SY0-701 Flashcards

(334 cards)

1
Q

2FA

A

Two-factor Authentication

Requires two forms of identity, e.g., password and SMS code, for login.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3DES

A

Triple Data Encryption Standard

Legacy encryption applying DES three times; used in older payment systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AAA

A

Authentication, Authorization, and Accounting

Framework for controlling and tracking user access in networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

Rules that permit or deny network traffic; used in firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standard

Modern symmetric encryption; used for file, disk, and VPN encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES-256

A

Advanced Encryption Standards 256-bit

AES with 256-bit key; commonly used for high-security data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header

IPSec protocol for data integrity/authentication; no encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AI

A

Artificial Intelligence

Machines performing tasks requiring human intelligence, e.g., chatbots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AIS

A

Automated Indicator Sharing

US CISA program for real-time cyber threat sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ALE

A

Annualized Loss Expectancy

Risk metric: expected yearly monetary loss from a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AP

A

Access Point

Device allowing wireless devices to connect to a network (e.g., Wi-Fi router).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

API

A

Application Programming Interface

Set of rules for software interaction; e.g., Google Maps API.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

APT

A

Advanced Persistent Threat

Long-term, targeted cyberattack by skilled actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARO

A

Annualized Rate of Occurrence

Estimated number of times a risk occurs per year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP

A

Address Resolution Protocol

Maps IP addresses to MAC addresses on LANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ASLR

A

Address Space Layout Randomization

Randomizes memory addresses to hinder exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

MITRE knowledge base of attacker behaviors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AUP

A

Acceptable Use Policy

Rules for proper use of company IT resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AV

A

Antivirus

Software that detects and removes malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BASH

A

Bourne Again Shell

Popular Unix/Linux command-line shell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BCP

A

Business Continuity Planning

Plans to keep business running after disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BGP

A

Border Gateway Protocol

Protocol for routing between large networks on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BIA

A

Business Impact Analysis

Assessment of potential business disruptions and impacts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BIOS

