Acronyms for Security + Flashcards

(295 cards)

1
Q

AAA

A

Authentication, Authorization, and Accounting

A framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List

access rights each user has to a particular system object, such as a file directory or individual file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard

Symmetric Encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES-256

A

Advanced Encryption Standards 256-bit

A version of the AES using a 256-bit key size for encryption,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AH

A

Authentication Header

part of the IPsec protocol that provides authentication and integrity to the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AIS

A

Automation Indicator Sharing

system that allows exchange of cyber threat indicators between public and private sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ALE

A

Annualized Loss Expectancy

risk management concept to estimate the monetary loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AP

A

Access Point

Network hardware device that allows other WIFI devices to connect to a wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

APT

A

Advanced Persistent Threat

Cyberattack where intruder gains access to a network and remains undetected for a long time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ARO

A

Annualized Rate of Occurrence

Frequency which a event is likely to occur annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARP

A

Address Resolution Protocol

Communication protocol used for discovering link layer address (mac)

Port 219

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ASLR

A

Address Space Layout Randomization

Security Technique preventing memory corruption vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ATT&CK

A

Adversarial Tactics, Techniques and common Knowledge

maintained by MITRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BASH

A

Unix shell command language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BCP

A

Business Continuity Planning

prevention and recovery from potential threats to a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BGP

A

Border Gateway Protocol

Protocol used to route information across the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BIA

A

Business Impact Analysis

evalutes potential effects of natural and man-made events on business operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BPA

A

Business Partners Agreement

contract between parties who agreed to share resources to undertake a specific project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BPDU

A

Bridge Protocol Data Unit

network message transmitted by LAN bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CAR

