CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

CompTIA Security+ SY0-701 All Acronyms Flashcards

AcronymDefinition
AAAAuthentication, Authorization, and Accounting
ACLAccess Control List
AESAdvanced Encryption Standard
AES-256Advanced Encryption Standards 256-bit
AHAuthentication Header
AIArtificial Intelligence
AISAutomated Indicator Sharing
ALEAnnualized Loss Expectancy
APAccess Point
APIApplication Programming Interface
APTAdvanced Persistent Threat
AROAnnualized Rate of Occurrence
ARPAddress Resolution Protocol
ASLRAddress Space Layout Randomization
ATT&CKAdversarial Tactics, Techniques, and Common Knowledge
AUPAcceptable Use Policy
AVAntivirus
BASHBourne Again Shell
BCPBusiness Continuity Planning
BGPBorder Gateway Protocol
BIABusiness Impact Analysis
BIOSBasic Input/Output System
BPABusiness Partners Agreement
BPDUBridge Protocol Data Unit
BYODBring Your Own Device
CACertificate Authority
CAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart
CARCorrective Action Report
CASBCloud Access Security Broker
CBCCipher Block Chaining
CCMPCounter Mode/CBC-MAC Protocol
CCTVClosed-circuit Television
CERTComputer Emergency Response Team
CFBCipher Feedback
CHAPChallenge Handshake Authentication Protocol
CIAConfidentiality, Integrity, Availability
CIOChief Information Officer
CIRTComputer Incident Response Team
CMSContent Management System
COOPContinuity of Operation Planning
COPECorporate Owned, Personally Enabled
CPContingency Planning
CRCCyclical Redundancy Check
CRLCertificate Revocation List
CSOChief Security Officer
CSPCloud Service Provider
CSRCertificate Signing Request
CSRFCross-site Request Forgery
CSUChannel Service Unit
CTMCounter Mode
CTOChief Technology Officer
CVECommon Vulnerability Enumeration
CVSSCommon Vulnerability Scoring System
CYODChoose Your Own Device
DACDiscretionary Access Control
DBADatabase Administrator
DDoSDistributed Denial of Service
DEPData Execution Prevention
DESDigital Encryption Standard
DHCPDynamic Host Configuration Protocol
DHEDiffie-Hellman Ephemeral
DKIMDomainKeys Identified Mail
DLLDynamic Link Library
DLPData Loss Prevention
DMARCDomain Message Authentication Reporting and Conformance
DNATDestination Network Address Translation
DNSDomain Name System
DoSDenial of Service
DPOData Privacy Officer
DRPDisaster Recovery Plan
DSADigital Signature Algorithm
DSLDigital Subscriber Line
EAPExtensible Authentication Protocol
ECBElectronic Code Book
ECCElliptic Curve Cryptography
ECDHEElliptic Curve Diffie-Hellman Ephemeral
ECDSAElliptic Curve Digital Signature Algorithm
EDREndpoint Detection and Response
EFSEncrypted File System
ERPEnterprise Resource Planning
ESNElectronic Serial Number
ESPEncapsulated Security Payload
FACLFile System Access Control List
FDEFull Disk Encryption
FIMFile Integrity Management
FPGAField Programmable Gate Array
FRRFalse Rejection Rate
FTPFile Transfer Protocol
FTPSSecured File Transfer Protocol
GCMGalois Counter Mode
GDPRGeneral Data Protection Regulation
GPGGnu Privacy Guard
GPOGroup Policy Object
GPSGlobal Positioning System
GPUGraphics Processing Unit
GREGeneric Routing Encapsulation
HAHigh Availability
HDDHard Disk Drive
HIDSHost-based Intrusion Detection System
HIPSHost-based Intrusion Prevention System
HMACHashed Message Authentication Code
HOTPHMAC-based One-time Password
HSMHardware Security Module
HTMLHypertext Markup Language
HTTPHypertext Transfer Protocol