A

Basic Input/Output System

Firmware for hardware initialization during boot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BPA
Business Partners Agreement ## Footnote Contract outlining terms between business partners.
26
BPDU
Bridge Protocol Data Unit ## Footnote Used for spanning tree protocol in network switches.
27
BYOD
Bring Your Own Device ## Footnote Policy allowing personal devices on company networks.
28
CA
Certificate Authority ## Footnote Entity issuing digital certificates for secure communication.
29
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart ## Footnote Challenge to distinguish humans from bots (e.g., image selection).
30
CAR
Corrective Action Report ## Footnote Document detailing steps to correct problems.
31
CASB
Cloud Access Security Broker ## Footnote Security policy enforcement between cloud users and providers.
32
CBC
Cipher Block Chaining ## Footnote Block cipher mode of encryption using previous block's output.
33
CCMP
Counter Mode/CBC-MAC Protocol ## Footnote Encryption protocol for Wi-Fi (WPA2).
34
CCTV
Closed-circuit Television ## Footnote Video surveillance system.
35
CERT
Computer Emergency Response Team ## Footnote Group handling cybersecurity incidents.
36
CFB
Cipher Feedback ## Footnote Block cipher mode for converting block ciphers to stream ciphers.
37
CHAP
Challenge Handshake Authentication Protocol ## Footnote Authentication protocol using challenge-response.
38
CIA
Confidentiality, Integrity, Availability ## Footnote Core information security principles.
39
CIO
Chief Information Officer ## Footnote Executive responsible for IT strategy.
40
CIRT
Computer Incident Response Team ## Footnote Team managing IT security incidents.
41
CMS
Content Management System ## Footnote Software for creating and managing digital content (e.g., WordPress).
42
COBO
Corporate-owned, Business-only ## Footnote Devices owned and used solely for business.
43
COOP
Continuity of Operation Planning ## Footnote Plans to ensure continued operations during emergencies.
44
COPE
Corporate Owned, Personally Enabled ## Footnote Company devices allowed for personal use.
45
CP
Contingency Planning ## Footnote Preparing for unexpected adverse events.
46
CRC
Cyclical Redundancy Check ## Footnote Error-detecting code in data storage/transmission.
47
CRL
Certificate Revocation List ## Footnote List of revoked digital certificates.
48
CSO
Chief Security Officer ## Footnote Executive responsible for security strategy.
49
CSP
Cloud Service Provider ## Footnote Company offering cloud computing services.
50
CSR
Certificate Signing Request ## Footnote Request to a CA for a digital certificate.
51
CSRF
Cross-site Request Forgery ## Footnote Attack tricking users into unwanted actions on authenticated sites.
52
CSU
Channel Service Unit ## Footnote Telecom device for digital circuit termination.
53
CTM
Counter Mode ## Footnote Encryption mode for block ciphers.
54
CTO
Chief Technology Officer ## Footnote Executive overseeing technology development.
55
CVE
Common Vulnerability Enumeration ## Footnote Standardized list of publicly known cybersecurity vulnerabilities.
56
CVSS
Common Vulnerability Scoring System ## Footnote System for rating severity of security vulnerabilities.
57
CYOD
Choose Your Own Device ## Footnote Employees choose from company-approved devices.
58
DAC
Discretionary Access Control ## Footnote Access control based on owner discretion.
59
DBA
Database Administrator ## Footnote Person managing databases.
60
DDoS
Distributed Denial of Service ## Footnote Attack overwhelming a service with traffic from multiple sources.
61
DEP
Data Execution Prevention ## Footnote Prevents code execution in certain memory regions.
62
DES
Digital Encryption Standard ## Footnote Legacy symmetric-key encryption algorithm.
63
DHCP
Dynamic Host Configuration Protocol ## Footnote Assigns IP addresses automatically on networks.
64
DHE
Diffie-Hellman Ephemeral ## Footnote Temporary keys for secure key exchange.
65
DKIM
DomainKeys Identified Mail ## Footnote Email authentication using digital signatures.
66
DLL