A

Corrective Action Report

report outlines the corrective actions necessary to rectify a detected non-conformance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CASB
Cloud Access Security Broker security policy enforcement points placed between cloud service consumers and cloud service providers
26
CBC
Cipher Block Chaining provides confidentiality but not message intergrity
27
CCMP
Counter mode/CBC-MAC Protocol encryption protocol used in WIFI Networks
28
CCTV
Closed-circuit Television
29
CERT
Computer Emergency Response Team
30
CFB
Cipher Feedback mode operation for block cipher
31
CHAP
Challenge Handshake Authentication Protocol
32
CIA
Confidentiality, Integrity, Availability
33
CIO
Chief Information Officer
34
CIRT
Computer Incident Response Team contact when security breach emergency occurs
35
CMS
Content Management System software creates, manages content on a website
36
COOP
Continuity of Operation Planning process by gov agencies to ensure critical functions continue during wide range of emergencies
37
COPE
Corporate Owned, Personally Enabled corpo owned IT devices for personal use
38
CP
Contingency Planning action that helps organization respond to significant future event or situations
39
CRC
Cyclical Redundancy Check code - detect accidental changes to raw data
40
CRL
Certificate Revocation List revoked by issuing certificate authority
41
CSO
Chief Security Officer
42
CSP
Cloud Service Provider company that offers some component of cloud computing
43
CSR
Certificate Signing Request applying for digital identity Certificate
44
CSRF
Cross-site Request Forgery malicious exploit of website where unauthorized commands are transmitted from a user that the web application trusts
45
CSU
Channel Service Unit device used in digital data transmission for interfacing a digital data terminal with a digital transmission medium
46
CTM
Counter Mode mode of operation in cryptography for block ciphers
47
CTO
Chief Technology Officer
48
CVE
Common Vulnerability Enumeration list of publicly disclosed cybersecurity vulnerabilities
49
CVSS
Common Vulnerability Scoring System industry standard for assessing the severity of computer system security vulnerabilities
50
CYOD
Choose Your Own Device
51
DAC
Discretionary Access Control access control defined by ACL where access rights are assigned to users by the system
52
DBA
Database Administrator
53
DDoS
Distributed Denial of Service
54
DEP
Data Execution Prevention security feature that helps prevent damage to the computer from virus and other threats
55
DES
Digital Encryption Standard Encryption of data
56
DHCP
Dynamic Host Configuration Protocol assigns IP addresses automatically to each device on network
57
DHE
Diffie-Hellman Ephermal secure exchange cryptographic keys over public channel
58
DKIM
Domain Keys Identified Mail email authentication method designed to detect forage sender addresses in emails
59
DLL
Dynamic Link Library feature on windows that allow mulitple software programs to share same functionality
60
DLP
Data Loss Prevention set of tools and processes used to ensure that sensitive data is not loss misused or accessed by unauth users
61
DMARC
Domain Message Authentication Reporting and Conformance email authentication protocol, prevent email spoofing
62
DNAT
Destination Network Address Translation technique for transparently changing the destination IP address of an end route packet
63
DNS
Domain Name Service
64
DoS
Denial of Service
65
DPO
Data Privacy Officer
66
DRP
Disaster Recovery Plan
67
DSA
Digital Signature Algorithm
68
DSL
Digital Subscriber Line
69
EAP
Extensible Authentication Protocol authentication framework used for wireless networks
70
ECB
Electronic Code Book mode of operation for a block cipher
71
ECC
Elliptic Curve Cryptography approach to public key cryptography
72
ECDHE
Elliptic Curven Diffie-Hellman Ephemeral ECDHE is one of the three main algorithms used for the initial TLS handshake, are classified as asymmetric algorithms because one party has a secret key and the other party has a public key.
73
ECDSA
Elliptic Curve Digital Signature Algorithm used on bitcoin
74
EDR
Endpoint Detection and Response cybersecurity technology that addresses need for continuous monitoring
75
EFS
Encrypted File System feature on Microsoft Windows that provides filesystem - level encryption
76
ERP
Enterprise Resource Planning business process management software that allows organizations to use a system of integrated applications
77
ESN
Electronic Serial Number
78
ESP
Encapsulated Security Payload component of IPsec used for confidentiality
79
FACL
File System Access Control List data structure that controls access to files and folders
80
FDE
Full Disk Encryption
81
FIM
File Integrity Management
82
FPGA
Field Programmable Gate Array
83
FRR
False Rejection Rate likelihood that biometric security system will incorrectly reject access attempt by auth user
84
FTP
File Transfer Protocol Network Protocol used for transfer of computer files between a client and server on a computer network
85
FTPS
File Transfer Protocol Secure
86
GCM
Galosis Counter mode mode of operation for symmetric key cryptographic block ciphers
87
GDPR
General Data Protection Regulation in the Europe
88
GPG
GNU Privacy Guard free software to encrypt data
89
GPO
Group Policy Object feature of Windows that provides centralized mangement
90
GPS
Global Positioning System
91
GPU
Graphics Processing Unit
92
GRE
Generic Routing Encapsulation tunneling protocol, encapsulate layers of network protocols
93
HA
High Availability Refers to systems that are durable
94
HDD
Hard Disk Drive
95
HIDS
Host-based Intrusion Detection System
96
HIPS
Host-based Intrusion Prevention system
97
HMAC
Hashing Message Authentication Code
98
HOTP
HMAC-based One-time Password
99
HSM
Hardware Security Module
100
HTML
Hypertext Markup Language
101
HTTP
Hypertext Transfer Protocol
102
HTTPS
