Security Plus Acronyms Flashcards

(298 cards)

1
Q

3DES

A

Triple Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication Authorization and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACE

A

Access Control Entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACK

A

Acknowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES-256

A

Advanced Encryption Standard-256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ALE

A

Annual Lost Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARO

A

Annual Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ASCII

A

American Standard Code for Information Interchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ASP

A

Application Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BAC

A

Business Availability Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BCP

A

Business Continuity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BIND

A

Berkley Internet Name Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CA
Certificate Authority
26
CAC
Common Access Card
27
CAN
Controller Area Network
28
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
29
CAR
Corrective Action Report
30
CCMP
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
31
CCTV
Closed Circuit Television
32
CERT
Computer Emergency Response Team
33
CHAP
Challenge Handshake Authentication Protocol
34
CIA
Confidentiality, integrity, availability
35
CIO
Chief Information Officer
36
CIRT
Computer Incident Response Team
37
COOP
Continuity of Operations Planning
38
CP
Contingency Planning
39
CRC
Cyclical Redundancy Check
40
CSR
Certificate Signing Request
41
CRL
Certification Revocation List
42
CSR
Control Status Register
43
CSU
Channel Service Unit
44
CTO
Chief Technology Officer
45
CVE
Common Vulnerabilities and Exposures
46
DAC
Discretionary Access Control
47
DACL
Discretionary Access Control List
48
DBA
Database Administrator
49
dBd
Decibels-dipole
50
dBi
Decibels-isotropic
51
dBm
Decibels-milliwatt
52
DDoS
Distributed denial of service
53
DEP
Data Execution Prevention
54
DES
Data Encryption Standard
55
DHCP
Dynamic Host Configuration Protocol
56
DHE
Data-Handling Electronics
57
DHE
Diffie-Hellmann Ephemeral
58
DLL
Dynamic Link Library
59
DLP
Data Loss Prevention
60
DMZ
Demilitarize Zone
61
DNAT
Destination Network Access Translation
62
DNAT
Dynamic Network Address Translation
63
DNS
Domain Name System
64
DNSSEC
Domain Name System Security Extensions
65
DoS
Denial of Service
66
DRP
Disaster Recovery Plan
67
DSA
Digital Signature Algorithm
68
DSL
Digital Subscriber Line
69
DSU
Data Service Unit
70
EAP
Extensible Authentication Protocols
71
EAP-TLS
Extensible Authentication Protocol-Transport Layer Security
72
EAP-TTLS
Extensible Authentication Protocol-Tunneled Transport Layer Security
73
ECC
Elliptic Curve Cryptography
74
ECDHE
Elliptic Curve Diffe-Hellman Ephemeral
75
EFS
Encrypting File System
76
EMI
Electromagnetic Interference
77
ESD
Electrostatic discharge
78
ESN
Electronic Serial Number
79
ESP
Encapsulating Security Protocol
80
FACL
File Access System Control List
81
FCoE
Fiber Channel over Ethernet
82
FDE
Full Disk Encryption
83
FTP
File Transfer Protocol
84
FTPS
File Transfer Protocol Secure
85
GPG
GNU Privacy Guard
86
GPO
Group Policy Object
87
GPS
Global Positioning System
88
GRE
Generic Routing Encapsulation
89
GUI
Graphical user interface
90
HDD
Hard disk drive
91
HIDS
Host based intrusion detection system
92
HIPS
Host based intrusion prevention system
93
HMAC
Hash based Message Authentication Code
94
HOTP
HMAC-based One Time Password
95
HSM
Hardware Security Module
96
HTML
Hypertext Markup Language
97
HTTP
Hypertext Transfer Protocol
98
HTTPS
Hypertext Transfer Protocol Secure
