Acronyms Flashcards

(315 cards)

1
Q

3DES

A

Triple Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES 256bit

A

Advances Encryption Standard 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASP

A

Application Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AUP

A

Acceptable User Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AV

A

Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BAC

A

Business Availability Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BCP

A

Business Continuity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BIOS

A

Basic Input/ Out put System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BPDU

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CA
Certificate Authority
26
CAC
Common Access Card
27
CAN
Control Area Network
28
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
29
CAR
Corrective Action Report
30
CASB
Cloud Access Security Broker
31
CBC
Cipher Block Chaining
32
CCMP
Counter Mode/ CBC MAC Protocol
33
CCTV
Closed Circuit Television
34
CER
Certificate
35
CER
Cross Over Error Rate
36
CERT
Computer Emergency Response Team
37
CFB
Cipher Feed Back
38
CHAP
Challenge Handshake Authentication Protocol
39
CIO
Chief Information Officer
40
CIRT
Computer Incident Response Team
41
CMS
Content Management System
42
COOP
Continuity of Operations Plan
43
COPE
Corporate Owned, Personally Enabled
44
CP
Contingency plan
45
CRC
Cyclical Redundancy List
46
CRL
Certificate Revocation List
47
CIRST
Computer Security Incident Response Team
48
CSO
Chief Security Officer
49
CSP
Cloud Service Provider
50
CSR
Certificate Signing Request
51
CSRF
Cross Site Request Forgery
52
CSU
Channel Service Unit
53
CTM
Counter- Mode
54
CTO
Chief Technical Officer
55
CTR
Counter
56
CYOD
Choose Your Own Device
57
DAC
Discretionary Access Control
58
DBA
Database Administrator
59
DDoS
Distributed Denial of Service
60
DEP
Data Execution Prevention
61
DER
Distinguished Encoding Rules
62
DES
Digital Encryption Standard
63
DFIR
Digital Forensics and Investigation Response
64
DHCP
Dynamic Host Configuration Protocol
65
DHE
Data-Handling Electronics
66
DHE
Diffie-Hellman Ephermeral
67
DLL
Dynamic Link Library
68
DLP
Data Loss Prevention
69
DMZ
Demilitarized Zone
70
DNAT
Destination Network Address Translation
71
DNS
Domain Name Service (server)
72
DoS
Denial of Service
73
DRP
Discovery Response Plan
74
DSA
Digital Signature Algorithm
75
DSL
Digital Subscriber Line
76
DSU
Data Service Unit
77
EAP
Extensible Authentication Protocol
78
ECB
Electronic Code Book
79
ECC
Elliptic Curve Cryptography
80
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
81
ECDSA
Elliptic Curve Digital Signature algorithm
82
EF
Exposure Factor
83
EFS
Encrypted File System
84
EMI
Electromagnetic Interference
85
EMP
Electro Magnetic Pulse
86
EOL
End of Life
87
ERP
Enterprise Resource Planning
88
ESN
Electronic Serial Number
89
ESP
Encapsulated Security Payload
90
EULA
End User License Agreement
91
FACL
File system Access Control List
92
FAR
False Acceptance Rate
93
FDE
Full Disk Encryption
94
FRR
False Rejection Rate
95
FTP
File Transport Protocol
96
FTPS
File Transport Protocol over Secure Socket Layer
97
GCM
Galois Counter Mode
98
GPG
Gnu Privacy Guard
99
GPO
Group Policy Object
100
GPS
Global Positioning System
101
GPU
Graphics Processing Unit
102
GRE
Generic Routing Encapsulation
103
HA
High Availability
104
HDD
Hard Disk Drive
105
HIDS
Host Based Intrusion Detection system
106
HIPS
Host-based Intrusion Prevention System
107
HMAC
Hashed Message Authentication Code
108
HQTP
HMAC based One Time Password
109
HSM
Hardware Security Module
110
HTML
Hypertext Markup Language
111
HTTP
Hypertext Protocol
112