Dynamic Link Library ## Footnote Shared library in Windows systems.
67
DLP
Data Loss Prevention ## Footnote Technology to prevent unauthorized data transfer.
68
DMARC
Domain Message Authentication Reporting and Conformance ## Footnote Email authentication and reporting protocol.
69
DNAT
Destination Network Address Translation ## Footnote Changes destination address of packets (used in firewalls).
70
DNS
Domain Name System ## Footnote Translates domain names to IP addresses.
71
DNSSEC
Domain Name System Security Extensions ## Footnote Adds security to DNS with digital signatures.
72
DoS
Denial of Service ## Footnote Attack making a service unavailable by overwhelming it.
73
DPO
Data Privacy Officer ## Footnote Person responsible for data protection compliance.
74
DRP
Disaster Recovery Plan ## Footnote Plan for restoring IT after a disaster.
75
DSA
Digital Signature Algorithm ## Footnote Algorithm for digital signatures.
76
DSL
Digital Subscriber Line ## Footnote High-speed internet over telephone lines.
77
EAP
Extensible Authentication Protocol ## Footnote Framework for network access authentication.
78
ECB
Electronic Code Book ## Footnote Simplest block cipher encryption mode.
79
ECC
Elliptic Curve Cryptography ## Footnote Efficient public-key cryptography method.
80
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral ## Footnote Key exchange using elliptic curves and temporary keys.
81
ECDSA
Elliptic Curve Digital Signature Algorithm ## Footnote Digital signature algorithm using elliptic curves.
82
EDR
Endpoint Detection and Response ## Footnote Security solution for endpoint threat detection.
83
EFS
Encrypted File System ## Footnote Windows feature for file encryption.
84
ERP
Enterprise Resource Planning ## Footnote Integrated management of business processes.
85
ESN
Electronic Serial Number ## Footnote Unique identifier for mobile devices.
86
ESP
Encapsulated Security Payload ## Footnote IPSec protocol providing encryption and authentication.
87
EULA
End User License Agreement ## Footnote Legal contract for software usage.
88
FACL
File System Access Control List ## Footnote Permissions for files and directories.
89
FDE
Full Disk Encryption ## Footnote Encrypts all data on a disk drive.
90
FIM
File Integrity Management ## Footnote Monitors files for unauthorized changes.
91
FPGA
Field Programmable Gate Array ## Footnote Programmable hardware chip.
92
FRR
False Rejection Rate ## Footnote Biometric metric: legitimate users incorrectly denied.
93
FTP
File Transfer Protocol ## Footnote Protocol for transferring files over networks.
94
FTPS
Secured File Transfer Protocol ## Footnote FTP with SSL/TLS encryption.
95
GCM
Galois Counter Mode ## Footnote Encryption mode providing confidentiality and integrity.
96
GDPR
General Data Protection Regulation ## Footnote EU regulation on data protection and privacy.
97
GPG
Gnu Privacy Guard ## Footnote Open-source encryption and signing tool.
98
GPO
Group Policy Object ## Footnote Windows settings for user and computer configurations.
99
GPS
Global Positioning System ## Footnote Satellite-based navigation system.
100
GPU
Graphics Processing Unit ## Footnote Processor specialized for graphics and computation.
101
GRE
Generic Routing Encapsulation ## Footnote Protocol for tunneling network packets.
102
HA
High Availability ## Footnote System designed for minimal downtime.
103
HDD
Hard Disk Drive ## Footnote Traditional spinning disk data storage.
104
HIDS
Host-based Intrusion Detection System ## Footnote Monitors and analyzes host computer activity for threats.
105
HIPS
Host-based Intrusion Prevention System ## Footnote Blocks threats on endpoints before they execute.
106
HMAC
Hashed Message Authentication Code ## Footnote Verifies data integrity and authenticity.
107
HOTP
HMAC-based One-time Password ## Footnote One-time password algorithm using HMAC.
108
HSM
Hardware Security Module ## Footnote Physical device for secure key storage.
109
HTML
Hypertext Markup Language ## Footnote Standard language for web pages.
110
HTTP
Hypertext Transfer Protocol ## Footnote Foundation of data communication on the web.
111
HTTPS
