All Acronyms Flashcards
(203 cards)
1
Q
AUP
A
Acceptable Use Policy
2
Q
ACL
A
Access Control List
3
Q
AP
A
Access Point
4
Q
ARP
A
Address Resolution Protocol
5
Q
APT
A
Advanced Persistent Threat
6
Q
GCMP
A
AES Galois Counter Mode Protocol
7
Q
ALE
A
Annualized Loss Expectancy
8
Q
ARO
A
Annualized Rate of Occurrence
9
Q
A-V
A
Anti-Virus
10
Q
AAA
A
Authentication
Authorization
Accounting
11
Q
BYOD
A
Bring Your Own Device
12
Q
BC
A
Business Continuity
13
Q
BEC
A
Business E-mail Compromise
14
Q
BIA
A
Business Impact Analysis
15
Q
BPA
A
Business Partnership Agreement
16
Q
CRL
A
Certificate Revocation List
17
Q
CSR
A
Certificate Signing Request
18
Q
CIO
A
Chief Information Officer
19
Q
CSO
A
Chief Security Officer
20
Q
CTO
A
Chief Technology Officer
21
Q
CYOD
A
Choose Your Own Device
22
Q
CIA Triad
A
Confidentiality
Integrity
Availability
(Non-Repudiation)
23
Q
CSP
A
Cloud Service Provider
24
Q
C2
A
Command and Control
25
CN
Common Name
26
CVE
Common Vulnerabilities and Exposures
27
CVSS
Common Vulnerability Scoring System
28
CIRT
Computer Incident Response Team
29
CBT
Computer-Based Training
30
COOP
Continuity of Operations Plan
31
COBO
Corporate Owned, Business Only
32
COPE
Corporate Owned, Personally Enabled
33
CSRF
Cross-site Request Forgery
34
XSS
Cross-Site Scripting
35
CTI
Cyber Threat Intelligence
36
CSF
Cybersecurity Framework
37
DLP
Data Loss Prevention
38
DoS
Denial of Service Attack
39
DevSecOps
Development
Security
Operations
40
DH
Diffie-Hellman
41
DR
Disaster Recovery
42
DAC
Discretionary Access Control
43
DN
Distinguished Name
44
DDoS
Distributed Denial-of-Service
45
DRDoS
Distributed Reflected DoS
46
DNS
Domain Name System
47
DOM
Document Object Model
48
DNSSEC
Domain Name System Security Extensions
49
DMARC
Domain-based Message authentication, Reporting, and Conformance
50
DKIM
DomainKeys Identified Mail (DKIM)
51
ESP
Encapsulating Security Payload
52
EDR
Endpoint Detection and Response
53
ERM
Enterprise Risk Management
54
EF
Exposure Factor
55
EAP
Extensible Authentication Protocol
56
EAPoL
Extensible Authentication Protocol over LAN
57
XML
eXtensible Markup Language
58
FAR
False Acceptance Rate
59
FRR
False Rejection Rate
60
FIM
File Integrity Monitoring
61
FTP
File Transfer Protocol
62
FTPS
File Transfer Protocol Secure
63
FDE
Full Disk Encryption
64
GPS
Global Positioning System
65
GPO
Group Policy Object
66
HMAC
Hash-Based Message Authentication Code
67
HIPAA
Health Insurance Portability and Accountability Act
68
HA
High Availability
69
HIDS
Host-Based Intrusion Detection System
70
HIPS
Host-Based Intrusion Prevention System
71
HMI
Human-Machine Interface
72
IAM
Identity and Access Management
73
IRP
Incident Response Plan
74
IoC
Indicator of Compromise
75
IPS
Indoor Positioning System
76
ICS
Industrial Control System
77
ISAC
Information Sharing and Analysis Center
78
IaaS
Infrastructure as a Service
79
IaC
Infrastructure as Code
80
IKE
Internet Key Exchange
81
IMAP
Internet Message Access Protocol
82
IoT
Internet of Things
83
IP
Internet Protocol
84
IPSec
Internet Protocol Security
85
IRC
Internet Relay Chat
86
IDS
Intrusion Detection System
87
IPS
Intrusion Prevention System
88
IPFIX
IP Flow Information Export
89
ITIL
IT Infrastructure Library
90
JSON
JavaScript Object Notation
91
KDC
Key Distribution Centre
92
KEK
Key Encryption Key
93
KRI
Key Risk Indicator
94
LLR
Lessons Learned Report
95
LDAP
Lightweight Directory Access Protocol
96
ML
Machine Learning
97
MAC
Mandatory Access Control
98
MSA
Master Service Agreement
99
MTD
Maximum Tolerable Downtime
100
MTBF
Mean Time Between Failures
101
MTTR
Mean Time to Repair/Replace/Recover
102
MAC Filtering
Media Access Control Filtering
