Bash, the Crucial Exams Chat Bot
AI Bot

ISC2 CISSP - All Acronyms  Flashcards

ISC2 CISSP Flashcards

FrontBack
AAAAuthentication Authorization Accounting
ACLAccess Control List
AESAdvanced Encryption Standard
ALEAnnualized Loss Expectancy
APAccess Point
APIApplication Programming Interface
ARPAddress Resolution Protocol
ASLRAddress Space Layout Randomization
BCPBusiness Continuity Plan
BGPBorder Gateway Protocol
BIABusiness Impact Analysis
BIOSBasic Input/Output System
BYODBring Your Own Device
CACertificate Authority
CABChange Advisory Board
CAPEXCapital Expenditures
CBCCipher Block Chaining
CBTComputer-Based Training
CCMPCounter Mode with Cipher Block Chaining Message Authentication Code Protocol
CCTVClosed-Circuit Television
CDNContent Delivery Network
CERTComputer Emergency Response Team
CFOChief Financial Officer
CIAConfidentiality Integrity Availability
CIOChief Information Officer
CIRTCyber Incident Response Team
CISOChief Information Security Officer
CMDBConfiguration Management Database
COBITControl Objectives for Information and Related Technologies
CPUCentral Processing Unit
CRLCertificate Revocation List
CSIRTComputer Security Incident Response Team
CSRCertificate Signing Request
DACDiscretionary Access Control
DBMSDatabase Management System
DDoSDistributed Denial of Service
DEPData Execution Prevention
DESData Encryption Standard
DHDiffe-Hellman
DHCPDynamic Host Configuration Protocol
DLPData Loss Prevention
DMZDemilitarized Zone
DNSDomain Name System
DoSDenial of Service
DRPDisaster Recovery Plan
DSADigital Signature Algorithm
EAPExtensible Authentication Protocol
ECCElliptic Curve Cryptography
EFExposure Factor
EFSEncrypting File System
ESPEncapsulating Security Payload
FARFederal Acquisition Regulation
FDEFull Disk Encryption
FIPSFederal Information Processing Standard
FISMAFederal Information Security Management Act
FTPFile Transfer Protocol
GPOGroup Policy Object
GUIDGlobally Unique Identifier
HIDSHost-based Intrusion Detection System
HIPSHost-based Intrusion Prevention System
HMACHashed Message Authentication Code
HTMLHyperText Markup Language
HTTPHypertext Transfer Protocol
HTTPSHypertext Transfer Protocol Secure
IaaSInfrastructure as a Service
IAMIdentity and Access Management
ICMPInternet Control Message Protocol
ICSIndustrial Control System
IDEIntegrated Development Environment
IDSIntrusion Detection System
IECInternational Electrotechnical Commission
IEEEInstitute of Electrical and Electronics Engineers
IETFInternet Engineering Task Force
IISInternet Information Services
IMAPInternet Message Access Protocol
IoTInternet of Things
IPInternet Protocol
IPSIntrusion Prevention System
IPSecInternet Protocol Security
IRIncident Response
ISACAInformation Systems Audit and Control Association
ISOInternational Organization for Standardization
ISPInternet Service Provider
ITILInformation Technology Infrastructure Library
ITSMInformation Technology Service Management
KDCKey Distribution Center
LANLocal Area Network
LDAPLightweight Directory Access Protocol
MACMandatory Access Control
MANMetropolitan Area Network
MFAMulti-Factor Authentication
MITMMan in the Middle
MPLSMultiprotocol Label Switching
MSPManaged Service Provider
MTBFMean Time Between Failures
MTTFMean Time To Failure
MTTRMean Time To Repair
NATNetwork Address Translation
NDANon-Disclosure Agreement
NFCNear Field Communication
NIDSNetwork Intrusion Detection System
NIPSNetwork Intrusion Prevention System
NISTNational Institute of Standards and Technology
NOCNetwork Operations Center
NSANational Security Agency
NTFSNew Technology File System
OAuthOpen Authorization
OJTOn the Job Training
OSOperating System
OSIOpen Systems Interconnection
OTPOne-Time Password
PaaSPlatform as a Service
PACProxy Auto-Config
PATPort Address Translation
PBXPrivate Branch Exchange
PCI DSSPayment Card Industry Data Security Standard
PCMCIAPersonal Computer Memory Card International Association
PDUProtocol Data Unit
PEAPProtected Extensible Authentication Protocol
PKIPublic Key Infrastructure
POAMPlan of Action and Milestones
POP3Post Office Protocol v3
PPPPoint-to-Point Protocol
PTZPan Tilt Zoom
RAReliability Analysis
RADIUSRemote Authentication Dial-In User Service
RAMRandom Access Memory
RATRemote Access Trojan
RFIRequest for Information
RFIDRadio-Frequency Identification
RFPRequest for Proposal
ROIReturn on Investment
ROMRead-Only Memory
RSARivest Shamir Adleman
SaaSSoftware as a Service
SAMLSecurity Assertion Markup Language
SCADASupervisory Control and Data Acquisition
SDLCSystem Development Life Cycle
SDNSoftware Defined Networking
SHASecure Hash Algorithm
SIEMSecurity Information and Event Management
SIMSubscriber Identity Module
SLAService Level Agreement
SMBServer Message Block
SMIMESecure/Multipurpose Internet Mail Extensions
SMTPSimple Mail Transfer Protocol
SNMPSimple Network Management Protocol
SOAService Oriented Architecture
SOCSecurity Operations Center
SOXSarbanes-Oxley Act
SPFSender Policy Framework
SQLStructured Query Language
SSHSecure Shell
SSIDService Set Identifier
SSLSecure Sockets Layer
SSOSingle Sign-On
STPShielded Twisted Pair
SWOTStrengths Weaknesses Opportunities Threats
TCOTotal Cost of Ownership
TCPTransmission Control Protocol
TFTPTrivial File Transfer Protocol
TLSTransport Layer Security
TPMTrusted Platform Module
UATUser Acceptance Testing
UDPUser Datagram Protocol
UPSUninterruptible Power Supply
URIUniform Resource Identifier
URLUniform Resource Locator
USBUniversal Serial Bus
UTMUnified Threat Management
UUIDUniversally Unique Identifier
VDIVirtual Desktop Infrastructure
VoIPVoice over Internet Protocol
VPNVirtual Private Network
VTCVideo Teleconferencing
WANWide Area Network
WEPWired Equivalent Privacy
WiFiWireless Fidelity
WIPSWireless Intrusion Prevention System
WLANWireless Local Area Network
WORMWrite Once Read Many
WPAWi-Fi Protected Access
WPA2Wi-Fi Protected Access 2
XMLExtensible Markup Language
XORExclusive OR
XSRFCross-Site Request Forgery
XSSCross-Site Scripting
All acronyms you could see on the ISC2 CISSP exam!
Share on...
Follow us on...