Hypertext Transfer Protocol Secure ## Footnote HTTP with SSL/TLS encryption.
112
HVAC
Heating, Ventilation Air Conditioning ## Footnote Climate control systems in buildings.
113
IaaS
Infrastructure as a Service ## Footnote Cloud computing providing virtualized hardware.
114
IaC
Infrastructure as Code ## Footnote Managing infrastructure with code (e.g., Terraform).
115
IAM
Identity and Access Management ## Footnote Tools for managing user identities and permissions.
116
ICMP
Internet Control Message Protocol ## Footnote Used for network diagnostics (e.g., ping).
117
ICS
Industrial Control Systems ## Footnote Systems controlling industrial processes.
118
IDEA
International Data Encryption Algorithm ## Footnote Block cipher used for data encryption.
119
IDF
Intermediate Distribution Frame ## Footnote Telecom rack for wiring connections.
120
IdP
Identity Provider ## Footnote Service authenticating user identities (e.g., Okta).
121
IDS
Intrusion Detection System ## Footnote Monitors networks/systems for malicious activity.
122
IEEE
Institute of Electrical and Electronics Engineers ## Footnote Professional association for electronics/engineering standards.
123
IKE
Internet Key Exchange ## Footnote Protocol for negotiating IPSec keys.
124
IM
Instant Messaging ## Footnote Real-time text communication (e.g., Slack, WhatsApp).
125
IMAP
Internet Message Access Protocol ## Footnote Email protocol for retrieving messages.
126
IoC
Indicators of Compromise ## Footnote Evidence of a potential security breach.
127
IoT
Internet of Things ## Footnote Network of connected devices (e.g., smart home gadgets).
128
IP
Internet Protocol ## Footnote Core protocol for network communication.
129
IPS
Intrusion Prevention System ## Footnote Blocks detected threats in real time.
130
IPSec
Internet Protocol Security ## Footnote Secures IP communications with authentication/encryption.
131
IR
Incident Response ## Footnote Process for managing security breaches.
132
IRC
Internet Relay Chat ## Footnote Early real-time internet chat protocol.
133
IRP
Incident Response Plan ## Footnote Documented process for handling security incidents.
134
ISO
International Standards Organization ## Footnote Organization setting international standards.
135
ISP
Internet Service Provider ## Footnote Company providing internet access.
136
ISSO
Information Systems Security Officer ## Footnote Person responsible for information system security.
137
IV
Initialization Vector ## Footnote Random value used in encryption to ensure uniqueness.
138
KDC
Key Distribution Center ## Footnote Distributes cryptographic keys (e.g., in Kerberos).
139
KEK
Key Encryption Key ## Footnote Key used to encrypt other cryptographic keys.
140
L2TP
Layer 2 Tunneling Protocol ## Footnote VPN tunneling protocol.
141
LAN
Local Area Network ## Footnote Network covering a small area (e.g., office, home).
142
LDAP
Lightweight Directory Access Protocol ## Footnote Protocol for accessing directory services.
143
LEAP
Lightweight Extensible Authentication Protocol ## Footnote Cisco wireless authentication protocol.
144
MaaS
Monitoring as a Service ## Footnote Cloud-based monitoring solutions.
145
MAC
Mandatory Access Control ## Footnote Access based on strict policies set by admin.
146
MAC
Media Access Control ## Footnote Unique hardware address for network devices.
147
MAC
Message Authentication Code ## Footnote Short piece of information to authenticate a message.
148
MAN
Metropolitan Area Network ## Footnote Network covering a city or campus.
149
MBR
Master Boot Record ## Footnote Boot sector on storage devices.
150
MD5
Message Digest 5 ## Footnote Hash function producing 128-bit hash value.
151
MDF
Main Distribution Frame ## Footnote Central point for telecom wiring.
152
MDM
Mobile Device Management ## Footnote Tools for managing mobile devices in organizations.
153
MFA
Multifactor Authentication ## Footnote Authentication using two or more factors.
154
MFD
Multifunction Device ## Footnote Printer/copier/scanner in one device.
155
MFP
Multifunction Printer ## Footnote Printer with scanning, copying, faxing.
156
ML