Hypertext Transfer Protocol Secure
103
IaaS
Infrastructure as a Service
104
IaC
Infrastructure as Code
105
IAM
Identity and Access Management framework of business processes, policies, and tech
106
ICMP
Internet Control Message Protocol sends error messages
107
ICS
Industrial Control Systems
107
IDEA
International Data Encryption Algorithm symmetric key block cipher
108
IDF
Intermediate Distribution Frame cable rack that interconnects telecom wiring
109
IdP
Identity Provider provides principal authentication to other service providers within a federation or distrubuted network
110
IDS
Intrusion Detection System
111
IEEE
Institute of Electrical and Electronics Engineers
112
IKE
Internet Key Exchange protocol used on IPsec for establishing SA
113
IM
Instant Message
114
IMAP
Internet Message Access Protocol used by email clients to retrieve messages from a mail server over TCP/IP
115
IoC
Indicators of Compromise
116
IoT
Internet of Things
117
IP
Internet Protocol
118
IPS
Intrustion Prevention System
119
IPSec
Internet Protocol Security secure network protocol suite that auth and encrypts packet of data sent over internet protocol network
120
IR
Incident Response
121
IRP
Incident Response Plan
122
ISO
International Standards Organization
123
ISP
Internet Service Provider
124
ISSO
Information System Security Officer
125
IV
Initialization Vector a fixed size input to a cryptographic primitive that is typically required to be random or pseudorandom
126
KDC
Key Distribution Center part of crypto system intended to reduce the risks, inherit and exchanging keys
127
KEK
key encryption key
128
LAN
local area network
129
LDAP
Lightweight Directory Access Protocol protocol for accessing and maintaining distributive directory information services over Internet
130
LEAP
lightweight extensible authentication protocol wireless LAN authentication method
131
MaaS
monitoring as a service
132
MAC
Message Authentication Code
133
MAN
Metropolitan area network
134
MBR
Master boot record special type of boot sector at the very beginning of a partitioned computer mask storage device
135
MD5
message digest 5 cryptographic hash function produces a 128-bit hash value not secure
136
MDF
Main distribution frame frame for connecting equipment to cables and subscriber carrier equipment
137
MDM
Mobile device management
138
MFA
Multi-Factor authentication
139
MFD
Multi-Function device
140
MFP
multifunction printer
141
ML
machine learning
142
MOA
memorandum of agreement document written between parties to cooperatively work together on agreed upon project or meet agreed upon objective
143
MOU
Memorandum of Understanding agreement between two or more parties outlined in a formal document
144
MPLS
Multi-Protocol label switching
145
MSA
Master Service Agreement contract reached between parties in which parties agree to most of the terms that will govern future transactions
146
MSCHAP
Microsoft challenge handshake authentication protocol
147
MSP
Managed Service Provider
148
MSSP
Managed Security Service Provider
149
MTBF
meantime between failure measure of how reliable a hardware product is
150
MTTF
Meantime to Failure length of time a device is expected to last in operation
151
MTTR
Mean Time to Recover average time that a device will take to recover from any failure
152
MTU
Maximum Transmission Unit largest packet that a network product will can transmit
153
NAC
Network access control security solution that enforces policy on devices the access networks
154
NAT
Network address translation method of remapping one address space into another
155
NGFW
next generation firewall
156
NIDS
Network-Based intrusion detection system analyzes incoming Network traffic
157
NIPS
Network based intrusion prevention system
158
NIST
national institution of standards and technology
159
NTFS
New technology file system developed by Microsoft
160
NTLM
New technology Lan manager Suits of Microsoft security protocols
161
NTP
Network Time Protocol protocol for clock synchronization between computer systems
162
OAUTH
Open authorization Internet users Grant websites access their information
163
OCSP
Online Certification Status Protocol protocol used to obtaining revocation status of digital certification
164
OID
Object Identifier An internet protocol used for obtaining the revocation status of an X.509 digital certificate.
165
OS
Operating System
166
OSINT
Open Source Intelligence
167
OSPF
Open Shortest path First routing protocol for IP
168
OT
Operational Technology Hardware and software that detects or causes a change through the direct monitoring and/or control of physical devices, processes, and events in the enterprise.
169
OTA
Over the Air
170
OVAL
Open Vulnerability Assessment Language
171
P12
PKCS 12 A portable format for storing or transporting a user's private keys, certificates, and miscellaneous secrets.
172
P2P
Peer to Peer
173
Paas
Platform as a Service
174
PAC
Proxy Auto Configuration
175
PAM
Pluggable Authentication Mangement
176
PAP
Pluggable Authentication Protocol
177
PAT
Port Address Translation
178
PBKDF2
Password-based Key Derivation Function 2 reduce the vulnerability of passwords to brute-force attacks.
179
PBX
Private Branch Exchange private telephone network used within a company or organization.
180
PCAP
Packet Capture
181
PCI DSS
Payment Card Industry Data Security Standard
182
PDU
Power Distribution Unit
183
PEAP
Protected Extensible Authentication Protocol security protocol that encrypts authentication data using 802.11 Wi-Fi networks
184
PED
Personal Electronic Device
185
PEM
Privacy Enhanced Mail
186
PFS
Perfect Forward Secrecy
187
PGP
Pretty Good Privacy
188
PHI
Personal Health Information
189
PII
Personally Identifiable Information
190
PIV
Personal Identity Verification
191
PKCS
Public Key Cryptography Standards
192
PKI
Public Key Infrastructure
193
POTS
Plain Old Telephone Service
194
PPP
Pont-to-Point Protocol data link protocol commonly used to establish a direct connection between two networking nodes.
