Acronyms Flashcards
(229 cards)
1
Q
3DES
A
- Triple Digital Encryption Standard
2
Q
AAA
A
- Authentication, Authorization, and Accounting
3
Q
ACL
A
- Access Control List
4
Q
AES
A
- Advanced Encryption Standard
5
Q
AES256
A
- Advanced Encryption Standards 256bit
6
Q
AH
A
- Authentication Header
7
Q
ALE
A
- Annualized Loss Expectancy
8
Q
AP
A
- Access Point
9
Q
API
A
- Application Programming Interface
10
Q
ASP
A
- Application Service Provider
11
Q
ARO
A
- Annualized Rate of Occurrence
12
Q
ARP
A
- Address Resolution Protocol
13
Q
AUP
A
- Acceptable Use Policy
14
Q
BAC
A
- Business Availability Center
15
Q
BCP
A
- Business Continuity Planning
16
Q
BIA
A
- Business Impact Analysing
17
Q
BIOS
A
- Basic Input / Output System
18
Q
BPA
A
- Business Partners Agreement
19
Q
BYOD
A
- Bring Your Own Device
20
Q
CA
A
- Certificate Authority
21
Q
CAC
A
- Common Access Card
22
Q
CAN
A
- Controller Area Network
23
Q
CAPTCHA
A
- Completely Automated Public Turing Test to Tell Computers and Humans Apart
24
Q
CAR
A
- Corrective Action Report
25
CCMP
- Counter-Mode/CBC-Mac Protocol
26
CCTV
- Closed-circuit television
27
CERT
- Computer Emergency Response Team
28
CHAP
- Challenge Handshake Authentication Protocol
29
CIO
- Chief Information Officer
30
CIRT
- Computer Incident Response Team
31
COOP
- Continuity of Operation Planning
32
CP
- Contingency Planning
33
CRC
– Cyclical Redundancy Check
34
CRL
– Certification Revocation List
35
CSR
– Control Status Register
36
CSU
– Channel Service Unit
37
CTO
- Chief Technology Officer
38
DAC
– Discretionary Access Control
39
DBA
– Database Administrator
40
DDOS
– Distributed Denial of Service
41
DEP
– Data Execution Prevention
42
DES
– Digital Encryption Standard
43
DHCP
– Dynamic Host Configuration Protocol
44
DHE
– Data-Handling Electronics
45
DHE
- Diffie-Hellman Ephemeral
46
DLL
- Dynamic Link Library
47
DLP
- Data Loss Prevention
48
DMZ
– Demilitarized Zone
49
DNAT
– Destination Network Address Transaction
50
DNS
– Domain Name Service (Server)
51
DOS
– Denial of Service
52
DRP
– Disaster Recovery Plan
53
DSA
– Digital Signature Algorithm
54
DSL
- Digital Subscriber line
55
DSU
– Data Service Unit
56
EAP
- Extensible Authentication Protocol
57
ECC
- Elliptic Curve Cryptography
58
ECDHE
– Elliptic Curve Diffie-Hellman Ephemeral
59
EFS
– Encrypted File System
60
EMI
– Electromagnetic Interference
61
ESN
- Electronic Serial Number
62
ESP
– Encapsulated Security Payload
63
FACL
- File System Access Control List
64
FDE
– Full Disk Encryption
65
FTP
– File Transfer Protocol
66
FTPS
– Secured File Transfer Protocol
67
GPG
– Gnu Privacy Guard
68
GPO
– Group Policy Object
69
GPS
– Global Positioning System
70
GPU
- Graphic Processing Unit
71
GRE
- Generic Routing Encapsulation
72
HDD
– Hard Disk Drive
73
HIDS
– Host Based Intrusion Detection System
74
HIPS
– Host Based Intrusion Prevention System
75
HMAC
– Hashed Message Authentication Code
76
HOTP
– HMAC based One Time Password
77
HSM
– Hardware Security Module
78
HTML
– HyperText Markup Language
79
HTTP
– Hypertext Transfer Protocol
80
HTTPS
– Hypertext Transfer Protocol over SSL
81
HVAC
– Heating, Ventilation Air Conditioning
82
IaaS
- Infrastructure as a Service
83
ICMP
- Internet Control Message Protocol
84
ID
– Identification
85
IDS
– Intrusion Detection System
86
IKE
– Internet Key Exchange
87
IM
- Instant messaging
88
IMAP4
- Internet Message Access Protocol v4
89
IP
- Internet Protocol
90
IPSEC
– Internet Protocol Security
91
IR
– Incident Response
92
IRC
- Internet Relay Chat
93
IRP
– Incident Response Procedure
94
ISA
– Interconnection Security Agreement
95
ISP
– Internet Service Provider
96
ISSO
- Information Systems Security Officer
97
ITCP
– IT Contingency Plan
98
IV
- Initialization Vector
99
JBOD
– Just a Bunch of Disks
100
KDC
- Key Distribution Center
101
L2TP
– Layer 2 Tunneling Protocol
102
LAN
– Local Area Network
103
LDAP
– Lightweight Directory Access Protocol
104
LEAP
– Lightweight Extensible Authentication Protocol
105
MaaS
- Monitoring as a Service
106
MAC
– Mandatory Access Control / Media Access Control
107
MAC
- Message Authentication Code
108
MAN
- Metropolitan Area Network
109
MBR
– Master Boot Record
110
MD5
– Message Digest 5
111
MOU
– Memorandum of Understanding
112
MPLS
– Multi-Protocol Layer Switch
113
MSCHAP
– Microsoft Challenge Handshake Authentication Protocol
114
MTBF
– Mean Time Between Failures
115
MTTR
– Mean Time to Recover