Machine Learning ## Footnote AI that learns from data to make predictions.
157
MMS
Multimedia Message Service ## Footnote Text messaging with multimedia content.
158
MOA
Memorandum of Agreement ## Footnote Formal agreement between parties.
159
MOU
Memorandum of Understanding ## Footnote Non-binding agreement between parties.
160
MPLS
Multi-protocol Label Switching ## Footnote Network routing technique for speed and efficiency.
161
MSA
Master Service Agreement ## Footnote Contract for ongoing services between parties.
162
MSCHAP
Microsoft Challenge Handshake Authentication Protocol ## Footnote Microsoft authentication protocol using challenge-response.
163
MSP
Managed Service Provider ## Footnote Company managing IT services for clients.
164
MSSP
Managed Security Service Provider ## Footnote Company providing outsourced security services.
165
MTBF
Mean Time Between Failures ## Footnote Reliability metric for repairable systems.
166
MTTF
Mean Time to Failure ## Footnote Reliability metric for non-repairable systems.
167
MTTR
Mean Time to Recover ## Footnote Average time to restore a system after failure.
168
MTU
Maximum Transmission Unit ## Footnote Largest packet size a network can transmit.
169
NAC
Network Access Control ## Footnote Controls device access to a network.
170
NAT
Network Address Translation ## Footnote Translates private IPs to public IPs for internet access.
171
NDA
Non-disclosure Agreement ## Footnote Legal contract to keep information confidential.
172
NFC
Near Field Communication ## Footnote Short-range wireless communication (e.g., contactless payments).
173
NGFW
Next-generation Firewall ## Footnote Advanced firewall with deep packet inspection.
174
NIDS
Network-based Intrusion Detection System ## Footnote Monitors network traffic for threats.
175
NIPS
Network-based Intrusion Prevention System ## Footnote Blocks malicious network traffic.
176
NIST
National Institute of Standards & Technology ## Footnote US agency for technology standards.
177
NTFS
New Technology File System ## Footnote Windows file system with security features.
178
NTLM
New Technology LAN Manager ## Footnote Microsoft authentication protocol.
179
NTP
Network Time Protocol ## Footnote Synchronizes clocks over a network.
180
OAUTH
Open Authorization ## Footnote Protocol for secure API authorization (e.g., sign in with Google).
181
OCSP
Online Certificate Status Protocol ## Footnote Checks revocation status of digital certificates.
182
OID
Object Identifier ## Footnote Unique identifier for objects in a namespace.
183
OS
Operating System ## Footnote Software managing hardware and software resources.
184
OSINT
Open-source Intelligence ## Footnote Collecting intelligence from public sources.
185
OSPF
Open Shortest Path First ## Footnote Routing protocol for IP networks.
186
OT
Operational Technology ## Footnote Hardware/software for industrial operations.
187
OTA
Over the Air ## Footnote Wireless transmission of updates or data.
188
OVAL
Open Vulnerability Assessment Language ## Footnote Standard for vulnerability assessment automation.
189
P12
PKCS #12 ## Footnote Format for storing cryptographic keys and certificates.
190
P2P
Peer to Peer ## Footnote Network where devices communicate directly.
191
PaaS
Platform as a Service ## Footnote Cloud platform for app development/deployment.
192
PAC
Proxy Auto Configuration ## Footnote Script to automatically configure web proxies.
193
PAM
Privileged Access Management ## Footnote Manages privileged accounts and access.
194
PAM
Pluggable Authentication Modules ## Footnote Framework for authentication in Unix/Linux.
195
PAP
Password Authentication Protocol ## Footnote Simple authentication protocol using passwords.
196
PAT
Port Address Translation ## Footnote Type of NAT translating private IPs/ports to public.
197
PBKDF2
Password-based Key Derivation Function 2 ## Footnote Algorithm for deriving cryptographic keys from passwords.
198
PBX
Private Branch Exchange ## Footnote Internal telephone switching system.
199
PCAP
Packet Capture ## Footnote File format for network traffic captures.
200
PCI DSS