195
PSK
Pre-shared Key
196
PTZ
Pan-tilt-zoom
197
PUP
Potentially Unwanted Program
198
RA
Recovery Agent
199
RA
Registration Authority
200
RAD
Rapid Application Development
201
RADIUS
Remote Authentication Dial-in User Service protocol that provides centralized AAA
202
RAID
Redundant Array of Inexpensive Disk
203
RAS
Remote Access Server
204
RAT
Remote Access Trojan
205
RBAC 1/2
Role-Based Access Control
206
RBAC 2/2
Rule-Based Access Control
207
RC4
Rivest Cipher version 4 symmetric key stream cipher that encrypts messages one byte at a time.
208
RDP
Remote Desktop Protocol Port 3389
209
RFID
Radio Frequency Identifier
210
RIPEMD
(RACE Integrity Primitives Evaluation Message Digest): hashing method no longer secure
211
ROI
Return on Investment
212
RPO
Recovery Point Objective The maximum acceptable amount of data loss measured in time.
213
RSA
Rivest, Shamir, Adleman public-key cryptography system
214
RTBH
Remotely Triggered Black Hole technique used to block denial-of-service attacks in IP networks.
215
RTO
Recovery Time Objective The targeted duration of time and a service level within which a business process must be restored after a disaster or disruption.
216
RTOS
Real Time Operating System
217
RTP
Real-time Transport Protocol network protocol for delivering audio and video over IP networks.
218
S/MIME
Secure/Multipurpose Internet Mail Extension
219
SaaS
Software as a Service
220
SAE
Simultaneous Authentication of Equals A security protocol used in Wi-Fi networks.
221
SAML
Security Assertions Markup Language open standard for exchanging authentication and authorization data between parties
222
SAN 1/2
Storage Area Network
223
SAN 2/2
Subject Alternative Name extension to X.509 specification that allows users to specify additional host names for a single SSL certificate.
224
SASE
Secure Access Service Edge network architecture that combines WAN capabilities with comprehensive security functions.
225
SCADA
Supervisory Control and Data Acquisition
226
SCAP
Security Content Automation Protocol specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation.
227
SCEP
Simple Certificate Enrollment Protocol protocol used for the secure issuance of digital certificates.
228
SD-WAN
Software-defined Wide Area Network
229
SDK
Software Development Kit
230
SDLC
Software Development Lifecycle
231
SDLM
Software Development Lifecycle Methodology
232
SDN
Software-defined Network
233
SE Linux
Security-enhanced Linux
234
SED
Self-encrypting Drives
235
SEH
Structure Exception Handler
236
SFTP
Secured File Transfer Protocol
237
SHA
Secure Hashing Algorithm
238
SHTTP
Secure Hypertext Transfer Protocol
239
SIEM
Security Information and Event Management
240
SIM
Subscriber Identity Module
241
SLA
Service-level Agreement commitment between a service provider and a client. Particular aspects of the service – quality, availability, responsibilities – are agreed upon between the service provider and the service user.
242
SLE
Single Loss Expectancy term used in risk management referring to the monetary value expected from the occurrence of a risk on an asset.
243
SMTP
Simple Mail Transfer Protocol
244
SMTPS
Simple Mail Transfer Protocol Secure
245
SNMP
Simple Network Management Protocol
246
SOAP
Simple Object Access Protocol
247
SOAR
Security Orchestration, Automation, and Response a set of tools and services that automate cyberattack response and prevention.
248
SoC
System on Chip
249
SOC
Security Operations Center
250
SOW
Statement of Work It defines project-specific activities, deliverables, and timelines for a vendor providing services to the client.
251
SPF
Sender Policy Framework email authentication method lists the servers that can send emails from a domain
252
SPIM
Spam over Internet Message
253
SQLi
SQL Injection
254
SRTP
Secure Real-Time Protocol
255
SSD
Solid State Drive
256
SSH
Secure Shell
257
SSL
Secure Socket Layer
258
SSO
Single Sign In
259
STIX
Structured Threat Information eXchange language and serialization format used to exchange cyber threat intelligence.
260
SWG
Secure Web Gateway
261
TACACS+
Terminal Access Controller Access Control System plus
262
TAXII
Trusted Automated eXchange of Indicator Information the format through which threat intelligence data is transmitted
263
TCP/IP
Transmission Control Protocol/Internet Protocol
264
TGT
Ticket Granting Ticket part of the Kerberos protocol used for authenticating requests for service tickets within the network.
265
TKIP
Temporal Key Integrity Protocol security protocol used in the IEEE 802.11 wireless networking standard.
266
TLS
Transport Layer Security
267
TOC
Time-of-Check problem where the state of a system can change between the time it is checked and the time it is used.
268
TOTP
Time-Based One-Time Password
269
TOU
Time of Use
270
TPM
Trusted Platform Module
271
TTP
Tactics, Techniques and Procedures
272
TSIG
Transaction Signature protocol used for securing updates to DNS, which is based on shared secret key cryptography.
273
UAT
User Acceptance Testing
274
UAV
Unmanned Arial Vehicle
275
UDP
User Datagram Protocol messages between computing devices in a network. It's used for time-sensitive transmissions.
276
UEFI
Unified Extensible Firmware Interface replaces BIOS
277
UEM
Unified Endpoint Mangement
278
UPS
Uninterruptible Power Supply
279
URI
Uniform Resource Identifier
280
UTM
Unified Threat Management
281
UTP
Unshielded Twisted Pair
282
VBA
Visual Basic for Applications computer programming language
283
VDE
Virtual Desktop Environment
284
VDI
Virtual Desktop Infrastructure
285
VLAN
Virtual Local Area Network
286
VLSM
Variable Length Subnet Masking
287
VM
Virtual Machine
288
VoIP
Voice over Internet Protocol
289
VPC
Virtual Private Cloud
290
VPN
Virtual Private Network
291
VTC
Video Teleconferencing
292
WAF
Web Application Firewall
293
WAP
Wirless Access Point
294
WEP
Wired Equivalent Prvacy