103
MoA
Memorandum of Agreement
104
MoU
Memorandum of Understanding
105
MD5
Message Digest Algorithm version 5
106
MEF
Mission Essential Function
107
MDM
Mobile Device Management
108
MFA
Multifactor Authentication
109
NIST
National Institute of Standards and Technology
110
NFC
Near-Field Communication
111
NAC
Network Access Control
112
NBAD
Network Behavior Anomaly Detection
113
NFV
Network Functions Virtualization
114
NGFW
Next-Generation Firewall
115
NDA
Nondisclosure Agreement
116
NTLM Authentication
Windows New Technology LAN Manager Authentication
117
OTP
One-Time Password
118
OCSP
Online Certificate Status Protocol
119
OAuth
Open Authorization
120
OSINT
Open-Source Intelligence
121
OOB Management
Out of Band Management
122
PCI DSS
Payment Card Industry Data Security Standard
123
PFS
Perfect Forward Secrecy
124
PAN
Personal Area Network
125
PIN
Personal Identification Number
126
PaaS
Platform as a Service
127
PAM
Pluggable Authentication Module
128
PPTP
Point-to-Point Tunneling Protocol
129
SPAN
Switched Port Analyzer
130
POP
Post Office Protocol
131
PUP
Potentially Unwanted Program
132
PDU
Power Distribution Unit
133
PSK
Pre-shared key
134
PAM
Privileged Access Management
135
PKCS
Public Key Cryptography Standards
136
PKI
Public Key Infrastructure
137
RFID
Radio-Frequency ID
138
RTOS
Real-Time Operating System
139
RPO
Recovery Point Objective
140
RTO
Recovery Time Objective
141
RAT
Remote Access Trojan
142
RADIUS
Remote Authentication Dial-In User Service
143
RCE
Remote Code Execution
144
RDP
Remote Desktop Protocol
145
REST
Representational State Transfer
146
RBAC
Role-Based Access Control
147
ROE
Rules of Engagement
148
SOX
Sarbanes-Oxley Act
149
SASE
Secure Access Service Edge
150
SFTP
Secure File Transfer Protocol
151
SHA
Secure Hash Algorithm
152
SSH
Secure Shell
153
SAML
Security Assertion Markup Language
154
SCAP
Security Content Automation Protocol
155
SID
Security Identifier
156
SIEM
Security Information and Event Management
157
SELinux
Security-Enhanced Linux
158
SED
Self-Encrypting Drive
159
SPF
Sender Policy Framework
160
SSRF
Server-Side Request Forgery
161
SLA
Service Level Agreement
162
SSID
Service Set Identifier
163
SMTP
Simple Mail Transfer Protocol
164
SNMP
Simple Network Management Protocol
165
SOAP
Simple Object Access Protocol
166
SAE
Simultaneous Authentication of Equals
167
SLE
Single Loss Expectancy
168
SPoF
Single Point of Failure
169
SSO
Single Sign-On
170
SaaS
Software as a Service
171
SBOM
Software Bill of Materials
172
SCA
Software Composition Analysis
173
SD-WAN
Softwared Defined WAN
174
SDLC
Software Development Life Cycle
175
SDN
Software-Defined Networking
176
SOW
Statement of Work
177
SEH
Structured Exception Handler
178
SQL Injection
Structured Query Language Injection
179
SAN
Subject Alternative Name
180
SCADA
Supervisory Control and Data Acquisition
181
TTP
Tactics
Techniques
Procedures
182
TKIP
Temporal Key Integrity Protocol
183
TAP
Test Access Point
184
TGT
Ticket Granting Ticket
185
TOCTOU
Time Of Check to Time Of Use
186
TLS
Transport Layer Security
187
TLS VPN
Transport Layer Security Virtual Private Network
188
TPM
Trusted Platform Module
189
UTM
Unified Threat Management
190
URL
Uniform Resource Locator
191
UPS
Uninterruptible Power Supply
192
UEBA
User and Entity Behavior Analytics
193
VLAN
Virtual Local Area Network
194
VNC
Virtual Network Computing
195
VPC
Virtual Private Cloud
196
VPN
Virtual Private Network
197
WAF
Web Application Firewall
198
WPA
Wi-Fi Protected Access
199
WPS
Wi-Fi Protected Set-Up
200
WEP
Wired Equivalent Privacy
201
WRT
Work Recovery Time
202
ISA
Interconnection Security Agreements
203
WAN
Wide Area Network