Bash, the Crucial Exams Chat Bot
AI Bot
ISC2 CISSP - All Acronyms Flashcards
ISC2 CISSP Flashcards
| Front | Back |
| AAA | Authentication Authorization Accounting |
| ACL | Access Control List |
| AES | Advanced Encryption Standard |
| ALE | Annualized Loss Expectancy |
| AP | Access Point |
| API | Application Programming Interface |
| ARP | Address Resolution Protocol |
| ASLR | Address Space Layout Randomization |
| BCP | Business Continuity Plan |
| BGP | Border Gateway Protocol |
| BIA | Business Impact Analysis |
| BIOS | Basic Input/Output System |
| BYOD | Bring Your Own Device |
| CA | Certificate Authority |
| CAB | Change Advisory Board |
| CAPEX | Capital Expenditures |
| CBC | Cipher Block Chaining |
| CBT | Computer-Based Training |
| CCMP | Counter Mode with Cipher Block Chaining Message Authentication Code Protocol |
| CCTV | Closed-Circuit Television |
| CDN | Content Delivery Network |
| CERT | Computer Emergency Response Team |
| CFO | Chief Financial Officer |
| CIA | Confidentiality Integrity Availability |
| CIO | Chief Information Officer |
| CIRT | Cyber Incident Response Team |
| CISO | Chief Information Security Officer |
| CMDB | Configuration Management Database |
| COBIT | Control Objectives for Information and Related Technologies |
| CPU | Central Processing Unit |
| CRL | Certificate Revocation List |
| CSIRT | Computer Security Incident Response Team |
| CSR | Certificate Signing Request |
| DAC | Discretionary Access Control |
| DBMS | Database Management System |
| DDoS | Distributed Denial of Service |
| DEP | Data Execution Prevention |
| DES | Data Encryption Standard |
| DH | Diffe-Hellman |
| DHCP | Dynamic Host Configuration Protocol |
| DLP | Data Loss Prevention |
| DMZ | Demilitarized Zone |
| DNS | Domain Name System |
| DoS | Denial of Service |
| DRP | Disaster Recovery Plan |
| DSA | Digital Signature Algorithm |
| EAP | Extensible Authentication Protocol |
| ECC | Elliptic Curve Cryptography |
| EF | Exposure Factor |
| EFS | Encrypting File System |
| ESP | Encapsulating Security Payload |
| FAR | Federal Acquisition Regulation |
| FDE | Full Disk Encryption |
| FIPS | Federal Information Processing Standard |
| FISMA | Federal Information Security Management Act |
| FTP | File Transfer Protocol |
| GPO | Group Policy Object |
| GUID | Globally Unique Identifier |
| HIDS | Host-based Intrusion Detection System |
| HIPS | Host-based Intrusion Prevention System |
| HMAC | Hashed Message Authentication Code |
| HTML | HyperText Markup Language |
| HTTP | Hypertext Transfer Protocol |
| HTTPS | Hypertext Transfer Protocol Secure |
| IaaS | Infrastructure as a Service |
| IAM | Identity and Access Management |
| ICMP | Internet Control Message Protocol |
| ICS | Industrial Control System |
| IDE | Integrated Development Environment |
| IDS | Intrusion Detection System |
| IEC | International Electrotechnical Commission |
| IEEE | Institute of Electrical and Electronics Engineers |
| IETF | Internet Engineering Task Force |
| IIS | Internet Information Services |
| IMAP | Internet Message Access Protocol |
| IoT | Internet of Things |
| IP | Internet Protocol |
| IPS | Intrusion Prevention System |
| IPSec | Internet Protocol Security |
| IR | Incident Response |
| ISACA | Information Systems Audit and Control Association |
| ISO | International Organization for Standardization |
| ISP | Internet Service Provider |
| ITIL | Information Technology Infrastructure Library |
| ITSM | Information Technology Service Management |
| KDC | Key Distribution Center |
| LAN | Local Area Network |
| LDAP | Lightweight Directory Access Protocol |
| MAC | Mandatory Access Control |
