Acronyms Flashcards

(311 cards)

1
Q

3DES

A

Triple Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES256

A

Advanced Encryption Standards 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ASP

A

Application Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AV

A

Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BAC

A

Business Availability Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BCP

A

Business Continuity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BPDU

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BYOD
Bring Your Own Device
26
CA
Certificate Authority
27
CAC
Common Access Card
28
CAN
Controller Area Network
29
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
30
CAR
Corrective Action Report
31
CBC
Cipher Block Chaining
32
CCMP
Counter-Mode/CBC-Mac Protocol
33
CCTV
Closed-circuit Television
34
CER
Certificate
35
CER
Cross-over Error Rate
36
CERT
Computer Emergency Response Team
37
CFB
Cipher Feedback
38
CHAP
Challenge Handshake Authentication Protocol
39
CIO
Chief Information Officer
40
CIRT
Computer Incident Response Team
41
CMS
Content Management System
42
COOP
Continuity of Operations Plan
43
COPE
Corporate Owned, Personally Enabled
44
CP
Contingency Planning
45
CRC
Cyclical Redundancy Check
46
CRL
Certificate Revocation List
47
CSIRT
Computer Security Incident Response Team
48
CSO
Chief Security Officer
49
CSP
Cloud Service Provider
50
CSR
Certificate Signing Request
51
CSRF
Cross-site Request Forgery
52
CSU
Channel Service Unit
53
CTM
Counter-Mode
54
CTO
Chief Technology Officer
55
CTR
Counter
56
CYOD
Choose Your Own Device
57
DAC
Discretionary Access Control
58
DBA
Database Administrator
59
DDoS
Distributed Denial of Service
60
DEP
Data Execution Prevention
61
DER
Distinguished Encoding Rules
62
DES
Digital Encryption Standard
63
DFIR
Digital Forensics and Investigation Response
64
DHCP
Dynamic Host Configuration Protocol
65
DHE
Data-Handling Electronics
66
DHE
Diffie-Hellman Ephermeral
67
DLL
Dynamic Link Library
68
DLP
Data Loss Prevention
69
DMZ
Demilitarized Zone
70
DNAT
Destination Network Address Transaction
71
DNA
Domain Name Service (Server)
72
DoS
Denial of Service
73
DRP
Disaster Recovery Plan
74
DSA
Digital Signature Algorithm
75
DSL
Digital Subscriber Line
76
DSU
Data Service Unit
77
EAP
Extensible Authentication Protocol
78
ECB
Electronic Code Book
79
ECC
Elliptic Curve Cryptography
80
ECHDE
Elliptic Curve Diffie-Hellman Ephemeral
81
ECDSA
Elliptic Curve Digital Signature Algorithm
82
EFS
Encrypted File System
83
EMI
Electro-Magnetic Interference
84
EMP
Electro-Magnetic Pulse
85
ERP
Enterprise Resource Planning
86
ESN
Electronic Serial Number
87
ESP
Encapsulated Security Payload
88
EF
Exposure Factor
89
FACL
File System Access Control List
90
FAR
False Acceptance Rate
91
FDE
Full Disk Encryption
92
FRR
False Rejection Rate
93
FTP
File Transfer Protocol
94
FTPS
Secured File Transfer Protocol
95
GCM
Galois Counter Mode
96
GPG
Gnu Privacy Guard
97
GPO
Group Policy Object
98
GPS
Global Positioning Satellite
99
GPU
Graphic Processing Unit
100
GRE
Generic Routing Encapsulation
101
HA
High Availability
102
HDD
Hard Disk Drive
103
HIDS
Host-based Intrusion Detection System
104
HIPS
Host-based Intrusion Prevention System
105
HMAC
Hashed Message Authentication Code
106
HOTP
HMAC-based One-Time Password
107
HSM
Hardware Security Module
108
HTML
Hypertext Markup Language
109
HTTP
Hypertext Transfer Protocol
110
HTTPS
Hypertext Transfer Procotol over SSL/TLS
111
HVAC
Heating, Ventilation, and Air Conditioning
