ISC2 CISSP - All Acronyms Flashcards
ISC2 CISSP Flashcards

| Front | Back |
| AAA | Authentication Authorization Accounting |
| ACL | Access Control List |
| AES | Advanced Encryption Standard |
| ALE | Annualized Loss Expectancy |
| AP | Access Point |
| API | Application Programming Interface |
| ARP | Address Resolution Protocol |
| ASLR | Address Space Layout Randomization |
| BCP | Business Continuity Plan |
| BGP | Border Gateway Protocol |
| BIA | Business Impact Analysis |
| BIOS | Basic Input/Output System |
| BYOD | Bring Your Own Device |
| CA | Certificate Authority |
| CAB | Change Advisory Board |
| CAPEX | Capital Expenditures |
| CBC | Cipher Block Chaining |
| CBT | Computer-Based Training |
| CCMP | Counter Mode with Cipher Block Chaining Message Authentication Code Protocol |
| CCTV | Closed-Circuit Television |
| CDN | Content Delivery Network |
| CERT | Computer Emergency Response Team |
| CFO | Chief Financial Officer |
| CIA | Confidentiality Integrity Availability |
| CIO | Chief Information Officer |
| CIRT | Cyber Incident Response Team |
| CISO | Chief Information Security Officer |
| CMDB | Configuration Management Database |
| COBIT | Control Objectives for Information and Related Technologies |
| CPU | Central Processing Unit |
| CRL | Certificate Revocation List |
| CSIRT | Computer Security Incident Response Team |
| CSR | Certificate Signing Request |
| DAC | Discretionary Access Control |
| DBMS | Database Management System |
| DDoS | Distributed Denial of Service |
| DEP | Data Execution Prevention |
| DES | Data Encryption Standard |
| DH | Diffe-Hellman |
| DHCP | Dynamic Host Configuration Protocol |
| DLP | Data Loss Prevention |
| DMZ | Demilitarized Zone |
| DNS | Domain Name System |
| DoS | Denial of Service |
| DRP | Disaster Recovery Plan |
| DSA | Digital Signature Algorithm |
| EAP | Extensible Authentication Protocol |
| ECC | Elliptic Curve Cryptography |
| EF | Exposure Factor |
| EFS | Encrypting File System |
| ESP | Encapsulating Security Payload |
| FAR | Federal Acquisition Regulation |
| FDE | Full Disk Encryption |
| FIPS | Federal Information Processing Standard |
| FISMA | Federal Information Security Management Act |
| FTP | File Transfer Protocol |
| GPO | Group Policy Object |
| GUID | Globally Unique Identifier |
| HIDS | Host-based Intrusion Detection System |
| HIPS | Host-based Intrusion Prevention System |
| HMAC | Hashed Message Authentication Code |
| HTML | HyperText Markup Language |
| HTTP | Hypertext Transfer Protocol |
| HTTPS | Hypertext Transfer Protocol Secure |
| IaaS | Infrastructure as a Service |
| IAM | Identity and Access Management |
| ICMP | Internet Control Message Protocol |
| ICS | Industrial Control System |
| IDE | Integrated Development Environment |
| IDS | Intrusion Detection System |
| IEC | International Electrotechnical Commission |
| IEEE | Institute of Electrical and Electronics Engineers |
| IETF | Internet Engineering Task Force |
| IIS | Internet Information Services |
| IMAP | Internet Message Access Protocol |
| IoT | Internet of Things |
| IP | Internet Protocol |
| IPS | Intrusion Prevention System |
| IPSec | Internet Protocol Security |
| IR | Incident Response |
| ISACA | Information Systems Audit and Control Association |
| ISO | International Organization for Standardization |
| ISP | Internet Service Provider |
| ITIL | Information Technology Infrastructure Library |
| ITSM | Information Technology Service Management |
| KDC | Key Distribution Center |
| LAN | Local Area Network |
| LDAP | Lightweight Directory Access Protocol |
| MAC | Mandatory Access Control |
| MAN | Metropolitan Area Network |
| MFA | Multi-Factor Authentication |
| MITM | Man in the Middle |
| MPLS | Multiprotocol Label Switching |
| MSP | Managed Service Provider |
| MTBF | Mean Time Between Failures |
| MTTF | Mean Time To Failure |
| MTTR | Mean Time To Repair |
| NAT | Network Address Translation |
| NDA | Non-Disclosure Agreement |
| NFC | Near Field Communication |
| NIDS | Network Intrusion Detection System |
