CompTIA Security+ SY0-701 All Acronyms Flashcards
Acronym | Definition |
---|---|
AAA | Authentication, Authorization, and Accounting |
ACL | Access Control List |
AES | Advanced Encryption Standard |
AES-256 | Advanced Encryption Standards 256-bit |
AH | Authentication Header |
AI | Artificial Intelligence |
AIS | Automated Indicator Sharing |
ALE | Annualized Loss Expectancy |
AP | Access Point |
API | Application Programming Interface |
APT | Advanced Persistent Threat |
ARO | Annualized Rate of Occurrence |
ARP | Address Resolution Protocol |
ASLR | Address Space Layout Randomization |
ATT&CK | Adversarial Tactics, Techniques, and Common Knowledge |
AUP | Acceptable Use Policy |
AV | Antivirus |
BASH | Bourne Again Shell |
BCP | Business Continuity Planning |
BGP | Border Gateway Protocol |
BIA | Business Impact Analysis |
BIOS | Basic Input/Output System |
BPA | Business Partners Agreement |
BPDU | Bridge Protocol Data Unit |
BYOD | Bring Your Own Device |
CA | Certificate Authority |
CAPTCHA | Completely Automated Public Turing Test to Tell Computers and Humans Apart |
CAR | Corrective Action Report |
CASB | Cloud Access Security Broker |
CBC | Cipher Block Chaining |
CCMP | Counter Mode/CBC-MAC Protocol |
CCTV | Closed-circuit Television |
CERT | Computer Emergency Response Team |
CFB | Cipher Feedback |
CHAP | Challenge Handshake Authentication Protocol |
CIA | Confidentiality, Integrity, Availability |
CIO | Chief Information Officer |
CIRT | Computer Incident Response Team |
CMS | Content Management System |
COOP | Continuity of Operation Planning |
COPE | Corporate Owned, Personally Enabled |
CP | Contingency Planning |
CRC | Cyclical Redundancy Check |
CRL | Certificate Revocation List |
CSO | Chief Security Officer |
CSP | Cloud Service Provider |
CSR | Certificate Signing Request |
CSRF | Cross-site Request Forgery |
CSU | Channel Service Unit |
CTM | Counter Mode |
CTO | Chief Technology Officer |
CVE | Common Vulnerability Enumeration |
CVSS | Common Vulnerability Scoring System |
CYOD | Choose Your Own Device |
DAC | Discretionary Access Control |
DBA | Database Administrator |
DDoS | Distributed Denial of Service |
DEP | Data Execution Prevention |
DES | Digital Encryption Standard |
DHCP | Dynamic Host Configuration Protocol |
DHE | Diffie-Hellman Ephemeral |
DKIM | DomainKeys Identified Mail |
DLL | Dynamic Link Library |
DLP | Data Loss Prevention |
DMARC | Domain Message Authentication Reporting and Conformance |
DNAT | Destination Network Address Translation |
DNS | Domain Name System |
DoS | Denial of Service |
DPO | Data Privacy Officer |
DRP | Disaster Recovery Plan |
DSA | Digital Signature Algorithm |
DSL | Digital Subscriber Line |
EAP | Extensible Authentication Protocol |
ECB | Electronic Code Book |
ECC | Elliptic Curve Cryptography |
ECDHE | Elliptic Curve Diffie-Hellman Ephemeral |
ECDSA | Elliptic Curve Digital Signature Algorithm |
EDR | Endpoint Detection and Response |
EFS | Encrypted File System |
ERP | Enterprise Resource Planning |
ESN | Electronic Serial Number |
ESP | Encapsulated Security Payload |
FACL | File System Access Control List |
FDE | Full Disk Encryption |
FIM | File Integrity Management |
FPGA | Field Programmable Gate Array |
FRR | False Rejection Rate |
FTP | File Transfer Protocol |
FTPS | File Transfer Protocol Secure |
GCM | Galois Counter Mode |
GDPR | General Data Protection Regulation |
GPG | Gnu Privacy Guard |
GPO | Group Policy Object |
GPS | Global Positioning System |
GPU | Graphics Processing Unit |
GRE | Generic Routing Encapsulation |
HA | High Availability |
HDD | Hard Disk Drive |