HTTPSHypertext Transfer Protocol Secure
HVACHeating, Ventilation Air Conditioning
IaaSInfrastructure as a Service
IaCInfrastructure as Code
IAMIdentity and Access Management
ICMPInternet Control Message Protocol
ICSIndustrial Control Systems
IDEAInternational Data Encryption Algorithm
IDFIntermediate Distribution Frame
IdPIdentity Provider
IDSIntrusion Detection System
IEEEInstitute of Electrical and Electronics Engineers
IKEInternet Key Exchange
IMInstant Messaging
IMAPInternet Message Access Protocol
IoCIndicators of Compromise
IoTInternet of Things
IPInternet Protocol
IPSIntrusion Prevention System
IPSecInternet Protocol Security
IRIncident Response
IRCInternet Relay Chat
IRPIncident Response Plan
ISOInternational Standards Organization
ISPInternet Service Provider
ISSOInformation Systems Security Officer
IVInitialization Vector
KDCKey Distribution Center
KEKKey Encryption Key
L2TPLayer 2 Tunneling Protocol
LANLocal Area Network
LDAPLightweight Directory Access Protocol
LEAPLightweight Extensible Authentication Protocol
MaaSMonitoring as a Service
MACMessage Authentication Code
MANMetropolitan Area Network
MBRMaster Boot Record
MD5Message Digest 5
MDFMain Distribution Frame
MDMMobile Device Management
MFAMultifactor Authentication
MFDMultifunction Device
MFPMultifunction Printer
MLMachine Learning
MMSMultimedia Message Service
MOAMemorandum of Agreement
MOUMemorandum of Understanding
MPLSMulti-protocol Label Switching
MSAMaster Service Agreement
MSCHAPMicrosoft Challenge Handshake
AuthenticationProtocol
MSPManaged Service Provider
MSSPManaged Security Service Provider
MTBFMean Time Between Failures
MTTFMean Time to Failure
MTTRMean Time to Recover
MTUMaximum Transmission Unit
NACNetwork Access Control
NATNetwork Address Translation
NDANon-disclosure Agreement
NFCNear Field Communication
NGFWNext-generation Firewall
NIDSNetwork-based Intrusion Detection System
NIPSNetwork-based Intrusion Prevention System
NISTNational Institute of Standards & Technology
NTFSNew Technology File System
NTLMNew Technology LAN Manager
NTPNetwork Time Protocol
OAUTHOpen Authorization
OCSPOnline Certificate Status Protocol
OIDObject Identifier
OSOperating System
OSINTOpen-source Intelligence
OSPFOpen Shortest Path First
OTOperational Technology
OTAOver the Air
OVALOpen Vulnerability Assessment Language
P12PKCS #12
P2PPeer to Peer
PaaSPlatform as a Service
PACProxy Auto Configuration
PAMPluggable Authentication Modules
PAPPassword Authentication Protocol
PATPort Address Translation
PBKDF2Password-based Key Derivation Function 2
PBXPrivate Branch Exchange
PCAPPacket Capture
PCIDSS Payment Card Industry Data Security Standard
PDUPower Distribution Unit
PEAPProtected Extensible Authentication Protocol
PEDPersonal Electronic Device
PEMPrivacy Enhanced Mail
PFSPerfect Forward Secrecy
PGPPretty Good Privacy
PHIPersonal Health Information
PIIPersonally Identifiable Information
PIVPersonal Identity Verification
PKCSPublic Key Cryptography Standards
PKIPublic Key Infrastructure
POPPost Office Protocol
POTSPlain Old Telephone Service
PPPPoint-to-Point Protocol
PPTPPoint-to-Point Tunneling Protocol
PSKPre-shared Key
PTZPan-tilt-zoom
PUPPotentially Unwanted Program
RARegistration Authority
RACEResearch and Development in Advanced Communications Technologies in Europe
RADRapid Application Development
RADIUSRemote Authentication Dial-in User Service
RAIDRedundant Array of Inexpensive Disks
