Acronyms Flashcards

(76 cards)

1
Q

AAA

A

Authentication, Authorization, and Accounting (Manages user access & tracks activity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List (Defines what users/systems can access specific resources)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AH

A

Authentication Header (Provides integrity & authentication for IPsec packets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BCP

A

Business Continuity Planning (Strategy for maintaining operations during disruptions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BIOS

A

Basic Input/Output System (Initializes hardware during system startup)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DMZ

A

Demilitarized Zone (A buffer network between internal & external networks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HIDS

A

Host-based Intrusion Detection System (Monitors a single device for threats)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HIPS

A

Host-based Intrusion Prevention System (Prevents threats on a specific device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IDS

A

Intrusion Detection System (Detects suspicious network activity but doesn’t block it)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPS

A

Intrusion Prevention System (Detects & actively blocks threats in real-time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MAC

A

Mandatory Access Control (Strict security model with clearance levels and predefined access rules)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NAC

A

Network Access Control (Manages which devices can connect to a network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NIDS

A

Network-based Intrusion Detection System (Monitors entire network for threats)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NIPS

A

Network-based Intrusion Prevention System (Prevents attacks at the network level)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RBAC

A

Role-based Access Control (Grants access based on user roles)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SED

A

Self-encrypting Drive (Storage device that automatically encrypts data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SIEM

A

Security Information and Event Management (Centralized security log monitoring & analysis)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TPM

A

Trusted Platform Module (Hardware chip for encryption & secure key storage)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

WAF

A

Web Application Firewall (Protects web applications from attacks like SQL injection & XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CERT

A

Computer Emergency Response Team (Handles cybersecurity incidents & responses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CSIRT

A

Computer Security Incident Response Team (Dedicated team for managing security breaches)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DDoS

A

Distributed Denial of Service (Overwhelms a system with excessive traffic)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

EDR

A

Endpoint Detection and Response (Advanced security for detecting & responding to endpoint threats)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

FIM

A

File Integrity Monitoring (Detects unauthorized changes to system files)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
HIDS
Host-based Intrusion Detection System (Monitors individual devices for security threats)
26
IRP
Incident Response Plan (Guidelines for managing security incidents)
27
MDM
Mobile Device Management (Controls & secures mobile devices in a network)
28
MITM
Man-in-the-Middle Attack (Intercepts and manipulates communication between two parties)
29
NIST
National Institute of Standards & Technology (Develops cybersecurity frameworks & guidelines)
30
RAT
Remote Access Trojan (Malware that allows remote control of a victim’s system)
31
SOC
Security Operations Center (Centralized team monitoring security incidents)
32
UEBA
User and Entity Behavior Analytics (Detects unusual behavior patterns for security threats)
33
XSS
Cross-site Scripting (Injects malicious scripts into web applications)
34
XSRF/CSRF
Cross-site Request Forgery (Tricks users into performing unwanted actions on a web app)
35
ARP
Address Resolution Protocol (Maps IP addresses to MAC addresses on a network)
36
DNS
Domain Name System (Translates domain names into IP addresses)
37
DoS
Denial of Service (Disrupts service by overloading a system with requests)
38
HTTPS
Hypertext Transfer Protocol Secure (Encrypted version of HTTP using TLS)
39
ICMP
Internet Control Message Protocol (Used for error reporting & network diagnostics like ping)
40
LAN
Local Area Network (Small network for a specific location like an office or home)
41
MAC
Media Access Control (Unique hardware address for network devices)
42
MFA
Multi-factor Authentication (Requires multiple forms of authentication for access)
43
NAT
Network Address Translation (Translates private IP addresses to public ones for internet access)
44
P2P
Peer-to-Peer (Decentralized network where devices share resources directly)
45
PKI
Public Key Infrastructure (Manages digital certificates & encryption keys)
46
RADIUS
Remote Authentication Dial-in User Service (Provides authentication for network access)
47
TCP/IP
Transmission Control Protocol / Internet Protocol (Standard communication protocol for the internet)
48
UDP
User Datagram Protocol (Faster but connectionless alternative to TCP for data transmission)
49
VLAN
Virtual Local Area Network (Separates network traffic for security & efficiency)
50
VPN
Virtual Private Network (Creates a secure, encrypted connection over the internet)
51
WPA2
WiFi Protected Access 2 (Stronger wireless security than WEP & WPA)
52
AES
Advanced Encryption Standard (Symmetric, Strong, Block cipher)
53
3DES
Triple Data Encryption Standard (Symmetric, Block cipher, legacy)
54
DES
Data Encryption Standard (Symmetric, Block cipher, weak and deprecated)
55
RC4
Rivest Cipher 4 (Symmetric, Stream cipher, insecure)
56
Blowfish
Block cipher (Symmetric, Flexible key length, strong)
57
Twofish
Block cipher (Symmetric, Successor to Blowfish, strong)
58
RSA
Rivest-Shamir-Adleman (Asymmetric, Used for encryption & digital signatures)
59
ECC
Elliptic Curve Cryptography (Asymmetric, Efficient asymmetric encryption)
60
Diffie-Hellman (DH)
Key exchange algorithm (Asymmetric, Doesn’t encrypt data itself)
61
DHE
Diffie-Hellman Ephemeral (Asymmetric, Temporary key for each session)
62
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral (Asymmetric, Stronger version of DHE)
63
MD5
Message Digest Algorithm 5 (128-bit, insecure)
64
SHA-1
Secure Hash Algorithm 1 (160-bit, insecure)
65
SHA-2
Secure Hash Algorithm 2 (256-bit/512-bit, secure)
66
SHA-3
Secure Hash Algorithm 3 (Stronger alternative to SHA-2)
67
HMAC
Hash-based Message Authentication Code (Used for integrity & authentication)
68
PBKDF2
Password-Based Key Derivation Function 2 (Used for password hashing)
69
bcrypt
Key derivation function (Used for password security)
70
TLS
Transport Layer Security (Successor to SSL, encrypts web traffic)
71
SSL
Secure Sockets Layer (Deprecated, replaced by TLS)
72
IPSec
Internet Protocol Security (Encrypts network traffic at the IP layer)
73
L2TP
Layer 2 Tunneling Protocol (Used with IPSec for VPNs)
74
SSH
Secure Shell (Used for secure remote login & file transfers)
75
PGP
Pretty Good Privacy (Used for encrypting emails & files)
76
S/MIME
Secure/Multipurpose Internet Mail Extensions (Email encryption)