Acronyms Flashcards

Spell out the Acronym (304 cards)

1
Q

3DES

A

Triple Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, Accouting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES256

A

Advanced Encryption Standard at 256bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistant Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ASP

A

Application Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AV

A

Antivirus

or

Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BAC

A

Business Availaibilty Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BCP

A

Business Continuity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BPDU

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CA
Certificate Authority
26
CAC
Common Access Cards
27
CAN
Controller Area Network
28
CAPTCHA
Completly Automated Public Turing Test-to-Tell Computers and Humans Apart
29
CAR
Corrective Action Report
30
CASB
Cloud Access Security Broker
31
CBC
Cyber Block Chaining
32
CCMP
Counter-Mode/CBC-Mac Protocol
33
CCTV
Closed-circuit Television
34
CER
Certificate or Cross-over Error Rate
35
CERT
Computer Emergency Response Team
36
CFB
Cipher Feedback
37
CHAP
Challenge Handshake Authentication Protocol
38
CIO
Chief Information Office
39
CIRT
Computer Incident Response Team
40
CMS
Content Management System
41
COOP
Continuity **_o_**f Operations Plan
42
COPE
Corporate Owned, Personally Enabled
43
CP
Contingency Plan
44
CRC
Cyclical Redundancy Check
45
CRL
Certificate Revocation List
46
CSIRT
Computer Security Incident Response Team
47
CSO
Chief Security Office
48
CSP
Cloud Service Provider
49
CSR
Cerftificate Signing Request
50
CSRF
Cross-site Request Forgery
51
CSU
Channel Service Unit
52
CTM
Counter-Mode
53
CTO
Chief Technology Office
54
CTR
Counter
55
CYOD
Choose Your Own Device
56
DAC
Discretionary Access Control
57
DBA
Data**_b_**ase Administrator
58
DDoS
Destributed Denial **_o_**f Service
59
DEP
Data Execution Prevention
60
DER
Distinguished Encoding Rules
61
DES
Digital Encryption Standard
62
DFIR
Digital Forensic and Invistigation Response
63
DHCP
Dynamic Host Configuration Protocol
64
DHE
Deffie-Hellmann Ephemeral or Data-Handling Electronics
65
DLL
Dynamic Link Library
66
DLP
Data Loss Prevention
67
DMZ
De**_m_**ilitarized Zone
68
DNAT
Dynamic NAT | (Dynamic Network Address Translation)
69
DNS
Domain Name Service
70
DOS
Denial of Service
71
DRP
Disaster Recovery Plan
72
DSA
Digital Signature Algorithm
73
DSL
Digital Subscriber Line
74
DSU
Data Service Unit
75
EAP
Extensible Authentication Protocol
76
ECB
Electronic Code Book
77
ECC
Eliptic Curved Cryptography
78
ECCDHE
Eliptic Curved Cryptography over Deffie-Hellman Ephemeral
79
ECCDSA
Eliptic Curve Cryptography Digital Signature Algorithm
80
EF
Exposure Factor
81
EFS
Encrypted File System
82
EMI
Electro**_m_**agnetic Interference
83
EMP
Electro**_m_**agnetic Pulse
84
EOL
End **_o_**f Life
85
ERP
Enterprise Resource Planning
86
ESN
Electronic Serial Number
87
ESP
Encapsulated Security Payload
88
EULA
End User Level Agreement
89
FACL
File System Access Control List
90
FAR
False Acceptance Rate
91
FDE
Full Disk Encryption
92
FRR
False Rejection Rate
93
FTP
File Transfer Protocol
94
FTPS or sFTP
Secure File Transfer Protocol
95
GCM
Galois Counter Mode
96
GPG
GNU Privacy Guard | (GNU = Gnu is Not Unix)
97
GPO
Group Policy Object
98
GPS
Global Positioning System
99
GPU
Graphic Processing Unit
100
GRE
Generic Routing Encapsulation
101
HA
High Availability
102
HDD
Hard Disk Drive
103
HIDS
Host-Based Intrution Detection System
104
HIPS
Host-based Intrution Prevention System
105
HMAC
Hashed Message Authentication Code
106
HOTP
HMAC-based One Time Password
107
HSM