RASRemote Access Server
RATRemote Access Trojan
RBACRule-based Access Control
RC4Rivest Cipher version 4
RDPRemote Desktop Protocol
RFIDRadio Frequency Identifier
RIPEMDRACE Integrity Primitives Evaluation Message Digest
ROIReturn on Investment
RPORecovery Point Objective
RSARivest, Shamir, & Adleman
RTBHRemotely Triggered Black Hole
RTORecovery Time Objective
RTOSReal-time Operating System
RTPReal-time Transport Protocol
S/MIMESecure/Multipurpose Internet Mail Extensions
SaaSSoftware as a Service
SAESimultaneous Authentication of Equals
SAMLSecurity Assertions Markup Language
SANSubject Alternative Name
SASESecure Access Service Edge
SCADASupervisory Control and Data Acquisition
SCAPSecurity Content Automation Protocol
SCEPSimple Certificate Enrollment Protocol
SD-WANSoftware-defined Wide Area Network
SDKSoftware Development Kit
SDLCSoftware Development Lifecycle
SDLMSoftware Development Lifecycle Methodology
SDNSoftware-defined Networking
SELinux Security-enhanced Linux
SEDSelf-encrypting Drives
SEHStructured Exception Handler
SFTPSecured File Transfer Protocol
SHASecure Hashing Algorithm
SHTTPSecure Hypertext Transfer Protocol
SIEMSecurity Information and Event Management
SIMSubscriber Identity Module
SLAService-level Agreement
SLESingle Loss Expectancy
SMSShort Message Service
SMTPSimple Mail Transfer Protocol
SMTPSSimple Mail Transfer Protocol Secure
SNMPSimple Network Management Protocol
SOAPSimple Object Access Protocol
SOARSecurity Orchestration, Automation, Response
SoCSystem on Chip
SOCSecurity Operations Center
SOWStatement of Work
SPFSender Policy Framework
SPIMSpam over Internet Messaging
SQLStructured Query Language
SQLiSQL Injection
SRTPSecure Real-Time Protocol
SSDSolid State Drive
SSHSecure Shell
SSLSecure Sockets Layer
SSOSingle Sign-on
STIXStructured Threat Information eXchange
SWGSecure Web Gateway
TACACS+Terminal Access Controller Access Control System
TAXIITrusted Automated eXchange of Indicator Information
TCP/IPTransmission Control Protocol/Internet Protocol
TGTTicket Granting Ticket
TKIPTemporal Key Integrity Protocol
TLSTransport Layer Security
TOCTime-of-check
TOTPTime-based One-time Password
TOUTime-of-use
TPMTrusted Platform Module
TTPTactics, Techniques, and Procedures
TSIGTransaction Signature
UATUser Acceptance Testing
UAVUnmanned Aerial Vehicle
UDPUser Datagram Protocol
UEFIUnified Extensible Firmware Interface
UEMUnified Endpoint Management
UPSUninterruptable Power Supply
URIUniform Resource Identifier
URLUniversal Resource Locator
USBOTG USB On the Go
UTMUnified Threat Management
UTPUnshielded Twisted Pair
VBAVisual Basic
VDEVirtual Desktop Environment
VDIVirtual Desktop Infrastructure
VLANVirtual Local Area Network
VLSMVariable Length Subnet Masking
VMVirtual Machine
VoIPVoice over IP
VPCVirtual Private Cloud
VPNVirtual Private Network
VTCVideo Teleconferencing
WAFWeb Application Firewall
WAPWireless Access Point
WEPWired Equivalent Privacy
WIDSWireless Intrusion Detection System
WIPSWireless Intrusion Prevention System
WOWork Order
WPAWi-Fi Protected Access
WPSWi-Fi Protected Setup
WTLSWireless TLS
XDRExtended Detection and Response
XMLExtensible Markup Language
XORExclusive Or
XSRFCross-site Request Forgery
XSSCross-site Scripting
Front
MD5
Click the card to flip
Back
Message Digest 5
Front
MSP
Back
Managed Service Provider
Front
URL
Back
Universal Resource Locator
Front
DHE
Back
Diffie-Hellman Ephemeral
Front
