilities to protect data at rest.
237
SEH
Structured Exception Handler: A mechanism in Windows for handling exceptions or errors that occur during program execution.
238
SFTP
Secured File Transfer Protocol: A secure version of FTP that uses SSH for encryption.
239
SHA
Secure Hashing Algorithm: A family of cryptographic hash functions used to ensure data integrity.
240
SHTTP
Secure Hypertext Transfer Protocol: An obsolete protocol for encrypting individual messages sent over HTTP.
241
SIEM
Security Information and Event Management: A solution that provides real-time analysis of security alerts generated by network hardware and applications.
242
SIM
Subscriber Identity Module: A smart card used in mobile devices to securely store the subscriber's identity.
243
SLA
Service-level Agreement: A contract between a service provider and a customer that outlines the expected level of service.
244
SLE
Single Loss Expectancy: The monetary loss expected from a single security incident.
245
SMS
Short Message Service: A text messaging service component of most telephone, internet, and mobile device systems.
246
SMTP
Simple Mail Transfer Protocol: The standard protocol for sending email across the internet.
247
SMTPS
Simple Mail Transfer Protocol Secure: A secure version of SMTP using TLS for encryption.
248
SNMP
Simple Network Management Protocol: A protocol used for managing devices on IP networks.
249
SOAP
Simple Object Access Protocol: A protocol for exchanging structured information in web services.
250
SOAR
Security Orchestration, Automation, Response: A solution that automates security operations and incident response.
251
SoC
System on Chip: An integrated circuit that incorporates all components of a computer or other electronic system.
252
SOC
Security Operations Center: A centralized unit that deals with security issues on an organizational and technical level.
253
SOW
Statement of Work: A document that defines the scope of work, deliverables, and timelines for a project.
254
SPF
Sender Policy Framework: An email validation system designed to detect and block email spoofing.
255
SPIM
Spam over Internet Messaging: Unsolicited messages sent over instant messaging platforms.
256
SQL
Structured Query Language: A standard language for managing and manipulating databases.
257
SQLi
SQL Injection: A type of attack that allows execution of malicious SQL statements.
258
SRTP
Secure Real-Time Protocol: A protocol providing encryption, message authentication, and integrity for RTP data.
259
SSD
Solid State Drive: A data storage device that uses flash memory for faster performance compared to traditional HDDs.
260
SSH
Secure Shell: A cryptographic protocol for secure remote login and other secure network services.
261
SSL
Secure Sockets Layer: An outdated protocol for securing data transmission, replaced by TLS.
262
SSO
Single Sign-on: An authentication process that allows a user to access multiple applications with one set of credentials.
263
STIX
Structured Threat Information eXchange: A standardized language for sharing cyber threat intelligence.
264
SWG
Secure Web Gateway: A security solution that protects users from online threats and enforces corporate policies.
265
UPS
Uninterruptable Power Supply: A device that provides emergency power to a load when the main power source fails.
266
URI
Uniform Resource Identifier: A string of characters used to identify a resource on the internet.
267
URL
Universal Resource Locator: A specific type of URI that provides the address of a resource on the internet.
268
USB OTG
USB On the Go: A specification that allows USB devices like smartphones to act as a host, enabling them to connect to other USB devices.
269
UTM
Unified Threat Management: A security solution that integrates multiple security services and features into a single device.
270
UTP
Unshielded Twisted Pair: A type of cable used in networking, consisting of pairs of wires twisted together to reduce electromagnetic interference.
271
VBA
Visual Basic for Applications: A programming language developed by Microsoft for automating tasks in Microsoft Office applications.
272
VDE
Virtual Desktop Environment: An environment where desktop interfaces are hosted on virtual machines and accessed remotely.
273
VDI
Virtual Desktop Infrastructure: A technology that hosts desktop environments on a centralized server and delivers them to end-users over a network.
274
VLAN
Virtual Local Area Network: A logical subdivision of a physical network to group devices for better security and performance.
275
VLSM
Variable Length Subnet Masking: A method of subnetting that allows subnets of variable sizes to be created, optimizing IP address allocation.
276
VM
Virtual Machine: A software emulation of a physical computer that runs an operating system and applications independently.
277
VoIP
Voice over IP: A technology that allows voice communication over internet networks.
278
VPC
Virtual Private Cloud: A private cloud computing environment hosted within a public cloud.
279
VPN
Virtual Private Network: A secure network connection established over a public network to enable secure data transmission.
280
VTC
Video Teleconferencing: A technology that enables two or more locations to communicate via video and audio transmissions.
281
WAF
Web Application Firewall: A security solution that monitors, filters, and blocks malicious HTTP traffic to and from a web application.
282
WAP
Wireless Access Point: A device that allows wireless devices to connect to a wired network.