112
IaaS
Infrastructure as a Service
113
ICMP
Internet Control Message Protocol
114
ICS
Industrial Control Systems
115
ID
Identification
116
IDEA
International Data Encryption Algorithm
117
IDF
Intermediate Distribution Frame
118
IdP
Identity Provider
119
IDS
Intrusion Detection System
120
IEEE
Institute of Electrical and Electronic Engineers
121
IIS
Internet Information System
122
IKE
Internet Key Exchange
123
IM
Instant Message
124
IMAP4
Internet Message Access Protocol v4
125
IoT
Internet of Things
126
IP
Internet Protocol
127
IPSec
Internet Protocol Security
128
IR
Incident Response
129
IR
Infrared
130
IRC
Internet Relay Chat
131
IRP
Incident Response Plan
132
ISA
Interconnection Security Agreement
133
ISP
Internet Service Provider
134
ISSO
Information Systems Security Officer
135
ITCP
IT Contingency Plan
136
IV
Initialization Vector
137
KDC
Key Distribution Center
138
KEK
Key Encryption Key
139
L2TP
Layer 2 Tunneling Protocol
140
LAN
Local Area Network
141
LDAP
Lightweight Directory Access Protocol
142
LEAP
Lightweight Extensible Authentication Protocol
143
MaaS
Monitoring as a Service
144
MAC
Mandatory Access Control
145
MAC
Media Access Control
146
MAC
Message Authentication Code
147
MAN
Metropolitan Area Network
148
MBR
Master Boot Record
149
MD5
Message Digest 5
150
MDF
Main Distribution Frame
151
MDM
Mobile Device Management
152
MFA
Multi-Factor Authentication
153
MFD
Multi-function Device
154
MITM
Man-in-the-Middle
155
MMS
Multimedia Message Service
156
MOA
Memorandum of Agreement
157
MOU
Memorandum of Understanding
158
MPLS
Multi-protocol Label Switching
159
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
160
MSP
Managed Service Provider
161
MTBF
Mean Time Between Failures
162
MTTF
Mean Time to Failure
163
MTTR
Mean Time to Recover or Mean Time to Repair
164
MTU
Maximum Transmission Unit
165
NAC
Network Address Control
166
NAT
Network Address Translation
167
NDA
Non-disclosure Agreement
168
NFC
Near Field Communication
169
NGAC
Next Generation Access Control
170
NIDS
Network-based Intrusion Detection System
171
NIPS
Network-based Intrusion Prevention System
172
NIST
National Institute of Standards and Technology
173
NTFS
New Technology File System
174
NTLM
New Technology LAN Manager
175
NTP
Network Time Protocol
176
OAUTH
Open Authorization
177
OCSP
Online Certificate Status Protocol
178
OID
Object Identifier
179
OS
Operating System
180
OTA
Over the Air
181
OVAL
Open Vulnerability Assessment Language
182
P12
PKCS #12
183
P2P
Peer to Peer
184
PaaS
Platform as a Service
185
PAC
Proxy Auto Configuration
186
PAM
Plug-able Authentication Modules
187
PAP
Password Authentication Protocol
188
PAT
Port Address Translation
189
PBKDF2
Password-based Key Derivation Function 2
190
PBX
Private Branch Exchange
191
PCAP
Packet Capture
192
PEAP
Protected Extensible Authentication Protocol
193
PED
Personal Electronic Device
194
PEM
Privacy-enhanced Electronic Mail
195
PFS
Perfect Forward Secrecy
196
PFX
Personal Exchange Format
197
PGP
Pretty Good Privacy
198
PHI
Personal Health Information
199
PII
Personally Identifiable Information
200
PIV
Personal Identity Verification
201
PKI
Public Key Infrastructure
202
POODLE
Padding Oracle on Downgrade Legacy Encryption
203
POP
Post Office Protocol
204
POTS
Plain Old Telephone Service
205
PPP
Point-to-Point Protocol
206
PPTP
Point-to-Point Tunneling Protocol
207
PSK
Pre-shared Key
208
PTZ
Pan-Tilt-Zoom
209
RA
Recovery Agent
210
RA
Registration Authority
211
RAD
Rapid Application Development
212
RADIUS
