Acronyms Flashcards

(223 cards)

1
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACE

A

Access Control Entries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACV

A

Access Control Vestibule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

GCMP

A

AES Galois Counter Mode Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AEAD

A

Authenticated Encryption with Associated Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annual Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SLE

A

Single Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A-V

A

Antivirus Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RSA

A

Rivest-Shamir-Adleman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ECC

A

Elliptic Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ABAC

A

Attribute-Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BC

A

Business Continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BEC

A

Business Email Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BPA

A

Business Partnership Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CA
Certificate Authority
26
CRL
Certificate Revocation List
27
CSR
Certificate Signing Request
28
CIO
Chief Information Officer
29
CSO
Chief Security Officer
30
CTO
Chief Technology Officer
31
CYOD
Choose Your Own Device
32
CIA Triad
Confidentiality, Integrity, and Availability
33
CSP
Cloud Service Provider
34
C2
Command and Control
35
CN
Common Name
36
CVE
Common Vulnerabilities and Exposures
37
CVSS
Common Vulnerability Scoring System
38
CIRT
Computer Incident Response Team
39
CBT
Computer-Based Training
40
OS
Operating System
41
COOP
Continuity of Operations Plan
42
COBO
Corporate Owned, Business Only
43
COPE
Corporate Owned, Personally Enabled
44
CER
Crossover Error Rate
45
FAR
False Acceptance Rate
46
FRR
False Rejection Rate
47
CSRF
Cross-Site Request Forgery
48
XSS
Cross-Site Scripting
49
CTI
Cyber Threat Intelligence
50
CSF
Cybersecurity Framework
51
DLP
Data Loss Prevention
52
DOS
Denial of Service Attack
53
DH
Diffie-Hellman
54
DR
Disaster Recovery
55
DAC
Discretionary Access Control
56
DN
Distinguished Name
57
DDoS
Distributed Denial-of-Service
58
DRDoS
Distributed Reflected Denial-of-Service
59
DOM
Document Object Model
60
DNSSEC
Domain Name System Security Extensions
61
DNS
Domain Name System
62
DKIM
DomainKeys Identified Mail
63
DMARC
Domain-Based Message Authentication, Reporting, and Conformance
64
ESP
Encapsulating Security Payload
65
EDR
Endpoint Detection and Response
66
ERM
Enterprise Risk Management
67
EF
Exposure Factor
68
EAP
Extensible Authentication Protocol
69
EAPoL
Extensible Authentication Protocol over LAN
70
XML
Extensible Markup Language
71
FIM
File Integrity Monitoring
72
FTP
File Transfer Protocol
73
FTPS
File Transfer Protocol Secure
74
FDE
Full Disk Encryption
75
GPS
Global Positioning System
76
GPO
Group Policy Object
77
HMAC
Hash-Based Message Authentication Code
78
HIPAA
Health Insurance Portability and Accountability Act
79
HA
High Availability
80
HIDS
Host-Based Intrusion Detection System
81
HIPS
Host-Based Intrusion Prevention System
82
HMI
Human-Machine Interface
83
IAM
Identity and Access Management
84
IDS
Intrusion Detection System
85
IPS
Intrusion Prevention System
86
WLAN
Wireless Local Area Network
87
IRP
Incident Response Lifecycle
88
IRP
Incident Response Plan
89
IoC
Indicator of Compromise
90
IPS
Indoor Positioning System
91
ICS
Industrial Control System
92
ISAC
Information Sharing and Analysis Center
93
IaaS
Infrastructure as a Service
94
IaC
Infrastructure as Code
95
IKE
Internet Key Exchange
96
SAs
Security Associations
97
IMAP
Internet Message Access Protocol
98
IoT
Internet of Things
99
IP
Internet Protocol
100
TCP/IP
Transmission Control Protocol / Internet Protocol
101
IPSec
Internet Protocol Security
102
IRC
Internet Relay Chat
103
IPFIX
IP Flow Information Export
104
ITIL
IT Infrastructure Library
105
ITSM
IT Service Management
106
JSON
JavaScript Object Notation
107
KDC
Key Distribution Center
108
KEK
Key Encryption Key
109
MEK
Media Encryption Key
