Acronyms Flashcards

(229 cards)

1
Q

3DES

A
  • Triple Digital Encryption Standard
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A
  • Authentication, Authorization, and Accounting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL

A
  • Access Control List
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A
  • Advanced Encryption Standard
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES256

A
  • Advanced Encryption Standards 256bit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AH

A
  • Authentication Header
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ALE

A
  • Annualized Loss Expectancy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AP

A
  • Access Point
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

API

A
  • Application Programming Interface
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ASP

A
  • Application Service Provider
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARO

A
  • Annualized Rate of Occurrence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP

A
  • Address Resolution Protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AUP

A
  • Acceptable Use Policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BAC

A
  • Business Availability Center
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BCP

A
  • Business Continuity Planning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BIA

A
  • Business Impact Analysing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BIOS

A
  • Basic Input / Output System
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BPA

A
  • Business Partners Agreement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BYOD

A
  • Bring Your Own Device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CA

A
  • Certificate Authority
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CAC

A
  • Common Access Card
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CAN

A
  • Controller Area Network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CAPTCHA

A
  • Completely Automated Public Turing Test to Tell Computers and Humans Apart
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CAR

A
  • Corrective Action Report
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CCMP
- Counter-Mode/CBC-Mac Protocol
26
CCTV
- Closed-circuit television
27
CERT
- Computer Emergency Response Team
28
CHAP
- Challenge Handshake Authentication Protocol
29
CIO
- Chief Information Officer
30
CIRT
- Computer Incident Response Team
31
COOP
- Continuity of Operation Planning
32
CP
- Contingency Planning
33
CRC
– Cyclical Redundancy Check
34
CRL
– Certification Revocation List
35
CSR
– Control Status Register
36
CSU
– Channel Service Unit
37
CTO
- Chief Technology Officer
38
DAC
– Discretionary Access Control
39
DBA
– Database Administrator
40
DDOS
– Distributed Denial of Service
41
DEP
– Data Execution Prevention
42
DES
– Digital Encryption Standard
43
DHCP
– Dynamic Host Configuration Protocol
44
DHE
– Data-Handling Electronics
45
DHE
- Diffie-Hellman Ephemeral
46
DLL
- Dynamic Link Library
47
DLP
- Data Loss Prevention
48
DMZ
– Demilitarized Zone
49
DNAT
– Destination Network Address Transaction
50
DNS
– Domain Name Service (Server)
51
DOS
– Denial of Service
52
DRP
– Disaster Recovery Plan
53
DSA
– Digital Signature Algorithm
54
DSL
- Digital Subscriber line
55
DSU
– Data Service Unit
56
EAP
- Extensible Authentication Protocol
57
ECC
- Elliptic Curve Cryptography
58
ECDHE
– Elliptic Curve Diffie-Hellman Ephemeral
59
EFS
– Encrypted File System
60
EMI
– Electromagnetic Interference
61
ESN
- Electronic Serial Number
62
ESP
– Encapsulated Security Payload
63
FACL
- File System Access Control List
64
FDE
– Full Disk Encryption
65
FTP
– File Transfer Protocol
66
FTPS
– Secured File Transfer Protocol
67
GPG
– Gnu Privacy Guard
68
GPO
– Group Policy Object
69
GPS
– Global Positioning System
70
GPU
- Graphic Processing Unit
71
GRE
- Generic Routing Encapsulation
72
HDD
– Hard Disk Drive
73
HIDS
– Host Based Intrusion Detection System
74
HIPS
– Host Based Intrusion Prevention System
75
HMAC
– Hashed Message Authentication Code
76
HOTP
– HMAC based One Time Password
77
HSM
– Hardware Security Module
78
HTML
– HyperText Markup Language
79
HTTP
– Hypertext Transfer Protocol
80
HTTPS
– Hypertext Transfer Protocol over SSL
81
HVAC
– Heating, Ventilation Air Conditioning
82
IaaS
- Infrastructure as a Service
83
ICMP
- Internet Control Message Protocol
84
ID
– Identification
85
IDS
– Intrusion Detection System
86
IKE
– Internet Key Exchange
87
IM
- Instant messaging
88
IMAP4
- Internet Message Access Protocol v4
89
IP
- Internet Protocol
90
IPSEC
– Internet Protocol Security
91
IR
– Incident Response
92
IRC
- Internet Relay Chat
93
IRP
– Incident Response Procedure
94
ISA
– Interconnection Security Agreement
95
ISP
– Internet Service Provider
96
ISSO
- Information Systems Security Officer
97
ITCP
– IT Contingency Plan
98
IV
- Initialization Vector
99
JBOD
– Just a Bunch of Disks
100
KDC
- Key Distribution Center
101
L2TP