283
WEP
Wired Equivalent Privacy: A deprecated wireless network security protocol designed to provide a wireless local area network with security comparable to a wired network.
284
WIDS
Wireless Intrusion Detection System: A system designed to detect unauthorized or malicious activity on wireless networks.
285
WIPS
Wireless Intrusion Prevention System: A system that actively monitors and prevents unauthorized or malicious wireless activity.
286
WO
Work Order: A document that provides details about a task or job to be completed.
287
WPA
Wi-Fi Protected Access: A security protocol developed to secure wireless computer networks, improving upon WEP.
288
WPS
Wi-Fi Protected Setup: A network security standard that allows easy establishment of a secure wireless home network.
289
WTLS
Wireless TLS: A security protocol that provides privacy, data integrity, and authentication for wireless communications.
290
XDR
Extended Detection and Response: A security approach that integrates data from multiple security products to improve detection and response.
291
XML
Extensible Markup Language: A markup language used for encoding documents in a format readable by both humans and machines.
292
XOR
Exclusive Or: A logical operation that outputs true only when inputs differ.
293
XSRF
Cross-site Request Forgery: A type of malicious exploit where unauthorized commands are transmitted from a user that the web application trusts.
294
XSS
Cross-site Scripting: A security vulnerability that allows attackers to inject malicious scripts into web content viewed by other users.
295
DNS
Domain Name System - A hierarchical system that translates human-readable domain names (like www.example.com) into IP addresses (like 192.0.2.1).
296
UAT
(User Acceptance Testing) - The final phase of software testing where actual users test the system to ensure it meets their requirements.
297
DPO
(Data Privacy Officer) - An individual responsible for ensuring an organization's data processing complies with privacy laws and regulations.
298
TCP/IP
Transmission Control Protocol/Internet Protocol) - The foundational protocols for the internet that govern how data is transmitted between computers.
299
TPM
Trusted Platform Module) - A hardware chip designed to securely store cryptographic keys, passwords, and digital certificates.
300
TSIG
Transaction Signature) - A security protocol used to authenticate DNS updates and ensure data integrity.
301
TACACS+
Terminal Access Controller Access Control System Plus) - A protocol used for centralized authentication, authorization, and accounting for remote network access.
302
TOTP
Time-based One-time Password) - A temporary password generated based on the current time and a shared secret key, used for two-factor authentication.
303
DNAT
Destination Network Address Translation) - A method used in firewalls to change the destination address of incoming network packets.
304
TAXII
Trusted Automated eXchange of Indicator Information) - A protocol for securely sharing cyber threat intelligence information.
305
UAV
Unmanned Aerial Vehicle) - A drone or aircraft that operates without a human pilot onboard.
306
TKIP
Temporal Key Integrity Protocol) - A deprecated security protocol used in WPA to improve upon the weaknesses of WEP encryption in Wi-Fi networks.
307
TGT
Ticket Granting Ticket) - A ticket used in Kerberos authentication to obtain additional service tickets for accessing network services.
308
DLL
Dynamic Link Library) - A file containing code and data that can be used by multiple programs simultaneously.
309
DMARC
Domain Message Authentication Reporting and Conformance) - An email authentication protocol that helps protect against email spoofing.
310
TOC
Time-of-check) - A security term referring to the time when a system checks a condition, such as user permissions.
311
TOU
Time-of-use) - A pricing model that charges different rates for energy consumption depending on the time of day.
312
UDP
User Datagram Protocol) - A connectionless protocol that allows quick data transmission without error-checking mechanisms, commonly used in streaming and gaming.
313
UEM
Unified Endpoint Management) - A system that provides centralized management of devices like smartphones, laptops, and desktops within an organization.
314
DRP
Disaster Recovery Plan) - A documented strategy outlining how an organization will recover and continue operations after a disaster or major disruption.
315
UEFI
Unified Extensible Firmware Interface) - A modern firmware interface that initializes hardware and passes control to the operating system at startup.
316
DHE
Diffie-Hellman Ephemeral) - A key exchange protocol that uses ephemeral (temporary) keys for each session to enhance security.
317
TLS
Transport Layer Security) - A cryptographic protocol used to secure communications over a computer network.
318
DKIM
DomainKeys Identified Mail) - An email authentication technique that allows the receiver to verify that an email was authorized by the owner of the sending domain.
319
DLP
Data Loss Prevention) - Strategies and tools designed to prevent sensitive data from leaving an organization’s network.
320
PCI
Payment Card Industry Data Security Standard) - A set of security standards designed to ensure companies securely process, store, or transmit credit card information.
321
DoS
Denial of Service) - A cyberattack aimed at making a machine or network resource unavailable to its intended users by overwhelming it with traffic.
322
TTP
Tactics, Techniques, and Procedures) - The behavior and methodologies used by threat actors to achieve their objectives during an attack.