Acronyms Flashcards

(175 cards)

1
Q

AE

A

Authenticated Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AK

A

Authentication Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ASA

A

Adaptive Security Appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AVT

A

Advanced Volatile Threat`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BCP

A

Business Continuity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

C2 or C&C

A

Command and Control

Refers to the communication channel used by attackers to remotely control compromised systems within a network. It allows threat actors to issue commands, exfiltrate data, and coordinate malicious activities like botnet attacks.

It’s basically the evil HQ radio line to their army of hacked machines. 📡💀💻

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CHAP

A

Challenge-Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CIA

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CIO

A

Chief Information Officer

A company officer with the primary responsibility of managing information technology assets and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CIRT / CSIRT / CERT

A

Computer Incident Response Team
Computer Security Incident Response Team
Computer Emergency Response Team

Team with responsibility for incident response. The CSIRT must have expertise across a number of business domains (IT, HR, legal, and marketing, for instance).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CSO

A

Chief Security Officer

Typically, the job title of the person with overall responsibility for information assurance and systems security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CTO

A

Chief Technology Officer

A company officer with the primary role of making effective use of new and emerging computing platforms and innovations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DBMS

A

Database Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DDF

A

Data Decryption Field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DEK

A

Data Encryption Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DES

A

Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DevOps

A

Development and Operations

A combination of software development and systems operations, and refers to the practice of integrating one discipline with the other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DevSecOps

A

Development and Security and Operations

A combination of software development, security operations, and systems operations, and refers to the practice of integrating each discipline with the others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DSA