– Layer 2 Tunneling Protocol
102
LAN
– Local Area Network
103
LDAP
– Lightweight Directory Access Protocol
104
LEAP
– Lightweight Extensible Authentication Protocol
105
MaaS
- Monitoring as a Service
106
MAC
– Mandatory Access Control / Media Access Control
107
MAC
- Message Authentication Code
108
MAN
- Metropolitan Area Network
109
MBR
– Master Boot Record
110
MD5
– Message Digest 5
111
MOU
– Memorandum of Understanding
112
MPLS
– Multi-Protocol Layer Switch
113
MSCHAP
– Microsoft Challenge Handshake Authentication Protocol
114
MTBF
– Mean Time Between Failures
115
MTTR
– Mean Time to Recover
116
MTTF
– Mean Time to Failure
117
MTU
- Maximum Transmission Unit
118
NAC
– Network Access Control
119
NAT
– Network Address Translation
120
NDA
– Non-Disclosure Agreement
121
NFC
– Near Field Communication
122
NIDS
– Network Based Intrusion Detection System
123
NIPS
– Network Based Intrusion Prevention System
124
NIST
– National Institute of Standards & Technology
125
NOS
– Network Operating System
126
NTFS
- New Technology File System
127
NTLM
– New Technology LANMAN
128
NTP
- Network Time Protocol
129
OCSP
– Online Certificate Status Protocol
130
OLA
– Open License Agreement
131
OS
– Operating System
132
OVAL
– Open Vulnerability Assessment Language
133
P2P
– Peer to Peer
134
PAC
– Proxy Auto Configuration
135
PAM
– Pluggable Authentication Modules
136
PAP
– Password Authentication Protocol
137
PAT
- Port Address Translation
138
PBKDF2
– Password Based Key Derivation Function 2
139
PBX
– Private Branch Exchange
140
PCAP
– Packet Capture
141
PEAP
– Protected Extensible Authentication Protocol
142
PED
- Personal Electronic Device
143
PGP
– Pretty Good Privacy
144
PII
– Personally Identifiable Information
145
PIV
– Personal Identity Verification
146
PKI
– Public Key Infrastructure
147
POTS
– Plain Old Telephone Service
148
PPP
- Point-to-point Protocol
149
PPTP
– Point to Point Tunneling Protocol
150
PSK
– Pre-Shared Key
151
PTZ
– Pan-Tilt-Zoom
152
RA
– Recovery Agent
153
RAD
- Rapid application development
154
RADIUS
– Remote Authentication Dial-in User Server
155
RAID
– Redundant Array of Inexpensive Disks
156
RAS
– Remote Access Server
157
RBAC
– Role Based Access Control
158
RBAC
– Rule Based Access Control
159
RC4
– RSA Variable Key Size Encryption Algorithm
160
RIPEMD
– RACE Integrity Primitives Evaluation Message Digest
161
ROI
– Return of Investment
162
RPO
– Recovery Point Objective
163
RSA
– Rivest, Shamir, & Adleman
164
RTO
– Recovery Time Objective
165
RTP
– Real-Time Transport Protocol
166
S/MIME
– Secure / Multipurpose Internet Mail Extensions
167
SAML
– Security Assertions Markup Language
168
SaaS
- Software as a Service
169
SAN
– Storage Area Network
170
SCADA
– System Control and Data Acquisition
171
SCAP
- Security Content Automation Protocol
172
SCEP
- Simple Certificate Enrollment Protocol
173
SCSI
- Small Computer System Interface
174
SDLC
- Software Development Life Cycle
175
SDLM
- Software Development Life Cycle Methodology
176
SEH
– Structured Exception Handler
177
SHA
– Secure Hashing Algorithm
178
SFTP
– Secured File Transfer Protocol
179
SHTTP
– Secure Hypertext Transfer Protocol
180
SIEM
– Security Information and Event Management
181
SIM
– Subscriber Identity Module
182
SLA
– Service Level Agreement
183
SLE
- Single Loss Expectancy
184
SMS
- Short Message Service
185
SMTP
– Simple Mail Transfer Protocol
186
SNMP
- Simple Network Management Protocol
187
SOAP
– Simple Object Access Protocol
188
SONET
– Synchronous Optical Network Technologies
189
SPIM
- Spam over Internet Messaging
190
SQL
– Structured Query Language
191
SSD
– Solid State Drive
192
SSH
– Secure Shell
193
SSL
– Secure Sockets Layer
194
SSO
– Single Sign On
195
STP
– Shielded Twisted Pair
196
TACACS+
– Terminal Access Controller Access Control System
197
TCP/IP
– Transmission Control Protocol / Internet Protocol
198
TGT
– Ticket Granting Ticket
199
TKIP
- Temporal Key Integrity Protocol
200
TLS
- Transport Layer Security
201
TOTP
– Time-Based One-Time Password
202
TPM
– Trusted Platform Module
203
TSIG
– Transaction Signature
204
UAT
- User Acceptance Testing
205
UEFI
– Unified Extensible Firmware Interface
206
UDP
- User Datagram Protocol
207
UPS
- Uninterruptable Power Supply
208
URI
- Uniform Resource Identifier
209
URL
- Universal Resource Locator
210
USB
– Universal Serial Bus
211
UTM
- Unified Threat Management
212
UTP
– Unshielded Twisted Pair
213
VDI
– Virtualization Desktop Infrastructure
214
VLAN
– Virtual Local Area Network
215
VoIP
- Voice over IP
216
VPN
– Virtual Private Network
217
VTC
– Video Teleconferencing
218
WAF
- Web-Application Firewall
219
WAP
– Wireless Access Point
220
WEP
– Wired Equivalent Privacy
221
WIDS
– Wireless Intrusion Detection System
222
WIPS
– Wireless Intrusion Prevention System
223
WPA
– Wireless Protected Access
224
WPA2
– WiFi Protected Access 2
225
WPS
– WiFi Protected Setup
226
WTLS
– Wireless TLS
227
XML
– Extensible Markup Language
228
XSRF
- Cross-Site Request Forgery
229
XSS
- Cross-Site Scripting