Payment Card Industry Data Security Standard ## Footnote Security standard for handling card payments.
201
PDU
Power Distribution Unit ## Footnote Device distributing electric power in data centers.
202
PEAP
Protected Extensible Authentication Protocol ## Footnote EAP protocol with encrypted tunnel.
203
PED
Personal Electronic Device ## Footnote Any portable electronic device (e.g., phone, tablet).
204
PEM
Privacy Enhanced Mail ## Footnote Format for storing cryptographic keys/certificates.
205
PFS
Perfect Forward Secrecy ## Footnote Ensures session keys can't be compromised retroactively.
206
PGP
Pretty Good Privacy ## Footnote Encryption program for email and files.
207
PHI
Personal Health Information ## Footnote Health-related personal data.
208
PII
Personally Identifiable Information ## Footnote Data that can identify an individual.
209
PIV
Personal Identity Verification ## Footnote Smart card standard for federal employees.
210
PKCS
Public Key Cryptography Standards ## Footnote Set of standards for public-key cryptography.
211
PKI
Public Key Infrastructure ## Footnote System managing digital certificates and keys.
212
POP
Post Office Protocol ## Footnote Email protocol for retrieving messages from a server.
213
POTS
Plain Old Telephone Service ## Footnote Traditional analog telephone service.
214
PPP
Point-to-Point Protocol ## Footnote Data link protocol for direct connections.
215
PPTP
Point-to-Point Tunneling Protocol ## Footnote VPN protocol for secure connections.
216
PSK
Pre-shared Key ## Footnote Shared secret used in encryption/authentication.
217
PTZ
Pan-tilt-zoom ## Footnote Type of camera with remote directional/zoom control.
218
PUP
Potentially Unwanted Program ## Footnote Software that may be unwanted or harmful.
219
RA
Recovery Agent ## Footnote Person authorized to recover encrypted data.
220
RA
Registration Authority ## Footnote Verifies identities for certificate issuance.
221
RACE
Research and Development in Advanced Communications Technologies in Europe ## Footnote European research initiative for communications.
222
RAD
Rapid Application Development ## Footnote Software development methodology for fast prototyping.
223
RADIUS
Remote Authentication Dial-in User Service ## Footnote Protocol for remote user authentication.
224
RAID
Redundant Array of Inexpensive Disks ## Footnote Technology combining multiple disks for redundancy/performance.
225
RAS
Remote Access Server ## Footnote Server providing remote network access.
226
RAT
Remote Access Trojan ## Footnote Malware giving attackers remote control.
227
RBAC
Role-based Access Control ## Footnote Access based on user roles.
228
RBAC
Rule-based Access Control ## Footnote Access based on rules.
229
RC4
Rivest Cipher version 4 ## Footnote Stream cipher used in SSL/TLS (now deprecated).
230
RDP
Remote Desktop Protocol ## Footnote Protocol for remote desktop access.
231
RFID
Radio Frequency Identifier ## Footnote Technology for wireless identification (e.g., keycards).
232
RIPEMD
RACE Integrity Primitives Evaluation Message Digest ## Footnote Family of cryptographic hash functions.
233
ROI
Return on Investment ## Footnote Measure of profitability or benefit.
234
RPO
Recovery Point Objective ## Footnote Max acceptable data loss in disaster recovery.
235
RSA
Rivest, Shamir, & Adleman ## Footnote Widely used public-key encryption algorithm.
236
RTBH
Remotely Triggered Black Hole ## Footnote Technique for dropping malicious network traffic.
237
RTO
Recovery Time Objective ## Footnote Target time to restore a system after disruption.
238
RTOS
Real-time Operating System ## Footnote OS for real-time applications (e.g., embedded systems).
239
RTP
Real-time Transport Protocol ## Footnote Protocol for delivering audio/video over IP.
240
S/MIME
Secure/Multipurpose Internet Mail Extensions ## Footnote Email encryption/signing standard.
241
SaaS
Software as a Service ## Footnote Cloud-hosted software accessible via web.
242
SAE
Simultaneous Authentication of Equals ## Footnote Wi-Fi authentication protocol (WPA3).
243
SAML
Security Assertions Markup Language ## Footnote XML-based framework for single sign-on.
244