116
MTTF
– Mean Time to Failure
117
MTU
- Maximum Transmission Unit
118
NAC
– Network Access Control
119
NAT
– Network Address Translation
120
NDA
– Non-Disclosure Agreement
121
NFC
– Near Field Communication
122
NIDS
– Network Based Intrusion Detection System
123
NIPS
– Network Based Intrusion Prevention System
124
NIST
– National Institute of Standards & Technology
125
NOS
– Network Operating System
126
NTFS
- New Technology File System
127
NTLM
– New Technology LANMAN
128
NTP
- Network Time Protocol
129
OCSP
– Online Certificate Status Protocol
130
OLA
– Open License Agreement
131
OS
– Operating System
132
OVAL
– Open Vulnerability Assessment Language
133
P2P
– Peer to Peer
134
PAC
– Proxy Auto Configuration
135
PAM
– Pluggable Authentication Modules
136
PAP
– Password Authentication Protocol
137
PAT
- Port Address Translation
138
PBKDF2
– Password Based Key Derivation Function 2
139
PBX
– Private Branch Exchange
140
PCAP
– Packet Capture
141
PEAP
– Protected Extensible Authentication Protocol
142
PED
- Personal Electronic Device
143
PGP
– Pretty Good Privacy
144
PII
– Personally Identifiable Information
145
PIV
– Personal Identity Verification
146
PKI
– Public Key Infrastructure
147
POTS
– Plain Old Telephone Service
148
PPP
- Point-to-point Protocol
149
PPTP
– Point to Point Tunneling Protocol
150
PSK
– Pre-Shared Key
151
PTZ
– Pan-Tilt-Zoom
152
RA
– Recovery Agent
153
RAD
- Rapid application development
154
RADIUS
– Remote Authentication Dial-in User Server
155
RAID
– Redundant Array of Inexpensive Disks
156
RAS
– Remote Access Server
157
RBAC
– Role Based Access Control
158
RBAC
– Rule Based Access Control
159
RC4
– RSA Variable Key Size Encryption Algorithm
160
RIPEMD
– RACE Integrity Primitives Evaluation Message Digest
161
ROI
– Return of Investment
162
RPO
– Recovery Point Objective
163
RSA
– Rivest, Shamir, & Adleman
164
RTO
– Recovery Time Objective
165
RTP
– Real-Time Transport Protocol
166
S/MIME
– Secure / Multipurpose Internet Mail Extensions
167
SAML
– Security Assertions Markup Language
168
SaaS
- Software as a Service
169
SAN
– Storage Area Network
170
SCADA
– System Control and Data Acquisition
171
SCAP
- Security Content Automation Protocol
172
SCEP
- Simple Certificate Enrollment Protocol
173
SCSI
- Small Computer System Interface
174
SDLC
- Software Development Life Cycle
175
SDLM
- Software Development Life Cycle Methodology
176
SEH
– Structured Exception Handler
177
SHA
– Secure Hashing Algorithm
178
SFTP
– Secured File Transfer Protocol
179
SHTTP
– Secure Hypertext Transfer Protocol
180
SIEM
– Security Information and Event Management
181
SIM
– Subscriber Identity Module
182
SLA
– Service Level Agreement
183
SLE
- Single Loss Expectancy
184
SMS
- Short Message Service
185
SMTP
– Simple Mail Transfer Protocol
186
SNMP
- Simple Network Management Protocol
187
SOAP
– Simple Object Access Protocol
188
SONET
– Synchronous Optical Network Technologies
189
SPIM
- Spam over Internet Messaging
190
SQL
– Structured Query Language
191
SSD
– Solid State Drive
192
SSH
– Secure Shell
193
SSL
– Secure Sockets Layer
194
SSO
– Single Sign On
195
STP
– Shielded Twisted Pair
196
TACACS+
– Terminal Access Controller Access Control System
197
TCP/IP
– Transmission Control Protocol / Internet Protocol
198
TGT
– Ticket Granting Ticket
199
TKIP
- Temporal Key Integrity Protocol
200
TLS
- Transport Layer Security
201
TOTP
– Time-Based One-Time Password
202
TPM
– Trusted Platform Module
203
TSIG
– Transaction Signature
204
UAT
- User Acceptance Testing
205
UEFI
– Unified Extensible Firmware Interface
206
UDP
- User Datagram Protocol
207
UPS
- Uninterruptable Power Supply
208
URI
- Uniform Resource Identifier
209
URL
- Universal Resource Locator
210
USB
– Universal Serial Bus
211
UTM
- Unified Threat Management
212
UTP
– Unshielded Twisted Pair
213
VDI
– Virtualization Desktop Infrastructure
214
VLAN
– Virtual Local Area Network
215
VoIP
- Voice over IP
216
VPN
– Virtual Private Network
217
VTC
– Video Teleconferencing
218
WAF
- Web-Application Firewall
219
WAP
– Wireless Access Point
220
WEP
– Wired Equivalent Privacy
221
WIDS
– Wireless Intrusion Detection System
222
WIPS
– Wireless Intrusion Prevention System
223
WPA
– Wireless Protected Access
224
WPA2
– WiFi Protected Access 2
225
WPS
– WiFi Protected Setup
226
WTLS
– Wireless TLS
227
XML
– Extensible Markup Language
228
XSRF
- Cross-Site Request Forgery
229
XSS
- Cross-Site Scripting