Acronyms (A-L) - ECPI Flashcards

(143 cards)

1
Q

3DES

A

Triple Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES256

A

Advanced Encryption Standards 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ASP

A

Application Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AV

A

Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BAC

A

Business Availability Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BPDU

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BYOD
Bring Your Own Device
26
CA
Certificate Authority
27
CAC
Common Access Card
28
CAN
Controller Area Network
29
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
30
CAR
Corrective Action Report
31
CBC
Cipher Block Chaining
32
CCMP
Counter-Mode/CBC-Mac Protocol
33
CCTV
Closed-circuit Television
34
CER
Certificate
35
CER
Cross-over Error Rate
36
CERT
Computer Emergency Response Team
37
CFB
Cipher Feedback
38
CHAP
Challenge Handshake Authentication Protocol
39
CIO
Chief Information Officer
40
CIRT
Computer Incident Response Team
41
CMS
Content Management System
42
COOP
Continuity of Operations Plan
43
COPE
Corporate Owned, Personally Enabled
44
CP
Contingency Planning
45
CRC
Cyclical Redundancy Check
46
CRL
Certificate Revocation List
47
CSIRT
Computer Security Incident Response Team
48
CSO
Chief Security Officer
49
CSP
Cloud Service Provider
50
CSR
Certificate Signing Request
51
CSRF
Cross-site Request Forgery
52
CSU
Channel Service Unit
53
CTM
Counter-Mode
54
CTO
Chief Technology Officer
55
CTR
Counter
56
CYOD
Choose Your Own Device
57
DAC
Discretionary Access Control
58
DBA
Database Administrator
59
DDoS
Distributed Denial of Service
60
DEP
Data Execution Prevention
61
DER
Distinguished Encoding Rules
62
DES
Digital Encryption Standard
63
DFIR
Digital Forensics and Investigation Response
64
DHCP
Dynamic Host Configuration Protocol
65
DHE
Data-Handling Electronics
66
DHE
Diffie-Hellman Ephemeral
67
DLL
Dynamic Link Library
68
DLP
Data Loss Prevention
69
DMZ
Demilitarized Zone
70
DNAT
Destination Network Address Transaction
71
DNS
Domain Name Service (Server)
72
DoS
Denial of Service
73
DRP
Disaster Recovery Plan
74
DSA
Digital Signature Algorithm
75
DSL
Digital Subscriber Line
76
DSU
Data Service Unit
77
EAP
Extensible Authentication Protocol
78
ECB
Electronic Code Book
79
ECC
Elliptic Curve Cryptography
80
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
81
ECDSA
Elliptic Curve Digital Signature Algorithm
82
EFS
Encrypted File System
83
EMI
Electromagnetic Interference
84
EMP
Electro Magnetic Pulse
85
ERP
Enterprise Resource Planning
86
ESN
Electronic Serial Number
87
ESP
Encapsulated Security Payload
88
EF
Exposure Factor
89
FACL
File System Access Control List
90
FAR
False Acceptance Rate
91
FDE
Full Disk Encryption
92
FRR
False Rejection Rate
93
FTP
File Transfer Protocol
94
FTPS
Secured File Transfer Protocol
95
GCM
Galois Counter Mode
96
GPG
Gnu Privacy Guard
97
GPO
Group Policy Object
98
GPS
Global Positioning System
99
GPU
Graphic Processing Unit
100
GRE
Generic Routing Encapsulation
101
HA
High Availability
102
HDD
Hard Disk Drive
103
HIDS
Host-based Intrusion Detection System
104
HIPS
Host-based Intrusion Prevention System
105
HMAC
Hashed Message Authentication Code
106
HOTP
HMAC-based One-Time Password
107
HSM
Hardware Security Module
108
HTML
Hypertext Markup Language
109
HTTP
Hypertext Transfer Protocol
110
HTTPS
Hypertext Transfer Protocol over SSL/TLS
111
HVAC
Heating, Ventilation and Air Conditioning
112
IaaS
Infrastructure as a Service
113
ICMP
Internet Control Message Protocol
114
ICS
Industrial Control Systems
115
ID
Identification
116
IDEA
International Data Encryption Algorithm
117
IDF
Intermediate Distribution Frame
118
IdP
Identity Provider
119
IDS
Intrusion Detection System
120
IEEE
Institute of Electrical and Electronic Engineers
121
IIS
Internet Information System
122
IKE
Internet Key Exchange
123
IM
Instant Messaging
124
IMAP4
Internet Message Access Protocol v4
125
IoT
Internet of Things
126
IP
Internet Protocol
127
IPSec
Internet Protocol Security
128
IR
Incident Response
129
IR
Infrared
130
IRC
Internet Relay Chat
131
IRP
Incident Response Plan
132
ISA
Interconnection Security Agreement
133
ISP
Internet Service Provider
134
ISSO
Information Systems Security Officer
135
ITCP
IT Contingency Plan
136
IV
Initialization Vector
137
KDC
Key Distribution Center
138
KEK
Key Encryption Key
139
L2TP
Layer 2 Tunneling Protocol
140
LAN
Local Area Network
141
LDAP
Lightweight Directory Access Protocol
142
LEAP
Lightweight Extensible Authentication Protocol
143
MaaS
Monitoring as a Service