SAN
Storage Area Network ## Footnote Dedicated network for data storage.
245
SAN
Subject Alternative Name ## Footnote Field in SSL certificates for additional domains.
246
SASE
Secure Access Service Edge ## Footnote Cloud-based network security model.
247
SCADA
Supervisory Control and Data Acquisition ## Footnote Systems for industrial process control.
248
SCAP
Security Content Automation Protocol ## Footnote Standard for automating vulnerability management.
249
SCEP
Simple Certificate Enrollment Protocol ## Footnote Protocol for certificate management automation.
250
SD-WAN
Software-defined Wide Area Network ## Footnote Virtual WAN architecture for enterprise networking.
251
SDK
Software Development Kit ## Footnote Tools for building software applications.
252
SDLC
Software Development Lifecycle ## Footnote Process for planning, creating, testing software.
253
SDLM
Software Development Lifecycle Methodology ## Footnote Methodology for managing software development.
254
SDN
Software-defined Networking ## Footnote Network management via software abstraction.
255
SE Linux
Security-enhanced Linux ## Footnote Linux with enhanced security controls.
256
SED
Self-encrypting Drives ## Footnote Drives with built-in hardware encryption.
257
SEH
Structured Exception Handler ## Footnote Windows mechanism for handling exceptions.
258
SFTP
Secured File Transfer Protocol ## Footnote FTP over SSH for secure file transfer.
259
SHA
Secure Hashing Algorithm ## Footnote Family of cryptographic hash functions.
260
SHTTP
Secure Hypertext Transfer Protocol ## Footnote Obsolete protocol for secure web communication.
261
SIEM
Security Information and Event Management ## Footnote Aggregates and analyzes security data.
262
SIM
Subscriber Identity Module ## Footnote Card storing mobile subscriber information.
263
SLA
Service-level Agreement ## Footnote Contract defining service expectations.
264
SLE
Single Loss Expectancy ## Footnote Expected loss from a single risk event.
265
SMB
Server Message Block ## Footnote Protocol for sharing files/printers on networks.
266
SMS
Short Message Service ## Footnote Text messaging service for mobile phones.
267
SMTP
Simple Mail Transfer Protocol ## Footnote Protocol for sending email.
268
SMTPS
Simple Mail Transfer Protocol Secure ## Footnote SMTP with SSL/TLS encryption.
269
SNMP
Simple Network Management Protocol ## Footnote Protocol for managing network devices.
270
SOAP
Simple Object Access Protocol ## Footnote Protocol for exchanging structured info in web services.
271
SOAR
Security Orchestration, Automation, Response ## Footnote Automates and coordinates security operations.
272
SoC
System on Chip ## Footnote Integrated circuit with all components of a computer.
273
SOC
Security Operations Center ## Footnote Centralized unit for monitoring and responding to security incidents.
274
SOW
Statement of Work ## Footnote Document outlining project deliverables and scope.
275
SPF
Sender Policy Framework ## Footnote Email validation to prevent spoofing.
276
SPIM
Spam over Internet Messaging ## Footnote Unsolicited messages sent over IM platforms.
277
SQL
Structured Query Language ## Footnote Language for managing relational databases.
278
SQLi
SQL Injection ## Footnote Attack exploiting database query vulnerabilities.
279
SRTP
Secure Real-Time Protocol ## Footnote Secure version of RTP for audio/video.
280
SSD
Solid State Drive ## Footnote Storage device using flash memory.
281
SSH
Secure Shell ## Footnote Protocol for secure remote login/command execution.
282
SSL
Secure Sockets Layer ## Footnote Predecessor to TLS for securing network communication.
283
SSO
Single Sign-on ## Footnote One login for multiple systems/services.
284
STIX
Structured Threat Information eXchange ## Footnote Standard for sharing cyber threat intelligence.
285
SWG
Secure Web Gateway ## Footnote Filters and secures web traffic.
286
TACACS+
Terminal Access Controller Access Control System ## Footnote Authentication protocol for network devices.
287
TAXII
Trusted Automated eXchange of Indicator Information ## Footnote Protocol for sharing cyber threat intelligence.