A

Digital Signature Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DRA

A

Data Recovery Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DRP

A

Disaster Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
DSA
Digital Signature Algorithm
26
ECC
Elliptic Curve Cryptography
27
ECDSA
Elliptic Curve Digital Signature Algorithm
28
EFS
Encrypting File System
29
FDE
Full-disk Encryption
30
FEK
File Encryption Key
31
FIPS
Federal Information Processing Standards
32
GPG
GNU Privacy Guard
33
HMAC
Hash-Based Message Authentication Code
34
HSM
Hardware Security Module
35
IDEA
International Data Encryption Algorithm
36
IDS
Intrusion Detection System
37
IPS
Intrusion Prevention System
38
IPsec
Internet Protocol Security
39
ISSO
Information Systems Security Officer Organizational role with technical responsibilities for implementation of security policies, frameworks, and controls.
40
KEK
Key Encryption Key
41
KMIP
Key Management Interoperability Protocol
42
LOC
Low Observable Characteristic
43
MD5
Message-Digest Algorithm #5
44
MEK
Media Encryption Key
45
NTLM
New Technology LAN Manager
46
OTP
One-Time Pad
47
PBKDF2
Password-Based Key Derivation Function 2
48
PCSM
Personal Computer Security Module
49
PGP
Pretty Good Privacy
50
PKCS#1
The Public Key Cryptography Standard #1 (PKCS#1)
51
PKI
Public Key Infrastructure
52
PUP / PUA
Potentially Unwanted Program Potentially Unwanted Application
53
RAT
Remote Access Trojan
54
RC
Rivest's Cipher
55
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
56
RSA
Rivest-Shamir-Adleman
57
SAM
Secure Application Module
58
SED
Self-encrypting Drive
59
SHA
Secure Hash Algorithm
60
SOC
Security Operations Center
61
SQL
Structured Query Language
62
TDE
Transparent Data Encryption
63
TLS
Transport Layer Security
64
TPM
Trusted Platform Module
65
WPA
Wi-Fi Protected Access
66
PKI
Public Key Infrastructure
67
CA
Certificate Authority
68
PKCS
Public Key Cryptography Standards
69
X.509
Digital certificates are based on the X.509 standard approved by the International Telecommunications Union and standardized by the Internet Engineering Task Force ( tools.ietf.org/html/rfc5280 ) The X.509 standard also defines an internet protocol that can be used to determine the validity or state of a certificate. This is called the Online Certificate Status Protocol (OCSP). OCSP can be used to simplify the process of checking whether or not a certificate is valid.
70
OCSP
Online Certificate Status Protocol
71
CRL
Certificate Revocation List
72
CSR
Certificate Signing Request
73
CN
Common Name
74
FQDN
Fully Qualified Domain Name
75
SAN
Subject Alternative Name
76
IAM
Identity and Access Management
77
AAA
Authentication, Authorization, and Accounting
78
PoLP
Principle of Least Privilege
79
MAC
Mandatory Access Control
80
DAC
Discretionary Access Control
81
RBAC
Role Based Access Control
82
ABAC
Attribute Based Access Control
83
UAC
User Account Control
84
SID
Security Identifier
85
GPO
Group Policy Object
86
OU
Organizational Unit
87
IdP
Identity Provider
88
OTP
One Time Password
89
FIDO
Fast Identity Online
90
U2F
Universal 2nd Factor
91
TOTP
Time-based One Time Password
92
HOTP
HMAC-based One Time Password HMAC Hash-based Message Authentication Code
93
HSM
Hardware Security Module
94
SSO
Single Sign-On
95
OIDC
OpenID Connect
96
LSASS
Local Security Authority Subsystem Service
97
SAM
Security Accounts Manager
98
AD
Active Directory
99
NTLM
NT LAN Manager
100
PAM
Pluggable Authentication Module
101
X.500
What LDAP is based on
102
DN
Distinguished Name
103
KDC
Key Distribution Center
104
AS
Authentication Service
105
TGT
Ticket Granting Ticket
106
TGS
Ticket Granting Service
107
CN
Common Name
108
OU
Organizational Unit
109
O
Organization
110
C
Country
111
DC
Domain Component
112
SP
Service Provider
113
SAML
Security Assertion Markup Language
114
XML
eXtensible Markup Language
115
SOAP
Simple Object Access Protocol
116
REST
Representational State Transfer
117
OAuth
Open Authorization
118
JSON
JavaScript Object Notation
119
JWT
JSON Web Token
120
EAPoL
EAP over LAN
121
EAP
Extensible Authentication ProtocoFl
122
FRR
False Rejection Rate
123
FAR
False Acceptance Rate
124
CER
Crossover Error Rate
125
FER
Failure to Enroll Rate
126
ACL
Access Control List
127
ACE
Access Control EntryA
128
DAC
Discretionary Access Control
129
SID
Security IDA
130
DACL
Discretionary Access Control List
131
SACL
System Access Control List
132
SAM
Security Account Manager
133
LSDOU
Local, Site, Domain, and OU The order in which GPOs are applied.
134
PAM
Pluggable Authentication Module
135
SSH
Secure Shell
136
PPTP
Point-to-Point Tunneling Protocol
137
VNC
Virtual Network Computing
138
KDC
Key Distribution Center
139
AS
Authentication Service
140
TGT
Ticket Granting Ticket
141
TGS
Ticket Granting Service
142
SID
Security Identifier
143
SP
Service Provider
144
IdP
Identity Provider
145
SAML
Security Assertion Markup Language
146
SOAP
Simple Object Access Protocol
147
REST
Representational State Transfer
148
OAuth
Open Authorization
149
SPAN
Switched Port Analyzer
150
TAP
Test Access Point
151
WAF
Web Application Firewall
152
UTM
Unified Threat Management
153
AUP
Acceptable Use Policy
154
NIDS
Network Intrusion Detection System
155
NIPS
Network Intrusion Protection System
156
ESP
Encapsulating Security Payload
157
ICV
Integrity Check Value
158
SA
Security Association
159
SD-WAN
Software-Defined Wide Area Network
160
SASE
Secure Access Service Edge
161
IAM
Identity and Access Management
162
SBOM
Software Bill of Materials
163
SCA
Software Composition Analysis
164
NVD
National Vulnerability Database
165
EAP
Extensible Authentication Protocol
166
RADIUS
Remote Authentication Dian-In User Service
167
EAPoL
EAP over LAN
168
DTP
Dynamic Trunking Protocol
169
SCP
Secure Copy Protocol
170
UPnP
Universal Plug and Play
171
PACS
Physical Access Control System
172
OSINT
Open Source Intelligence
173
PII
Personally Identifiable Information
174
HIDS
Host-Based IDS
175
NIDS
Network-Based IDS