RAS
Back
Remote Access Server
Front
ECC
Back
Elliptic Curve Cryptography
Front
PGP
Back
Pretty Good Privacy
Front
RC4
Back
Rivest Cipher version 4
Front
SOW
Back
Statement of Work
Front
CVE
Back
Common Vulnerability Enumeration
Front
IoC
Back
Indicators of Compromise
Front
PEM
Back
Privacy Enhanced Mail
Front
BIOS
Back
Basic Input/Output System
Front
RBAC
Back
Rule-based Access Control
Front
SPIM
Back
Spam over Internet Messaging
Front
TOU
Back
Time-of-use
Front
WO
Back
Work Order
Front
ATT&CK
Back
Adversarial Tactics, Techniques, and Common Knowledge
Front
RTO
Back
Recovery Time Objective
Front
CBC
Back
Cipher Block Chaining
Front
DLP
Back
Data Loss Prevention
Front
SOAR
Back
Security Orchestration, Automation, Response
Front
TOTP
Back
Time-based One-time Password
Front
SFTP
Back
Secured File Transfer Protocol
Front
CASB
Back
Cloud Access Security Broker
Front
MFP
Back
Multifunction Printer
Front
UEM
Back
Unified Endpoint Management
Front
WPS
Back
Wi-Fi Protected Setup
Front
ICS
Back
Industrial Control Systems
Front
PBKDF2
Back
Password-based Key Derivation Function 2
Front
SMTPS
Back
Simple Mail Transfer Protocol Secure
Front
DLL
Back
Dynamic Link Library
Front
ROI
Back
Return on Investment
Front
TACACS+
Back
Terminal Access Controller Access Control System
Front
UTP
Back
Unshielded Twisted Pair
Front
IRC
Back
Internet Relay Chat
Front
MDF
Back
Main Distribution Frame
Front
RTOS
Back
Real-time Operating System
Front
VLSM
Back
Variable Length Subnet Masking
Front
ESN
Back
Electronic Serial Number
Front
GRE
Back
Generic Routing Encapsulation
Front
HA
Back
High Availability
Front
RIPEMD
Back
RACE Integrity Primitives Evaluation Message Digest
Front
VPN
Back
Virtual Private Network
Front
MDM
Back
Mobile Device Management
Front
IoT
Back
Internet of Things
Front
POP
Back
Post Office Protocol
Front
POTS
Back
Plain Old Telephone Service
Front
SRTP
Back
Secure Real-Time Protocol
Front
ML
Back
Machine Learning
Front
OSINT
Back
Open-source Intelligence
Front
CCMP
Back
Counter Mode/CBC-MAC Protocol
Front
CFB
Back
Cipher Feedback
Front
DNAT
Back
Destination Network Address Translation
Front
FIM
Back
File Integrity Management
Front
P2P
Back
Peer to Peer
Front
PTZ
Back
Pan-tilt-zoom
Front
SSH
Back
Secure Shell
Front
WIPS
Back
Wireless Intrusion Prevention System
Front
XML
Back
Extensible Markup Language
Front
CA
Back
Certificate Authority
Front
CRC
Back
Cyclical Redundancy Check
Front
IEEE
Back
Institute of Electrical and Electronics Engineers
Front
MaaS
Back
Monitoring as a Service
Front
CVSS
Back
Common Vulnerability Scoring System
Front
SDLC
Back
Software Development Lifecycle
Front
ESP
Back
Encapsulated Security Payload
Front
KDC
Back
Key Distribution Center
Front
OS
Back
Operating System
Front
VM
Back
Virtual Machine
Front
WTLS
Back
Wireless TLS
Front
AUP
Back
Acceptable Use Policy
Front
DKIM
Back
DomainKeys Identified Mail
Front
IV
Back
Initialization Vector
Front
SMS
Back
Short Message Service
Front
SPF
Back
Sender Policy Framework
Front
CHAP
Back
Challenge Handshake Authentication Protocol
Front
CMS
Back
Content Management System
Front
DES
Back
Digital Encryption Standard
Front
ISO
Back
International Standards Organization
Front
LEAP
Back
Lightweight Extensible Authentication Protocol
Front
PKI
Back
Public Key Infrastructure
Front
RAD
Back
Rapid Application Development
Front
SOAP
Back
Simple Object Access Protocol
Front
SQLi
Back
SQL Injection
Front
DAC