HIDS | Host-based Intrusion Detection System |
HIPS | Host-based Intrusion Prevention System |
HMAC | Hashed Message Authentication Code |
HOTP | HMAC-based One-time Password |
HSM | Hardware Security Module |
HTML | Hypertext Markup Language |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol Secure |
HVAC | Heating, Ventilation Air Conditioning |
IaaS | Infrastructure as a Service |
IaC | Infrastructure as Code |
IAM | Identity and Access Management |
ICMP | Internet Control Message Protocol |
ICS | Industrial Control Systems |
IDEA | International Data Encryption Algorithm |
IDF | Intermediate Distribution Frame |
IdP | Identity Provider |
IDS | Intrusion Detection System |
IEEE | Institute of Electrical and Electronics Engineers |
IKE | Internet Key Exchange |
IM | Instant Messaging |
IMAP | Internet Message Access Protocol |
IoC | Indicators of Compromise |
IoT | Internet of Things |
IP | Internet Protocol |
IPS | Intrusion Prevention System |
IPSec | Internet Protocol Security |
IR | Incident Response |
IRC | Internet Relay Chat |
IRP | Incident Response Plan |
ISO | International Standards Organization |
ISP | Internet Service Provider |
ISSO | Information Systems Security Officer |
IV | Initialization Vector |
KDC | Key Distribution Center |
KEK | Key Encryption Key |
L2TP | Layer 2 Tunneling Protocol |
LAN | Local Area Network |
LDAP | Lightweight Directory Access Protocol |
LEAP | Lightweight Extensible Authentication Protocol |
MaaS | Monitoring as a Service |
MAC | Message Authentication Code |
MAN | Metropolitan Area Network |
MBR | Master Boot Record |
MD5 | Message Digest 5 |
MDF | Main Distribution Frame |
MDM | Mobile Device Management |
MFA | Multifactor Authentication |
MFD | Multifunction Device |
MFP | Multifunction Printer |
ML | Machine Learning |
MMS | Multimedia Message Service |
MOA | Memorandum of Agreement |
MOU | Memorandum of Understanding |
MPLS | Multi-protocol Label Switching |
MSA | Master Service Agreement |
MS-CHAP | Microsoft Challenge-Handshake Authentication Protocol |
Authentication | Protocol |
MSP | Managed Service Provider |
MSSP | Managed Security Service Provider |
MTBF | Mean Time Between Failures |
MTTF | Mean Time to Failure |
MTTR | Mean Time to Recover |
MTU | Maximum Transmission Unit |
NAC | Network Access Control |
NAT | Network Address Translation |
NDA | Non-disclosure Agreement |
NFC | Near Field Communication |
NGFW | Next-generation Firewall |
NIDS | Network-based Intrusion Detection System |
NIPS | Network-based Intrusion Prevention System |
NIST | National Institute of Standards & Technology |
NTFS | New Technology File System |
NTLM | New Technology LAN Manager |
NTP | Network Time Protocol |
OAUTH | Open Authorization |
OCSP | Online Certificate Status Protocol |
OID | Object Identifier |
OS | Operating System |
OSINT | Open-source Intelligence |
OSPF | Open Shortest Path First |
OT | Operational Technology |
OTA | Over the Air |
OVAL | Open Vulnerability Assessment Language |
P12 | PKCS #12 |
P2P | Peer to Peer |
PaaS | Platform as a Service |
PAC | Proxy Auto Configuration |
PAM | Pluggable Authentication Modules |
PAP | Password Authentication Protocol |
PAT | Port Address Translation |
PBKDF2 | Password-based Key Derivation Function 2 |
PBX | Private Branch Exchange |
PCAP | Packet Capture |
PCI | DSS Payment Card Industry Data Security Standard |
PDU | Power Distribution Unit |
PEAP | Protected Extensible Authentication Protocol |
PED | Personal Electronic Device |
PEM | Privacy Enhanced Mail |
PFS | Perfect Forward Secrecy |
PGP | Pretty Good Privacy |
PHI | Personal Health Information |