99
HVAC
Heating, ventilation , and air conditioning
100
IaaS
Infrastructure of a service
101
ICMP
Internet Control Message Protocol
102
ID
Identification
103
IDS
Intrusion Detection System
104
IEEE
Institute of Electrical and Electronics Engineers
105
IGMP
Internet Group Management Protocol
106
IIS
Internet Information Services
107
IKE
Internet Key Exchange
108
IM
Instant Messaging
109
IMAP4
Internet Message Access Protocol version 4
110
IP
Internet Protocol
111
IPS
Intrusion Prevention System
112
IPsec
Internet Protocol Security
113
IPv4
Internet Protocol version 4
114
IPv6
Internet Protocol version 6
115
IR
Incident Response
116
IRC
Internet Relay Chat
117
IRP
Incident Response Procedure
118
IRT
Incident Response Team
119
ISA
Interconnection Security Agreement
120
iSCSI
Internet Small Computer System Interface
121
ISP
Internet Service Provider
122
ISSO
Information Systems Security Officer
123
IT
Information Technology
124
ITCP
IT Contingency Plan
125
IV
Initialization Vector
126
JBOD
Just a Bunch of Disks
127
KDC
Key Distribution Center
128
L2TP
Layer 2 Tunneling Protocol
129
LAN
Local Area Network
130
LANMAN
Local area network Manager
131
LDAP
Lightweight Directory Access Protocol
132
LEAP
Lightweight Extensible Authentication Protocol
133
LSO
Local Shared Object
134
MaaS
Monitoring as a Service or Management
135
MAC
Mandatory Access Control
136
MAC
Media Access Control
137
MAC
Message Authentication Code
138
Malware
Malicious Software
139
MAN
Metropolitan Area Network
140
MBR
Master Boot Record
141
MD5
Message Digest 5
142
MITM
Man in the Middle
143
MOU
Memorandum of Understanding
144
MPLS
Multi-Protocol Layer Switch
145
MS-CHAP
Microsoft Challenge Handshake Authentication Protocol
146
MTBF
Mean Time Between Failures
147
MTTF
Meant Time to Failure
148
MTTR
Mean Time To Recover
149
MTU
Maximum Transmission Unit
150
NAC
Network Access Control
151
NAT
Network Address Translation
152
NDA
Non-disclosure Agreement
153
NDP
Neighborhood Discovery Protocol
154
NetBIOS
Network Basic Input/Output System
155
NFC
Near Field Communication
156
NIDS
Network-based intrusion detection system
157
NIC
Network interface Card
158
NIPS
Network-based intrusions prevention system
159
NIST
National Institute of Standards of Technology
160
NOP
No Operation
161
NOS
Network Operating System
162
NoSQL
Not Only Structured Query Language
163
NTFS
NT File System
164
NTLM
Net Technology LANMAN
165
NTP
Network Time Protocol
166
OCSP
Online Certificate Status Protocol
167
OLA
Open License Agreement
168
OS
Operating System
169
OSI
Open Systems Interconnection
170
OVAL
Open Vulnerability Assessment Language
171
P2P
Peer-2-Peer
172
PaaS
Platform as a Service
173
PAC
Proxy Auto Configuration
174
PAM
Pluggable Authentication Modules
175
PAN
Personal Area Network
176
PAP
Password Authentication Protocol
177
PAT
Port Address Translation
178
PBKDF2
Password-Based Key Derivation Function 2
179
PBX
Private Branch Exchange
180
PCAP
Packet Capture
181
PDF
Portable Document Format
182
PEAP
Protected Extensible Authentication Protocol
183
PED
Personal Electronic Device
184
PGP
Pretty Good Privacy
185
PII
Personal Identifiable Information
186
PIN
Personal Identification Number
187
PIV
Personal Identity Verification Card
188
PKI
Public Key Infrastructure
189
POP3
Post Office Protocol Version 3
190
POTS
Plain Old Telephone Service
191
PPP
Point to Point Protocol
192
PPTP
Point to Point Tunneling Protocol
193
PSK
Preshared Key
194
PTZ
Pan Tilt Zoom
195
RA
Recovery Agent
196
RADIUS
Remote Authentication Dial-In User Service
197
RAID
Redundant array of inexpensive disks
198
RAID 0
Disk striping, no fault tolerance
199
RAID 1
Disk mirroring, two disks provides fault tolerance