Back
Discretionary Access Control
Front
NTLM
Back
New Technology LAN Manager
Front
TOC
Back
Time-of-check
Front
IDF
Back
Intermediate Distribution Frame
Front
MOU
Back
Memorandum of Understanding
Front
ASLR
Back
Address Space Layout Randomization
Front
CSO
Back
Chief Security Officer
Front
CSU
Back
Channel Service Unit
Front
HVAC
Back
Heating, Ventilation Air Conditioning
Front
SE
Back
Linux Security-enhanced Linux
Front
SIEM
Back
Security Information and Event Management
Front
MSA
Back
Master Service Agreement
Front
SAN
Back
Subject Alternative Name
Front
DSL
Back
Digital Subscriber Line
Front
IP
Back
Internet Protocol
Front
RTP
Back
Real-time Transport Protocol
Front
NIPS
Back
Network-based Intrusion Prevention System
Front
PKCS
Back
Public Key Cryptography Standards
Front
HMAC
Back
Hashed Message Authentication Code
Front
RACE
Back
Research and Development in Advanced Communications Technologies in Europe
Front
SEH
Back
Structured Exception Handler
Front
XSS
Back
Cross-site Scripting
Front
SCEP
Back
Simple Certificate Enrollment Protocol
Front
TTP
Back
Tactics, Techniques, and Procedures
Front
URI
Back
Uniform Resource Identifier
Front
VoIP
Back
Voice over IP
Front
CIA
Back
Confidentiality, Integrity, Availability
Front
GPG
Back
Gnu Privacy Guard
Front
NGFW
Back
Next-generation Firewall
Front
SLA
Back
Service-level Agreement
Front
ACL
Back
Access Control List
Front
COPE
Back
Corporate Owned, Personally Enabled
Front
SDK
Back
Software Development Kit
Front
UAT
Back
User Acceptance Testing
Front
VPC
Back
Virtual Private Cloud
Front
ISP
Back
Internet Service Provider
Front
WAP
Back
Wireless Access Point
Front
APT
Back
Advanced Persistent Threat
Front
DoS
Back
Denial of Service
Front
FPGA
Back
Field Programmable Gate Array
Front
BIA
Back
Business Impact Analysis
Front
FDE
Back
Full Disk Encryption
Front
MTTR
Back
Mean Time to Recover
Front
PCAP
Back
Packet Capture
Front
SIM
Back
Subscriber Identity Module
Front
TAXII
Back
Trusted Automated eXchange of Indicator Information
Front
PDU
Back
Power Distribution Unit
Front
RDP
Back
Remote Desktop Protocol
Front
API
Back
Application Programming Interface
Front
DPO
Back
Data Privacy Officer
Front
WEP
Back
Wired Equivalent Privacy
Front
BYOD
Back
Bring Your Own Device
Front
MOA
Back
Memorandum of Agreement
Front
NIDS
Back
Network-based Intrusion Detection System
Front
PSK
Back
Pre-shared Key
Front
CSRF
Back
Cross-site Request Forgery
Front
BCP
Back
Business Continuity Planning
Front
DDoS
Back
Distributed Denial of Service
Front
OT
Back
Operational Technology
Front
UPS
Back
Uninterruptable Power Supply
Front
CERT
Back
Computer Emergency Response Team
Front
EFS
Back
Encrypted File System
Front
XDR
Back
Extended Detection and Response
Front
EAP
Back
Extensible Authentication Protocol
Front
NIST
Back
National Institute of Standards & Technology
Front
SQL
Back
Structured Query Language
Front
GPS
Back
Global Positioning System
Front
GPU
Back
Graphics Processing Unit
Front
PaaS
Back
Platform as a Service
Front
TPM
Back
Trusted Platform Module
Front
OTA
Back
Over the Air
Front
RADIUS
Back
Remote Authentication Dial-in User Service
Front
SDLM
Back
Software Development Lifecycle Methodology
Front
SWG
Back
Secure Web Gateway
Front
MFA
Back
Multifactor Authentication
Front
TCP/IP
Back
Transmission Control Protocol/Internet Protocol
Front
MSSP
Back
Managed Security Service Provider
Front
RTBH
Back
Remotely Triggered Black Hole