| NIPS | Network Intrusion Prevention System |
| NIST | National Institute of Standards and Technology |
| NOC | Network Operations Center |
| NSA | National Security Agency |
| NTFS | New Technology File System |
| OAuth | Open Authorization |
| OJT | On the Job Training |
| OS | Operating System |
| OSI | Open Systems Interconnection |
| OTP | One-Time Password |
| PaaS | Platform as a Service |
| PAC | Proxy Auto-Config |
| PAT | Port Address Translation |
| PBX | Private Branch Exchange |
| PCI DSS | Payment Card Industry Data Security Standard |
| PCMCIA | Personal Computer Memory Card International Association |
| PDU | Protocol Data Unit |
| PEAP | Protected Extensible Authentication Protocol |
| PKI | Public Key Infrastructure |
| POAM | Plan of Action and Milestones |
| POP3 | Post Office Protocol v3 |
| PPP | Point-to-Point Protocol |
| PTZ | Pan Tilt Zoom |
| RA | Reliability Analysis |
| RADIUS | Remote Authentication Dial-In User Service |
| RAM | Random Access Memory |
| RAT | Remote Access Trojan |
| RFI | Request for Information |
| RFID | Radio-Frequency Identification |
| RFP | Request for Proposal |
| ROI | Return on Investment |
| ROM | Read-Only Memory |
| RSA | Rivest Shamir Adleman |
| SaaS | Software as a Service |
| SAML | Security Assertion Markup Language |
| SCADA | Supervisory Control and Data Acquisition |
| SDLC | System Development Life Cycle |
| SDN | Software Defined Networking |
| SHA | Secure Hash Algorithm |
| SIEM | Security Information and Event Management |
| SIM | Subscriber Identity Module |
| SLA | Service Level Agreement |
| SMB | Server Message Block |
| SMIME | Secure/Multipurpose Internet Mail Extensions |
| SMTP | Simple Mail Transfer Protocol |
| SNMP | Simple Network Management Protocol |
| SOA | Service Oriented Architecture |
| SOC | Security Operations Center |
| SOX | Sarbanes-Oxley Act |
| SPF | Sender Policy Framework |
| SQL | Structured Query Language |
| SSH | Secure Shell |
| SSID | Service Set Identifier |
| SSL | Secure Sockets Layer |
| SSO | Single Sign-On |
| STP | Shielded Twisted Pair |
| SWOT | Strengths Weaknesses Opportunities Threats |
| TCO | Total Cost of Ownership |
| TCP | Transmission Control Protocol |
| TFTP | Trivial File Transfer Protocol |
| TLS | Transport Layer Security |
| TPM | Trusted Platform Module |
| UAT | User Acceptance Testing |
| UDP | User Datagram Protocol |
| UPS | Uninterruptible Power Supply |
| URI | Uniform Resource Identifier |
| URL | Uniform Resource Locator |
| USB | Universal Serial Bus |
| UTM | Unified Threat Management |
| UUID | Universally Unique Identifier |
| VDI | Virtual Desktop Infrastructure |
| VoIP | Voice over Internet Protocol |
| VPN | Virtual Private Network |
| VTC | Video Teleconferencing |
| WAN | Wide Area Network |
| WEP | Wired Equivalent Privacy |
| WiFi | Wireless Fidelity |
| WIPS | Wireless Intrusion Prevention System |
| WLAN | Wireless Local Area Network |
| WORM | Write Once Read Many |
| WPA | Wi-Fi Protected Access |
| WPA2 | Wi-Fi Protected Access 2 |
| XML | Extensible Markup Language |
| XOR | Exclusive OR |
| XSRF | Cross-Site Request Forgery |
| XSS | Cross-Site Scripting |
About the Flashcards
Flashcards for the ISC2 CISSP exam give you a quick way to review the core language of modern information security and networking. Each card distills a critical acronym or term-from AAA and AES to VPN and XSS-so you can recall definitions fast during practice sessions or on test day.
The deck spans authentication models, cryptographic algorithms, network protocols, risk calculations, cloud service models, governance frameworks, business continuity planning, and incident-response functions. By linking abbreviations to their full meanings, it reinforces key principles the exam measures, including confidentiality, integrity, availability, secure design, and operational resilience.
Topics covered in this flashcard deck:
- Authentication & access control
- Cryptography fundamentals
- Network & internet protocols
- Risk & business continuity
- Governance standards & frameworks
- Cloud and virtualization services