| MAN | Metropolitan Area Network |
| MFA | Multi-Factor Authentication |
| MITM | Man in the Middle |
| MPLS | Multiprotocol Label Switching |
| MSP | Managed Service Provider |
| MTBF | Mean Time Between Failures |
| MTTF | Mean Time To Failure |
| MTTR | Mean Time To Repair |
| NAT | Network Address Translation |
| NDA | Non-Disclosure Agreement |
| NFC | Near Field Communication |
| NIDS | Network Intrusion Detection System |
| NIPS | Network Intrusion Prevention System |
| NIST | National Institute of Standards and Technology |
| NOC | Network Operations Center |
| NSA | National Security Agency |
| NTFS | New Technology File System |
| OAuth | Open Authorization |
| OJT | On the Job Training |
| OS | Operating System |
| OSI | Open Systems Interconnection |
| OTP | One-Time Password |
| PaaS | Platform as a Service |
| PAC | Proxy Auto-Config |
| PAT | Port Address Translation |
| PBX | Private Branch Exchange |
| PCI DSS | Payment Card Industry Data Security Standard |
| PCMCIA | Personal Computer Memory Card International Association |
| PDU | Protocol Data Unit |
| PEAP | Protected Extensible Authentication Protocol |
| PKI | Public Key Infrastructure |
| POAM | Plan of Action and Milestones |
| POP3 | Post Office Protocol v3 |
| PPP | Point-to-Point Protocol |
| PTZ | Pan Tilt Zoom |
| RA | Reliability Analysis |
| RADIUS | Remote Authentication Dial-In User Service |
| RAM | Random Access Memory |
| RAT | Remote Access Trojan |
| RFI | Request for Information |
| RFID | Radio-Frequency Identification |
| RFP | Request for Proposal |
| ROI | Return on Investment |
| ROM | Read-Only Memory |
| RSA | Rivest Shamir Adleman |
| SaaS | Software as a Service |
| SAML | Security Assertion Markup Language |
| SCADA | Supervisory Control and Data Acquisition |
| SDLC | System Development Life Cycle |
| SDN | Software Defined Networking |
| SHA | Secure Hash Algorithm |
| SIEM | Security Information and Event Management |
| SIM | Subscriber Identity Module |
| SLA | Service Level Agreement |
| SMB | Server Message Block |
| SMIME | Secure/Multipurpose Internet Mail Extensions |
| SMTP | Simple Mail Transfer Protocol |
| SNMP | Simple Network Management Protocol |
| SOA | Service Oriented Architecture |
| SOC | Security Operations Center |
| SOX | Sarbanes-Oxley Act |
| SPF | Sender Policy Framework |
| SQL | Structured Query Language |
| SSH | Secure Shell |
| SSID | Service Set Identifier |
| SSL | Secure Sockets Layer |
| SSO | Single Sign-On |
| STP | Shielded Twisted Pair |
| SWOT | Strengths Weaknesses Opportunities Threats |
| TCO | Total Cost of Ownership |
| TCP | Transmission Control Protocol |
| TFTP | Trivial File Transfer Protocol |
| TLS | Transport Layer Security |
| TPM | Trusted Platform Module |
| UAT | User Acceptance Testing |
| UDP | User Datagram Protocol |
| UPS | Uninterruptible Power Supply |
| URI | Uniform Resource Identifier |
| URL | Uniform Resource Locator |
| USB | Universal Serial Bus |
| UTM | Unified Threat Management |
| UUID | Universally Unique Identifier |
| VDI | Virtual Desktop Infrastructure |
| VoIP | Voice over Internet Protocol |
| VPN | Virtual Private Network |
| VTC | Video Teleconferencing |
| WAN | Wide Area Network |
| WEP | Wired Equivalent Privacy |
| WiFi | Wireless Fidelity |
| WIPS | Wireless Intrusion Prevention System |
| WLAN | Wireless Local Area Network |
| WORM | Write Once Read Many |
| WPA | Wi-Fi Protected Access |
| WPA2 | Wi-Fi Protected Access 2 |
| XML | Extensible Markup Language |
| XOR | Exclusive OR |
| XSRF | Cross-Site Request Forgery |
| XSS | Cross-Site Scripting |
All acronyms you could see on the ISC2 CISSP exam!