HTTPS
Hypertext Transfer Protocol over Secure Socket Layer/ Transport Layer Security
113
HVAC
Heating Ventilation and Air conditioning
114
IaaS
Infrastructure as a Service
115
ICMP
Internet Control Message Protocol
116
ICS
Industrial Control System
117
ID
Identification
118
IDEA
International Data Encryption Algorithm
119
IDF
Intermediate Distribution Frame
120
IdP
Identity Provider
121
IDS
Intrusion Detection System
122
IEEE
Institute of Electrical and Electronic Engineering
123
IIS
Internet Informational System
124
IKE
Internet Key Exchange
125
IM
Instant Message
126
IMAP 4
Internet Message Access Protocol version 4
127
IoT
Internet of Things
128
IP
Internet Protocol
129
IPSec
Internet Protocol Security
130
IR
Incident Response
131
IR
Infrared
132
IRC
Internet Relay Chat
133
IRP
Incident Response Plan
134
ISA
Interconnection Security Agreement
135
ISP
Internet Service Provider
136
ISSO
Information Systems Security Officer
137
ITCP
IT Contingency Plan
138
IV
Initialization Vector
139
KDC
Key Distribution Center
140
KEK
Key Encryption Key
141
L2TP
Layer 2 Tunneling Protocol
142
LAN
Local Area Network
143
LDAP
Lightweight Directory Access Protocol
144
LEAP
Lightweight Extensible Authentication Protocol
145
Maas
Monitoring as a Service
146
MAC
Mandatory Access Control Media Access Control Message Authentication Code
147
MAN
Metropolitan Area Network
148
MBR
Master Boot Record
149
MD5
Message Digest 5
150
MDF
Main Distribution Frame
151
MDM
Mobile Device Management
152
MFA
MultiFactor Authentication
153
MFD
Multifunction Device
154
MIME
Multipurpose Internet Mail Exchange
155
MITM
Man in the Middle
156
MMS
Multimedia Message Service
157
MOA
Memorandum of Agreement
158
MOTD
Message of the Day
159
MOU
Memorandum of Understanding
160
MPLS
Multi-Protocol Label Switching
161
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
162
MSP
Managed Services Provider
163
MTBF
Mean Time Between Failures
164
MTTF
Mean Time to Failure
165
MTTR
Mean Time to Recovery Mean Time to Repair
166
MTU
Maximum Transmission Unit
167
NAC
Network Access Control
168
NAT
Network Address Translator
169
NDA
Non-Disclosure Agreement
170
NFC
Near Field Communication
171
NGAC
Next Generation Access Control
172
NIDS
Network based Intrusion Detection System
173
NIPS
Network based Intrusion Prevention System
174
NIST
National Institute of Standards & Technology
175
NTFS
New Technology File System
176
NTLM
New Technology LAN Manager
177
NTP
Network Time Protocol
178
OAUTH
Open Authentication
179
OSCP
Online Certificate Status Protocol
180
OID
Object Identifier
181
OS
Operating System
182
OTA
Over The Air
183
OVAL
Open Vulnerability Assessment Language
184
P12
PKCS # 12
185
P2P
Peer to Peer
186
PaaS
Platform as a Service
187
PAC
Proxy Auto Configuration
188
PAM
Pluggable Authentication Modules
189
PAP
Password Authentication Protocol
190
PAT
Port Address Translation
191
PBKDF2
Password Based Key Derivation Function 2
192
ECB
Electronic Codebook
193
CFB
Cipher Feedback
194
OFB
Output Feedback
195
PFS
Perfect Forward Secrecy
196
PBX
Private Branch Exchange
197
PCAP
Packet Capture
198
PEAP
Protected Extensible Authentication Protocol
199
PED
Personal Electronic Device
200
PEM
Private enhanced Electronic Mail
201
PFS
Perfect Forward Secrecy
202
PFX
Personal Exchange Format
203
PGP
Pretty Good Privacy
204
PHI
Personal Health Information
205
PII
Personally Identifiable Information
206
PIV
Personal Identity Verification
207
PKI
Public Key Infrastructure
208
POODLE
Padding Oracle on Downgrade Legacy Encryption
209
POP
Post Office Protocol
210
POTS
Plain Old Telephone Service
211
PPP
Point to Point Protocol
212
PPTP
Point to Point Tunneling Protocol
213
PSK