Remote Authentication Dial-in User Server
213
RAID
Redundant Array of Inexpensive Disks
214
RAS
Remote Access Server
215
RAT
Remote Access Trojan
216
RBAC
Role-based Access Control
217
RBAC
Rule-based Access Control
218
RC4
Rivest Cipher version 4
219
RDP
Remote Desktop Protocol
220
RFID
Radio Frequency Identifier
221
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
222
ROI
Return on Investment
223
RMF
Risk Management Framework
224
RPO
Recovery Point Objective
225
RSA
Rivest, Shamir, & Adleman
226
RTBH
Remotely Triggered Black Hole
227
RTO
Recovery Time Objective
228
RTOS
Real-time Operating System
229
RTP
Real-time Transport Protocol
230
S/MIME
Secure/Multi-purpose Internet Mail Extensions
231
SaaS
Software as a Service
232
SAML
Security Assertions Markup Language
233
SAN
Storage Area Network
234
SAN
Subjective Alternative Name
235
SCADA
System Control and Data Acquisition
236
SCAP
Security Content Automation Protocol
237
SCEP
Simple Certificate Enrollment Protocol
238
SCP
Secure Copy
239
SCSI
Small Computer System Interface
240
SDK
Software Development Kit
241
SDLC
Software Development Life Cycle
242
SDLM
Software Development Life Cycle Methodology
243
SDN
Software Defined Network
244
SED
Self-encrypting Drive
245
SEH
Structured Exception Handler
246
SFTP
Secured File Transfer Protocol
247
SHA
Secure Hashing Algorithm
248
SHTTP
Secure Hypertext Transfer Protocol
249
SIEM
Security Information and Event Manager
250
SIM
Subscriber Identity Module
251
SLA
Service Level Agreement
252
SLE
Single Loss Expectancy
253
SMB
Server Message Block
254
SMS
Short Message Service
255
SMTP
Simply Mail Transfer Protocol
256
SMTPS
Simple Mail Transfer Protocol Secure
257
SNMP
Simple Network Management Protocol
258
SOAP
Simple Object Access Protocol
259
SoC
System on a Chip
260
SPF
Sender Policy Framework
261
SPIM
Spam over Internet Messaging
262
SPoF
Single Point of Failure
263
SQL
Structured Query Language
264
SRTP
Secure Real-Time Protocol
265
SSD
Solid State Drive
266
SSH
Secure Shell
267
SSID
Service Set Identifier
268
SSL
Secure Sockets Layer
269
SSO
Single Sign-on
270
STP
Shielded Twisted Pair
271
TACACS+
Terminal Access Controller Access Control System Plus
272
TCP/IP
Transmission Control Protocol/Internet Protocol
273
TGT
Ticket Granting Ticket
274
TKIP
Temporal Key Integrity Protocol
275
TLS
Transport Layer Security
276
TOTP
Tim-based One-time Password
277
TPM
Trusted Platform Module
278
TSIG
Transaction Signature
279
UAT
User Acceptance Testing
280
UAV
Unmanned Aerial Vehicle
281
UDP
User Datagram Protocol
282
UEFI
Unified Extensible Firmware Interface
283
UPS
Uninterruptible Power Supply
284
URI
Uniform Resource Identifier
285
URL
Universal Resource Locator
286
USB
Universal Serial Bus
287
USB OTG
USB On the Go
288
UTM
Unified Threat Management
289
UTP
Un-shielded Twisted Pair
290
VDE
Virtual Desktop Environment
291
VDI
Virtual Desktop Infrastructure
292
VLAN
Virtual Local Area Network
293
VLSM
Variable Length Subnet Masking
294
VM
Virtual Machine
295
VoIP
Voice over IP
296
VPN
Virtual Private Network
297
VTC
Video Teleconferencing
298
WAF
Web Application Firewall
299
WAP
Wireless Access Point
300
WEP
Wired Equivalent Privacy
301
WIDS
Wireless Intrusion Detection System
302
WIPS
Wireless Intrusion Prevention System
303
WORM
Write Once Read Many
304
WPA
WiFi Protected Access
305
WPA2
WiFi Protected Access 2
306
WPS
WiFi Protected Setup
307
WTLS
Wireless TLS
308
XML
Extensible Markup Language
309
XOR
Exclusive Or
310
XSRF
Cross-site Request Forgery
311
XSS
Cross-site Scripting