Hardware Security Module
108
HTML
Hyper**_t_**ext Markup Language
109
HTTP
Hyper**_t_**ext Tranfer Protocol
110
HTTP
Secure Hyper**_t_**ext Transfer Protocol
111
HVAC
Heating, Ventilation and Air**_c_**onditioning
112
IaaS
Infrastructure as a Service
113
ICMP
Internet Control Message Protocol
114
ID
Identification
115
IDEA
International Data Encryption Algorithm
116
IDF
Intermediate Distribution Frame
117
IdP
Identity Provider
118
IEEE
Institute of Electrical and Electronic Engineers
119
IIS
Internet Information System
120
IKE
Internet Key Exchange
121
IM
Instant Messaging
122
IMAP4
Internet Message Access Protocol version 4
123
IoT
Internet of Things
124
IP
Internet Protocol
125
IPSec
Internet Protocol Security
126
IR
Incident Response or Infrared
127
IRC
Internet Relay Chat
128
IRP
Incident Response Plan
129
ISA
Interconnections Security Agreement
130
ISP
Internet Service Provider
131
ISSO
Information Systemes Security Officer
132
ITCP
IT Contingency Plan
133
IV
Initialization Vector
134
KDC
Key Distribuition Center
135
KEK
Key Encryption Key
136
L2TP
Layer 2 Tunneling Protocol
137
LAN
Local Area Network
138
LDAP
Lightweight Directory Access Protocol
139
LEAP
Lightweight Extensible Authentication Protocol
140
MaaS
Monitoring as a Service
141
MAC
Mandatory Access Control or Media Access Control or Message Authentication Code
142
MD5
Message Digest v5
143
MDF
Main Distribution Frame
144
MDM
Mobile Device Management
145
MFA
Multi**_f_**actor-Authentication
146
MFD
Multi-**_f_**untion Device
147
MIME
Multipurpose Internet Mail Exchange
148
MITM
Man-**_i_**n-**_t_**he-Middle
149
MMS
Multimedia Message Service
150
MOA
Memorandum of Agreement
151
MOTD
Message **_o_**f **_t_**he Day
152
MPLS
Multi-Protocol Label Switching
153
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
154
MSP
Managed Service Provider
155
MTBF
Mean Time Between Failures
156
MTTF
Mean Time **_t_**o Failure
157
MTTR
Mean Time **_t_**o Recover or Mean Time **_t_**o Repair
158
MTU
Maximum Transmision Protocol
159
NAC
Network Access Control
160
NAT
Network Access Translation
161
NDA
Non Disclosure Agreements
162
NFC
Near Field Communication
163
NGAC
Next Generation Access Control
164
NIDS
Network-Based Intrusion Detecion System
165
NIPS
Network-based Intrusion Prevention System
166
NIST
National Institute Standards & Technology
167
NTFS
New Technology File System
168
NTLM
New Technology LAN Manager
169
OAUTH
Open Authorization
170
OCSP
Online Certificate Status Protocol
171
OID
Object Identifier
172
OS
Operating System
173
OTA
Over The Air
174
OVAL
Open Vulnerability Assessment Language
175
P12
PKCS#12 | (Public-Key Cryptography Standards)
176
P2P
Peer to Peer
177
PaaS
Platform as a Service
178
PAC
Proxy Auto Configuration
179
PAM
Pluggable Authentication Modules
180
PAP
Password Authentication Protocol
181
PAT
Port Address Translation
182
PBKDF2
Password-based Key Derivation Function 2
183
PBX
Private Branch Exchange
184
PCAP
Packet Capture
185
PEAP
Protected Extensible Authentication Protocol
186
PED
Personal Electronic Device
187
PEM
Privacy-enchanced Electronic Mail
188
PFS
Prefect Forward Secrecy
189
PFX
Personal Exchange Format
190
PGP
Pretty Good Privacy
191
PHI
Personal Health Information
192
PII
Personable Identifiable Information
193
PIV
Personal Identity Verification
194
PKI
Public Key Infrastructure
195
POODLE
Padding Oracle **_o_**n Downgrade Legacy Encryption
196
POP
Post Office Protocol
197
POTS
Plan Old Telephone Service
198
PPP
Point-to-Point Protocol
199
PPTP
Point-to-Point Tunneling Protocol
200
PSK
Pre-**_s_**hared Key
201
PTZ
Pan-Tilt-Zoom
202
RA
Recovery Agent or Registration Authority
203
RAD
Rapid Application Development
204