288
TCP/IP
Transmission Control Protocol/Internet Protocol ## Footnote Foundation of internet communication.
289
TGT
Ticket Granting Ticket ## Footnote Kerberos ticket for obtaining service tickets.
290
TKIP
Temporal Key Integrity Protocol ## Footnote Encryption protocol for Wi-Fi (WPA).
291
TLS
Transport Layer Security ## Footnote Protocol for secure internet communication.
292
TOC
Time-of-check ## Footnote Refers to time a condition is checked in programming.
293
TOTP
Time-based One-time Password ## Footnote One-time password valid for a short time window.
294
TOU
Time-of-use ## Footnote Refers to pricing or access based on time periods.
295
TPM
Trusted Platform Module ## Footnote Hardware chip for secure cryptographic operations.
296
TTP
Tactics, Techniques, and Procedures ## Footnote Describes attacker behaviors and methodologies.
297
TSIG
Transaction Signature ## Footnote DNS protocol for authenticating updates.
298
UAT
User Acceptance Testing ## Footnote Final testing phase by end users.
299
UAV
Unmanned Aerial Vehicle ## Footnote Drone or remotely piloted aircraft.
300
UBA
User Behavior Analytics ## Footnote Analyzes user behavior to detect threats.
301
UDP
User Datagram Protocol ## Footnote Connectionless transport protocol.
302
UEFI
Unified Extensible Firmware Interface ## Footnote Modern replacement for BIOS.
303
UEM
Unified Endpoint Management ## Footnote Manages all endpoints (PCs, mobiles) in an organization.
304
UPS
Uninterruptible Power Supply ## Footnote Backup power source for devices.
305
URI
Uniform Resource Identifier ## Footnote String identifying a resource (e.g., URL).
306
URL
Universal Resource Locator ## Footnote Web address for resources.
307
USB
Universal Serial Bus ## Footnote Standard for connecting peripherals to computers.
308
USB OTG
USB On the Go ## Footnote Allows USB devices to act as host or peripheral.
309
UTM
Unified Threat Management ## Footnote All-in-one security appliance.
310
UTP
Unshielded Twisted Pair ## Footnote Type of cabling for networks.
311
VBA
Visual Basic ## Footnote Programming language for Microsoft applications.
312
VDE
Virtual Desktop Environment ## Footnote Provides desktop environments virtually.
313
VDI
Virtual Desktop Infrastructure ## Footnote Delivers desktops to users via virtual machines.
314
VLAN
Virtual Local Area Network ## Footnote Logically segmented network within a physical network.
315
VLSM
Variable Length Subnet Masking ## Footnote Allows subnets of different sizes.
316
VM
Virtual Machine ## Footnote Emulated computer system running on hardware.
317
VoIP
Voice over IP ## Footnote Voice communication over the internet.
318
VPC
Virtual Private Cloud ## Footnote Isolated cloud resources within a public cloud.
319
VPN
Virtual Private Network ## Footnote Encrypted tunnel for secure network access.
320
VTC
Video Teleconferencing ## Footnote Live video communication between locations.
321
WAF
Web Application Firewall ## Footnote Firewall for monitoring/protecting web apps.
322
WAP
Wireless Access Point ## Footnote Device connecting wireless clients to a network.
323
WEP
Wired Equivalent Privacy ## Footnote Obsolete Wi-Fi encryption protocol.
324
WIDS
Wireless Intrusion Detection System ## Footnote Detects threats on wireless networks.
325
WIPS
Wireless Intrusion Prevention System ## Footnote Prevents threats on wireless networks.
326
WO
Work Order ## Footnote Document authorizing work to be done.
327
WPA
Wi-Fi Protected Access ## Footnote Wi-Fi security protocol (successor to WEP).
328
WPS
Wi-Fi Protected Setup ## Footnote Simplifies Wi-Fi network setup.
329
WTLS
Wireless TLS ## Footnote TLS adaptation for wireless networks.
330
XDR
Extended Detection and Response ## Footnote Integrates multiple security products for threat detection.
331
XML
Extensible Markup Language ## Footnote Markup language for structured data.
332
XOR
Exclusive Or ## Footnote Logical operation used in cryptography.
333
XSRF
Cross-site Request Forgery ## Footnote Alternative term for CSRF attacks.
334
XSS
Cross-site Scripting ## Footnote Attack injecting malicious scripts into web pages.