200
RAID 5
Disk striping with parity, 3 or more disks and fault tolerance
201
RAID 6
Disk striping with parity. RAID-6 uses four or more disks and provides fault tolerance
202
RAM
Random Access Memory
203
RAS
Remote Access Service
204
RAT
Remote access tool
205
RC
Ron's Code
206
RC4
Rivest Cipher
207
RDP
Remote Desktop Protocol
208
RFI
Radio Frequency Interference
209
RFID
Radio frequency identification
210
RIPEMD
RACE integrity Primitive Evaluation Message Digest
211
ROI
Return On Investment
212
Role-BAC
Role-based Access Control
213
RPO
Recovery Point Objective
214
RSA
Rivest, Shamir, Adelman
215
RSTP
Rapid Spanning Tree Protocol
216
RTO
Recovery Time Objective
217
RTP
Real Time Transport Protocol
218
Rule-BAC
Rule based Access Control
219
S/MIME
Secure/Multipurpose Internet Mail Extensions
220
SaaS
Software as a Service
221
SAML
Security Assertions Markup Language
222
SAN
Storage Area Network
223
SCADA
Supervisory control and data acquisition
224
SCAP
Security Content Automation Protocol
225
SCEP
Simple Certificate Enrollment Protocol
226
SCP
Secure Copy
227
SCSI
Small Computer System Interface
228
SDLM
Software Development Life Cycle Methodology
229
SEH
Structured Exception Handler
230
SELinux
Security Enhanced Linux
231
SFTP
Secure File Transfer Protocol
232
SHA
Secure Hash Algorithm
233
SHTTP
Secure Hypertext Transfer Protocol
234
SID
Security Identifier
235
SIEM
Security Information and Event Management
236
SIM
Subscriber Identity Module
237
SIRT
Security Incident Response Team
238
SLA
Service Level Agreement
239
SLE
Single Loss Expectancy
240
SMTP
Simple Mail Transfer Protocol
241
SNMP
Simple Network Management Protocol
242
SONET
Synchronous Optical Network Technologies
243
SPIM
Spam over Internet Messaging
244
SPOF
Single Point of Failure
245
SQL
Structured Query Language
246
SSD
Solid State Drive
247
SSH
Secure Shell
248
SSID
Service Set Identifier
249
SSL
Secure Sockets Layer
250
SSO
Single Sign On
251
SSTP
Secure Socket Tunneling Protocol
252
STP
Shielded twisted-pair
253
STP
Spanning Tree Protocol
254
SYN
Synchronize
255
TACACS+
Terminal Access Controller Access-Control System +
256
TCO
Total Cost of Ownership
257
TCP
Transmission Control Protocol
258
TCP/IP
Transmission Control Protocol/Internet Protocol
259
TFTP
Trivial File Transfer Protocol
260
TGT
Ticket Granting Ticket
261
TKIP
Temporal Key Integrity Protocol
262
TLS
Transport Layer Security
263
TOTP
Time Based One Time Password
264
TPM
Trusted Platform Module
265
TSIG
Transaction Signature
266
UAT
User Acceptance Testing
267
UDP
User Datagram Protocol
268
UEFI
Unified Extensible Firmware Interface
269
UPS
Uninterruptible Power Supply
270
URI
Uniform Resource Identifier
271
URL
Uniform Resource Locator
272
USB
Universal Serial Bus
273
UTM
Unified Threat Management
274
UTP
Unshielded Twisted Pair
275
VDI
Virtualization Desktop Infrastructure
276
VLAN
Virtual local area network
277
VM
Virtual Machine
278
VoIP
Voice Over IP
279
VPN
Virtual Private Network
280
VSAN
Virtual Storage Area Network
281
VTC
Video Teleconferencing
282
WAF
Web Application Firewall
283
WAP
Wireless Access Point
284
WEP
Wired Equivalent Privacy
285
WIDS
Wireless Intrusion Detection System
286
WIPS
Wireless Intrusion Prevention System
287
WLAN
Wireless Local Area Network
288
WPA
Wi-Fi Protected Access
289
WPA2
Wi-Fi Protected Access II
290
WPS
Wi-Fi Protected Setup
291
WTLS
Wireless Transport Layer Security
292
XML
Extensible Markup Language
293
XSRF
Cross-site request forgery
294
XSS
Cross Site Scripting Attack
295
XTACACS
Extended Terminal Access Controller
296
VMI
Virtual Mobile Information
297
COPE
Corporate Owned and Personally Enabled
298
TPM
Trusted Platform Module