Acroynms Flashcards
(74 cards)
What does ACL stand for?
Access Control List
What does AES stand for?
Advanced Encryption Standard
What does AES-256 stand for?
Advanced Encryption Standards 256-bit
What does APT stand for?
Advanced Persistent Threat
What does BCP stand for?
Business Continuity Planning
What does BYOD stand for?
Bring Your Own Device BYOD (Bring Your Own Device) is a policy or practice that allows employees to use their personal devices—like smartphones, tablets, and laptops—for work-related tasks and to access corporate resources.
While BYOD can increase productivity and flexibility, it also introduces security challenges, such as:
• Loss of control over the device
• Risk of data leakage
• Inconsistent patch management
• Greater exposure to malware or compromised networks
To manage these risks, organizations often implement:
• Mobile Device Management (MDM)
• Mobile Application Management (MAM)
• Remote wipe capabilities
• Containerization (separating personal and corporate data on the same device)
• Strong security policies (e.g., password enforcement, encryption)
What does CA stand for?
Certificate Authority
What does CIA stand for?
Confidentiality, Integrity, Availability
What does CIRT stand for?
Computer Incident Response Team
What does CMS stand for?
Content Management System
What does DDoS stand for?
Distributed Denial of Service
What does DHCP stand for?
Dynamic Host Configuration Protocol
What does DMARC stand for?
Domain Message Authentication Reporting and Conformance
What does DNS stand for?
Domain Name System
What does EAP stand for?
Extensible Authentication Protocol
What does GDPR stand for?
General Data Protection Regulation GDPR (General Data Protection Regulation) is a data protection law enacted by the European Union (EU) that went into effect on May 25, 2018. It is designed to protect the privacy and personal data of individuals within the EU and the European Economic Area (EEA).
Key principles of GDPR include:
• Lawfulness, fairness, and transparency
• Purpose limitation (data collected for a specific reason)
• Data minimization (collect only what’s necessary)
• Accuracy
• Storage limitation
• Integrity and confidentiality (security)
• Accountability
It gives individuals (called data subjects) rights over their personal data, such as:
• Right to be informed
• Right of access
• Right to rectification
• Right to erasure (also known as the “right to be forgotten”)
• Right to data portability
Organizations that fail to comply can face heavy fines—up to €20 million or 4% of global annual turnover, whichever is greater.
What does HIDS stand for?
Host-based Intrusion Detection System
What does IAM stand for?
Identity and Access Management
What does IPS stand for?
Intrusion Prevention System
IPS stands for Intrusion Prevention System. It is a network security technology that actively monitors traffic for malicious activity and can automatically take action to block or prevent those threats. It’s like a security guard that not only detects threats but also shuts them down in real time.
IPS is closely related to IDS (Intrusion Detection System), but the key difference is that while IDS only alerts, IPS detects and takes preventive action (like dropping packets, blocking IPs, or resetting connections).
IPS can be deployed in:
• Network-based (NIPS) – Monitors traffic across the network.
• Host-based (HIPS) – Monitors activity on individual systems.
⸻
- What You Need to Know for the Security+ Exam
• IPS vs IDS:
• IDS = Detects and alerts (passive).
• IPS = Prevents and blocks (active).
• Placement: IPS is usually inline, meaning it sits directly in the path of network traffic and can stop malicious packets before they reach their destination.
• Techniques Used:
• Signature-based detection – Matches patterns of known threats.
• Anomaly-based detection – Detects deviations from normal behavior.
• Policy-based detection – Enforces specific rules or policies.
• Common Actions an IPS might take:
• Drop malicious packets.
• Block source IP addresses.
• Reset connections.
• Generate alerts/logs.
• Security+ Exam Tips:
• Be able to differentiate between IDS and IPS in scenarios.
• Know that IPS is proactive and requires careful configuration to avoid blocking legitimate traffic (false positives).
• Be familiar with the types (NIPS, HIPS) and detection methods.
What does IoT stand for?
Internet of Things
What does MFA stand for?
Multifactor Authentication
What does NAT stand for?
Network Address Translation
What does OSINT stand for?
Open-source Intelligence OSINT (Open Source Intelligence) refers to the process of collecting and analyzing publicly available information to produce actionable intelligence. This data can come from a variety of legal and publicly accessible sources, such as:
• Social media platforms
• News articles and press releases
• Government publications
• Search engines
• Online forums
• WHOIS databases
• Public code repositories (like GitHub)
OSINT is widely used in cybersecurity, threat intelligence, and penetration testing to gather information about targets, identify vulnerabilities, and assess risks—all without hacking or unauthorized access.
What does PaaS stand for?
Platform as a Service