Pre Shared Key
214
PTZ
Pan Tilt Zoom
215
RA
Recovery Agent Registration Authority
216
RADIUS
Remote Authentication Dial in User Service
217
RAID
Redundant Array of Inexpensive Disks
218
RAS
Remote Access Server
219
RAT
Remote Access Trojan
220
RBAC
Role Based Access Control Rule Based Access Control
221
RC4
Rivest Cipher version 4
222
RDP
Remote Desktop Protocol
223
REST
Representational State Transfer
224
RFID
Radio Frequency Identifier
225
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
226
ROI
Return onInvestment
227
RMF
Risk Management Framework
228
RPO
Recovery Point Objective
229
RSA
Rivets Shamir & Adleman
230
RTBH
Remotely Triggered Black Hole
231
RTO
Recovery Time Objective
232
RTOS
Real Tome Operation System
233
RTP
Real time Transport Protocol
234
S/MIME
Secure/Multipurpose Internet Mail Extensions
235
SaaS
Software as a Service
236
SAML
Security Assertions Markup Language
237
SAN
Storage Area Network Subject Alternative Name
238
SCADA
System Control and Data Acquisition
239
SCAP
Security Content Automation Protocol
240
SCEP
Simple Certificate Enrollment Protocol
241
SCP
Secure Copy
242
SCSI
Small Computer System interface
243
SDK
Software Development Kit
244
SDLC
Software Development Life Cycle
245
SDLM
Software Development Life Cycle Methodology
246
SDN
Software Defined Network
247
SED
Self encrypting Drive
248
SEH
Structured Exception Handler
249
SFTP
Secured File Transfer Protocol
250
SIEM
Security Information and Event Management
251
SIM
Subscriber Identity Module
252
SIP
Session Initiation Protocol
253
SIPS
Session Initiation Protocol Secure
254
SLA
Service Level Agreement
255
SLE
Single Loss Expectancy
256
SMB
Server Message Block
257
SMS
Short Message Service
258
SMTP
Simple Mail Transfer Protocol
259
SMTPS
Simple Mail Transfer Protocol Secure
260
SNMP
Simple Network Management Protocol
261
SOAP
Simple Object Access Protocol
262
SoC
System on Chip
263
SPF
Sender Policy Framework
264
SPIM
Spam over Internet messaging
265
SPoF
Single Point Of Failure
266
SQL
Structure Query Language
267
SRPT
Secure Real-Time Protocol
268
SSD
Solid State Drive
269
SSID
Service Set Identifier
270
SSH
Secure Shell
271
SSL
Secure Socket Layer
272
SSO
Single Sign On
273
SSP
System Security Plan
274
STP
Shield Twisted Pair
275
TACACS +
Terminal Access Controller Access Control System Plus
276
TCO
Total Cost of Ownership
277
TCP/IP
Transmission Control Protocol/Internet Protocol
278
TGT
Ticket Granting Ticket
279
TKIP
Temporal Key Integrity Protocol
280
TLS
Transport Layer Security
281
TOTP
Time-based One-Time Password
282
TPM
Trusted Platform Module
283
TSIG
Transaction Signature
284
UAT
User Acceptance Testing
285
UAV
Unmanned Aerial Vehicle
286
UDP
User Datagram Protocol
287
UEFI
Unified Extensible Firmware Interface
288
UPS
Uninterrupted Power Supply
289
URI
Uniform Resource Identifier
290
URL
Universal Resource Locator
291
USB
Universal Serial Bus
292
USB OTG
USB On The Go
293
UTM
Unified Threat Management
294
UTP
Unshielded Twisted Pair
295
VDE
Virtual Desktop Environment
296
VDI
Virtual Desktop Infrastructure
297
VLAN
Virtual Local Area Network
298
VLSM
Variable Length Subnet Masking
299
VM
Virtual Machine
300
VoIP
Voice over IP
301
VPN
Virtual Private Network
302
VTC
Video Teleconferencing
303
WAF
Web Application Firewall
304
WEP
Wired Equivalent Privacy
305
WIDS
Wireless Intrusion Detection System
306
WIPS
Wireless Intrusion Prevention System
307
WORM
Write Once Read Many
308
WPA
Wi-Fi Protected Access
309
WPA2
Wi-Fi Protected Access 2
310
WPS
Wi-Fi Protected Setup.
311
WTLS
Wireless TLS
312
XML
Extensible Markup Language
313
XOR
Exclusive Or
314
XSFR
Cross-site Request Forgery
315
XSS
Cross-site Script