PII | Personally Identifiable Information |
PIV | Personal Identity Verification |
PKCS | Public Key Cryptography Standards |
PKI | Public Key Infrastructure |
POP | Post Office Protocol |
POTS | Plain Old Telephone Service |
PPP | Point-to-Point Protocol |
PPTP | Point-to-Point Tunneling Protocol |
PSK | Pre-shared Key |
PTZ | Pan-tilt-zoom |
PUP | Potentially Unwanted Program |
RA | Registration Authority |
RACE | Research and Development in Advanced Communications Technologies in Europe |
RAD | Rapid Application Development |
RADIUS | Remote Authentication Dial-in User Service |
RAID | Redundant Array of Inexpensive Disks |
RAS | Remote Access Server |
RAT | Remote Access Trojan |
RBAC | Rule-based Access Control |
RC4 | Rivest Cipher version 4 |
RDP | Remote Desktop Protocol |
RFID | Radio Frequency Identifier |
RIPEMD | RACE Integrity Primitives Evaluation Message Digest |
ROI | Return on Investment |
RPO | Recovery Point Objective |
RSA | Rivest, Shamir, & Adleman |
RTBH | Remotely Triggered Black Hole |
RTO | Recovery Time Objective |
RTOS | Real-time Operating System |
RTP | Real-time Transport Protocol |
S/MIME | Secure/Multipurpose Internet Mail Extensions |
SaaS | Software as a Service |
SAE | Simultaneous Authentication of Equals |
SAML | Security Assertions Markup Language |
SAN | Subject Alternative Name |
SASE | Secure Access Service Edge |
SCADA | Supervisory Control and Data Acquisition |
SCAP | Security Content Automation Protocol |
SCEP | Simple Certificate Enrollment Protocol |
SD-WAN | Software-defined Wide Area Network |
SDK | Software Development Kit |
SDLC | Software Development Lifecycle |
SDLM | Software Development Lifecycle Methodology |
SDN | Software-defined Networking |
SE Linux | Security-enhanced Linux |
SED | Self-encrypting Drives |
SEH | Structured Exception Handler |
SFTP | Secured File Transfer Protocol |
SHA | Secure Hashing Algorithm |
SHTTP | Secure Hypertext Transfer Protocol |
SIEM | Security Information and Event Management |
SIM | Subscriber Identity Module |
SLA | Service-level Agreement |
SLE | Single Loss Expectancy |
SMS | Short Message Service |
SMTP | Simple Mail Transfer Protocol |
SMTPS | Simple Mail Transfer Protocol Secure |
SNMP | Simple Network Management Protocol |
SOAP | Simple Object Access Protocol |
SOAR | Security Orchestration, Automation, Response |
SoC | System on Chip |
SOC | Security Operations Center |
SOW | Statement of Work |
SPF | Sender Policy Framework |
SPIM | Spam over Internet Messaging |
SQL | Structured Query Language |
SQLi | SQL Injection |
SRTP | Secure Real-Time Protocol |
SSD | Solid State Drive |
SSH | Secure Shell |
SSL | Secure Sockets Layer |
SSO | Single Sign-on |
STIX | Structured Threat Information eXchange |
SWG | Secure Web Gateway |
TACACS+ | Terminal Access Controller Access Control System |
TAXII | Trusted Automated eXchange of Indicator Information |
TCP/IP | Transmission Control Protocol/Internet Protocol |
TGT | Ticket Granting Ticket |
TKIP | Temporal Key Integrity Protocol |
TLS | Transport Layer Security |
TOC | Time-of-check |
TOTP | Time-based One-time Password |
TOU | Time-of-use |
TPM | Trusted Platform Module |
TTP | Tactics, Techniques, and Procedures |
TSIG | Transaction Signature |
UAT | User Acceptance Testing |
UAV | Unmanned Aerial Vehicle |
UDP | User Datagram Protocol |
UEFI | Unified Extensible Firmware Interface |
UEM | Unified Endpoint Management |
UPS | Uninterruptable Power Supply |
URI | Uniform Resource Identifier |
URL | Universal Resource Locator |
USB OTG | USB On the Go |
UTM | Unified Threat Management |
UTP | Unshielded Twisted Pair |