110
KRI
Key Risk Indicator
111
LLR
Lessons Learned Report
112
LDAP
Lightweight Directory Access Protocol
113
ML
Machine Learning
114
MAC
Mandatory Access Control
115
MSA
Master Service Agreement
116
MTD
Maximum Tolerable Downtime
117
MTBF
Mean Time Between Failures
118
MTTR
Mean Time to Repair/Replace/Recover
119
MAC Fitering
Media Access Control Filtering
120
MoA
Memorandum of Agreement
121
MoU
Memorandum of Understanding
122
MD5
Message Digest Algorithm v5
123
MEF
Mission Essential Function
124
MDM
Mobile Device Management
125
MFA
Multifactor Authentication
126
NIST
National Institute of Standards and Technology
127
NFC
Near-Field Communication
128
NAC
Network Access Control
129
NBAD
Network Behavior Anomaly Detection
130
NFV
Network Functions Virtualization
131
SNMP
Simple Network Management Protocol
132
NGFW
Next-Generation Firewall
133
NDA
Nondisclosure Agreement
134
NTLM
New Technology Local Area Network Manager Authentication
135
OTP
One-Time Password
136
OSCP
Online Certificate Status Protocol
137
OAuth
Open Authorization
138
OSINT
Open-Source Intelligence
139
OOB
Out-of-Band Management
140
PCI DSS
Payment Card Industry Data Security Standard
141
PFS
Perfect Forward Secrecy
142
PAN
Personal Area Network
143
PIN
Personal Identification Number
144
PaaS
Platform as a Service
145
PAM
Pluggable Authentication Module
146
PPTP
Point-to-Point Tunneling Protocol
147
SPAN
Switched Port Analyzer
148
POP
Post Office Protocol
149
PUP
Potentially Unwanted Program
150
PDU
Power Distribution Unit
151
PSK
Pre-Shared Key
152
PAM
Privileged Access Management
153
PKCS
Public Key Cryptography Standards
154
PKI
Public Key Infrastructure
155
RFID
Radio-Frequency ID
156
RTOS
Real-Time Operating System
157
RPO
Recovery Point Objective
158
RTO
Recovery Time Objective
159
RAT
Remote Access Trojan
160
RADIUS
Remote Authentication Dial-in User Service
161
RCE
Remote Code Execution
162
RDP
Remote Desktop Protocol
163
REST
Representational State Transfer
164
RBAC
Role-Based Access Control
165
ROE
Rules of Engagement
166
SOX
Sarbanes-Oxley Act
167
SASE
Secure Access Service Edge
168
SFTP
Secure File Transfer Protocol
169
SHA
Secure Hash Algorithm
170
SSH
Secure Shell
171
SAML
Security Assertion Markup Language
172
SCAP
Security Content Automation Protocol
173
SID
Security Identifier
174
SIEM
Security Information and Event Management
175
HSM
Hardware Security Module
176
SELinux
Security-Enhanced Linux
177
SED
Self-Encrypting Drive
178
SPF
Sender Policy Framework
179
SSRF
Server-Side Request Forgery
180
SLA
Service Level Agreement
181
SSID
Service Set Identifier
182
SMTP
Simple Mail Transfer Protocol
183
SNMP
Simple Network Management Protocol
184
SOAP
Simple Object Access Protocol
185
SAE
Simultaneous Authentication of Equals
186
SLE
Single Loss Expectancy
187
SPoF
Single Point of Failure
188
SSO
Single Sign-On
189
SaaS
Software as a Service
190
SBOM
Software Bill of Materials
191
SCA
Software Composition Analysis
192
SD-WAN
Software Defined Wide Area Network
193
SDLC
Software Development Life Cycle
194
SDN
Software-Defined Networking
195
SEH
Structured Exception Handler
196
SOW
Statement of Work
197
SQL
Structured Query Language
198
SAN
Subject Alternative Name
199
SCADA
Supervisory Control and Data Acquisition
200
SYN
Synchronize
201
TTP
Tactics, Techniques, and Procedures
202
TKIP
Temporal Key Integrity Protocol
203
WPA
Wi-Fi Protected Access
204
WEP
Wired Equivalent Privacy
205
TAP
Test Access Point
206
TGT
Ticket Granting Ticket
207
TOCTOU
Time-of-Check to Time-of-Use
208
TLS
Transport Layer Security
209
TPM
Trusted Platform Module
210
UTM
Unified Threat Management
211
URL
Uniform Resource Locator
212
UPS
Uninterruptible Power Supply
213
UEBA
User and Entity Behavior Analytics
214
VLAN
Virtual Local Area Network
215
VNC
Virtual Network Computing
216
VPC
Virtual Private Cloud
217
VPN
Virtual Private Network
218
NVT
Network Vulnerability Tools
219
WAF
Web Application Firewall
220
WPA
Wi-Fi Protected Access
221
WPS
Wi-Fi Protected Setup
222
WEP
Wired Equivalent Privacy
223
WRT
Work Recovery Time