RADIUS
Remote Authentication Dial-in User Server
205
RAID
Redundant Array of Inexpensive Disks
206
RAS
Remote Access Server
207
RAT
Remote Access Trojan
208
RBAC
Role-Based Access Control or Rule-Based Access Control
209
RC4
Rivest Cipher version 4
210
RDP
Remote Desktop Protocol
211
REST
Representational State Transfer
212
RFID
Radio Frequency I**_d_**entifier
213
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
214
ROI
Return of Investment
215
RMF
Risk Management Framework
216
RPO
Recovery Point Objective
217
RSA
Rivest, Shamir & Adleman
218
RTBH
Remotely Triggered Black Hole
219
RTO
Recovery Time Objective
220
RTOS
Real-Time Operating System
221
RTP
Real-time Transport Protocol
222
S/MIME
Secure Multipurpose Internet Mail Extensions
223
SaaS
Software **_a_**s _a_ Service
224
SAML
Security Assertions Mark-Up Language
225
SAN
Storage Area Network or Subject Alternative Name
226
SCADA
System Control and Data Acquisition
227
SCAP
Security Content Automation Protocol
228
SCEP
Simple Certificate Enrollment Protocol
229
SCP
Security Copy
230
SCSI
Small Computer System Interface
231
SDK
Software Developer Kit
232
SDLC
Software Development Life Cycle
233
SDLM
Software Development Life-cycle Methodology
234
SDN
Software Defined Network
235
SED
Self-Encrypting Drive
236
SEH
Structrure Exception Handler
237
SHA
Secure Hash Algorithm
238
SHTTP
Secure Hyper**_t_**ext Protocol
239
SIEM
Security Information and Event Management
240
SIM
Subscriber Identity Mode
241
SIP
Session Initiation Protocol
242
SIPS
Session Initiation Protocol Secure
243
SLA
Service Level Agreement
244
SLE
Single Loss Expectancy
245
SMB
Server Message Block
246
SMS
Short Message Service
247
SMTP
Simple Mail Transfer Protocol
248
SMTPS
Simple Mail Transfer Protocol Secure
249
SNMP
Simple Network Management Protocol
250
SoC
System on Chip
251
SPF
Sender Policy Framework
252
SPIM
Spam over Internet Messaging
253
SPoF
Single Point **_o_**f Failure
254
SQL
Structured Query Language
255
SRTP
Secure Real-Time Protocol
256
SSD
Solid State Drive
257
SSH
Secure **_Sh_**ell
258
SSID
Service Set **_Id_**entifier
259
SSL
Secure Socket Layer
260
SSO
Single Sign-On
261
SSP
System Security Plan
262
STP
Shielded Twisted Pair
263
TACACS+
Terminal Access Controller Access Control System Plus
264
TCO
Total Cost of Ownership
265
TCP/IP
Transmision Control Protocol over Internet Procol
266
TGT
Ticket Granting Ticket
267
TKIP
Temporal Key Integrity Protocol
268
TLS
Transport Layer Security
269
TOTP
Time-based One Time Password
270
TPM
Trusted Platform Module
271
TSIG
Transaction Signature
272
UAT
User Acceptance Testing
273
UAV
Unmanned Air Vehicle
274
UDP
User Datagram Protocol
275
UEFI
Unified Extensible Firmware Interface
276
UPS
Uninterruptable Power Supply
277
URI
Uniform Resource Identifier
278
URL
Universal Resource Locator
279
USB
Universal Serial Bus
280
USB/OTG
USB On-The-Go
281
UTM
Unified Threat Managment
282
UTP
Unshielded Twisted Pair
283
VDE
Virtual Desktop Enviroment
284
VDI
Virtual Desktop Infrastructure
285
VLAN
Virtual Local Area Network
286
VLSM
Variable Length Subnet Masking
287
VM
Virtual Machine
288
VoIP
Voice **_o_**ver Internet Protocol
289
VPN
Virtual Private Network
290
VTC
Video Tele**_c_**onferencing
291
WAF
Web-Application Firewall
292
WAP
Wireless Access Point
293
WED
Wired Equivalent Privacy
294
WIDS
Wireless Intrusion Detection System
295
WIPS
Wireless Intrusion Prevention System
296
WORM
Write Once Read Many
297
WPA
WiFi Protected Access
298
WPA-2
WiFi Protected Access 2
299
WPS
WiFi Protected Setup
300
WTLS
Wireless TLS
301
XML
Extensible Markup Language
302
XOR
Exclusive Or
303
XSFR
Cross-site Request Forgery
304
XSS
Cross-site Scripting