Front
P12
Back
PKCS #12
Front
SSL
Back
Secure Sockets Layer
Front
CSR
Back
Certificate Signing Request
Front
DNS
Back
Domain Name System
Front
FTPS
Back
Secured File Transfer Protocol
Front
IR
Back
Incident Response
Front
SMTP
Back
Simple Mail Transfer Protocol
Front
HIDS
Back
Host-based Intrusion Detection System
Front
OID
Back
Object Identifier
Front
ARO
Back
Annualized Rate of Occurrence
Front
GCM
Back
Galois Counter Mode
Front
SD-WAN
Back
Software-defined Wide Area Network
Front
FTP
Back
File Transfer Protocol
Front
HTML
Back
Hypertext Markup Language
Front
SCAP
Back
Security Content Automation Protocol
Front
CIO
Back
Chief Information Officer
Front
STIX
Back
Structured Threat Information eXchange
Front
TKIP
Back
Temporal Key Integrity Protocol
Front
UDP
Back
User Datagram Protocol
Front
VDI
Back
Virtual Desktop Infrastructure
Front
PCI
Back
DSS Payment Card Industry Data Security Standard
Front
HIPS
Back
Host-based Intrusion Prevention System
Front
IDEA
Back
International Data Encryption Algorithm
Front
NAT
Back
Network Address Translation
Front
OSPF
Back
Open Shortest Path First
Front
SoC
Back
System on Chip
Front
XSRF
Back
Cross-site Request Forgery
Front
AV
Back
Antivirus
Front
DEP
Back
Data Execution Prevention
Front
HSM
Back
Hardware Security Module
Front
S/MIME
Back
Secure/Multipurpose Internet Mail Extensions
Front
TLS
Back
Transport Layer Security
Front
HDD
Back
Hard Disk Drive
Front
VDE
Back
Virtual Desktop Environment
Front
COOP
Back
Continuity of Operation Planning
Front
ICMP
Back
Internet Control Message Protocol
Front
IPSec
Back
Internet Protocol Security
Front
LAN
Back
Local Area Network
Front
MAN
Back
Metropolitan Area Network
Front
SSO
Back
Single Sign-on
Front
WAF
Back
Web Application Firewall
Front
XOR
Back
Exclusive Or
Front
AIS
Back
Automated Indicator Sharing
Front
IRP
Back
Incident Response Plan
Front
RAID
Back
Redundant Array of Inexpensive Disks
Front
SHA
Back
Secure Hashing Algorithm
Front
AAA
Back
Authentication, Authorization, and Accounting
Front
AES-256
Back
Advanced Encryption Standards 256-bit
Front
CAPTCHA
Back
Completely Automated Public Turing Test to Tell Computers and Humans Apart
Front
PED
Back
Personal Electronic Device
Front
CYOD
Back
Choose Your Own Device
Front
BPDU
Back
Bridge Protocol Data Unit
Front
NDA
Back
Non-disclosure Agreement
Front
SAML
Back
Security Assertions Markup Language
Front
WIDS
Back
Wireless Intrusion Detection System
Front
OVAL
Back
Open Vulnerability Assessment Language
Front
ALE
Back
Annualized Loss Expectancy
Front
SAE
Back
Simultaneous Authentication of Equals
Front
AES
Back
Advanced Encryption Standard
Front
GDPR
Back
General Data Protection Regulation
Front
FRR
Back
False Rejection Rate
Front
IaaS
Back
Infrastructure as a Service
Front
MSCHAP
Back
Microsoft Challenge Handshake
Front
SASE
Back
Secure Access Service Edge
Front
TSIG
Back
Transaction Signature
Front
UEFI
Back
Unified Extensible Firmware Interface
Front
UTM
Back
Unified Threat Management
Front
IDS
Back
Intrusion Detection System
Front
RA
Back
Registration Authority
Front
SHTTP
Back
Secure Hypertext Transfer Protocol
Front
CTM
Back
Counter Mode
Front
PHI
Back
Personal Health Information
Front
AH
Back
Authentication Header
Front
CP
Back
Contingency Planning
Front
IKE
Back
Internet Key Exchange
Front
NTP
Back
Network Time Protocol
Front
CSP
Back
Cloud Service Provider
Front
ERP
Back
Enterprise Resource Planning
Front
HOTP
Back
HMAC-based One-time Password
Front
MAC
Back
Message Authentication Code
Front
USB
Back
OTG USB On the Go
Front
CCTV
Back
Closed-circuit Television
Front
IAM
Back
Identity and Access Management
Front
SED
Back
Self-encrypting Drives
Front
CAR
Back
Corrective Action Report
Front
DSA
Back
Digital Signature Algorithm
Front
ECDHE
Back
Elliptic Curve Diffie-Hellman Ephemeral
Front
GPO
Back
Group Policy Object
Front
HTTPS
Back
Hypertext Transfer Protocol Secure
Front
IPS
Back
Intrusion Prevention System
Front
SDN
Back
Software-defined Networking
Front
SOC
Back
Security Operations Center
Front
MMS
Back
Multimedia Message Service
Front
VBA
Back
Visual Basic
Front
AI
Back
Artificial Intelligence
Front
ISSO
Back
Information Systems Security Officer
Front
RAT
Back
Remote Access Trojan
Front
SCADA
Back
Supervisory Control and Data Acquisition
Front
DHCP
Back
Dynamic Host Configuration Protocol
Front
Authentication
Back
Protocol
Front
SaaS
Back
Software as a Service
Front
TGT
Back
Ticket Granting Ticket
Front
DBA
Back
Database Administrator
Front
EDR
Back
Endpoint Detection and Response
Front
PAT
Back
Port Address Translation
Front
RPO
Back
Recovery Point Objective
Front
SNMP
Back
Simple Network Management Protocol
Front
VLAN
Back
Virtual Local Area Network
Front
OCSP
Back
Online Certificate Status Protocol
Front
IdP
Back
Identity Provider
Front
MFD
Back
Multifunction Device
Front
NFC
Back
Near Field Communication
Front
PAP
Back
Password Authentication Protocol
Front
PEAP
Back
Protected Extensible Authentication Protocol
Front
PPTP
Back
Point-to-Point Tunneling Protocol
Front
DMARC
Back
Domain Message Authentication Reporting and Conformance
Front
KEK
Back
Key Encryption Key
Front
LDAP
Back
Lightweight Directory Access Protocol
Front
PAC
Back
Proxy Auto Configuration
Front
ARP
Back
Address Resolution Protocol
Front
CIRT
Back
Computer Incident Response Team
Front
MBR
Back
Master Boot Record
Front
PII
Back
Personally Identifiable Information
Front
IMAP
Back
Internet Message Access Protocol
Front
RSA
Back
Rivest, Shamir, & Adleman
Front
SSD
Back
Solid State Drive
Front
CTO
Back
Chief Technology Officer
Front
ECB
Back
Electronic Code Book
Front
FACL
Back
File System Access Control List
Front
IM
Back
Instant Messaging
Front
L2TP
Back
Layer 2 Tunneling Protocol
Front
PFS
Back
Perfect Forward Secrecy
Front
NTFS
Back
New Technology File System
Front
RFID
Back
Radio Frequency Identifier
Front
IaC
Back
Infrastructure as Code
Front
MTU
Back
Maximum Transmission Unit
Front
UAV
Back
Unmanned Aerial Vehicle
Front
AP
Back
Access Point
Front
MTTF
Back
Mean Time to Failure
Front
SLE
Back
Single Loss Expectancy
Front
WPA
Back
Wi-Fi Protected Access
Front
HTTP
Back
Hypertext Transfer Protocol
Front
PBX
Back
Private Branch Exchange
Front
PPP
Back
Point-to-Point Protocol
Front
PAM
Back
Pluggable Authentication Modules
Front
PUP
Back
Potentially Unwanted Program
Front
BPA
Back
Business Partners Agreement
Front
PIV
Back
Personal Identity Verification
Front
BGP
Back
Border Gateway Protocol
Front
CRL
Back
Certificate Revocation List
Front
MPLS
Back
Multi-protocol Label Switching
Front
BASH
Back
Bourne Again Shell
Front
DRP
Back
Disaster Recovery Plan
Front
MTBF
Back
Mean Time Between Failures
Front
NAC
Back
Network Access Control
Front
ECDSA
Back
Elliptic Curve Digital Signature Algorithm
Front
OAUTH
Back
Open Authorization
Front
VTC
Back
Video Teleconferencing
1/321