VBA | Visual Basic |
VDE | Virtual Desktop Environment |
VDI | Virtual Desktop Infrastructure |
VLAN | Virtual Local Area Network |
VLSM | Variable Length Subnet Masking |
VM | Virtual Machine |
VoIP | Voice over IP |
VPC | Virtual Private Cloud |
VPN | Virtual Private Network |
VTC | Video Teleconferencing |
WAF | Web Application Firewall |
WAP | Wireless Access Point |
WEP | Wired Equivalent Privacy |
WIDS | Wireless Intrusion Detection System |
WIPS | Wireless Intrusion Prevention System |
WO | Work Order |
WPA | Wi-Fi Protected Access |
WPS | Wi-Fi Protected Setup |
WTLS | Wireless TLS |
XDR | Extended Detection and Response |
XML | Extensible Markup Language |
XOR | Exclusive Or |
XSRF | Cross-site Request Forgery |
XSS | Cross-site Scripting |
Front
ATT&CK
Click the card to flip
Back
Adversarial Tactics, Techniques, and Common Knowledge
Front
ECB
Back
Electronic Code Book
Front
PKCS
Back
Public Key Cryptography Standards
Front
SPIM
Back
Spam over Internet Messaging
Front
IDS
Back
Intrusion Detection System
Front
MaaS
Back
Monitoring as a Service
Front
XOR
Back
Exclusive Or
Front
ROI
Back
Return on Investment
Front
APT
Back
Advanced Persistent Threat
Front
CIRT
Back
Computer Incident Response Team
Front
DHCP
Back
Dynamic Host Configuration Protocol
Front
HTTPS
Back
Hypertext Transfer Protocol Secure
Front
PEM
Back
Privacy Enhanced Mail
Front
SDLC
Back
Software Development Lifecycle
Front
SOW
Back
Statement of Work
Front
UAV
Back
Unmanned Aerial Vehicle
Front
AES
Back
Advanced Encryption Standard
Front
AES-256
Back
Advanced Encryption Standards 256-bit
Front
SAML
Back
Security Assertions Markup Language
Front
CASB
Back
Cloud Access Security Broker
Front
CCTV
Back
Closed-circuit Television
Front
DHE
Back
Diffie-Hellman Ephemeral
Front
HIDS
Back
Host-based Intrusion Detection System
Front
MTTR
Back
Mean Time to Recover
Front
PII
Back
Personally Identifiable Information
Front
RADIUS
Back
Remote Authentication Dial-in User Service
Front
CSU
Back
Channel Service Unit
Front
DPO
Back
Data Privacy Officer
Front
HOTP
Back
HMAC-based One-time Password
Front
MFA
Back
Multifactor Authentication
Front
SIM
Back
Subscriber Identity Module
Front
BCP
Back
Business Continuity Planning
Front
COPE
Back
Corporate Owned, Personally Enabled
Front
CRL
Back
Certificate Revocation List
Front
CTM
Back
Counter Mode
Front
KEK
Back
Key Encryption Key
Front
IP
Back
Internet Protocol
Front
MAC
Back
Message Authentication Code
Front
OID
Back
Object Identifier
Front
UTP
Back
Unshielded Twisted Pair
Front
ARO
Back
Annualized Rate of Occurrence
Front
HVAC
Back
Heating, Ventilation Air Conditioning
Front
MDM
Back
Mobile Device Management
Front
RAID
Back
Redundant Array of Inexpensive Disks
Front
SED
Back
Self-encrypting Drives
Front
SSL
Back
Secure Sockets Layer
Front
HA
Back
High Availability
Front
SCAP
Back
Security Content Automation Protocol
Front
SDN
Back
Software-defined Networking
Front
SQL
Back
Structured Query Language
Front
RTP
Back
Real-time Transport Protocol
Front
ALE
Back
Annualized Loss Expectancy
Front
CAPTCHA
Back
Completely Automated Public Turing Test to Tell Computers and Humans Apart
Front
PKI
Back
Public Key Infrastructure
Front
DLP
Back
Data Loss Prevention
Front
IRC
Back
Internet Relay Chat
Front
BIA
Back
Business Impact Analysis
Front
WEP
Back
Wired Equivalent Privacy
Front
BIOS
Back
Basic Input/Output System
Front
IKE
Back
Internet Key Exchange
Front
VTC
Back
Video Teleconferencing
Front
EAP
Back
Extensible Authentication Protocol
Front
IV
Back
Initialization Vector
Front
NIST
Back
National Institute of Standards & Technology
Front
SSO
Back
Single Sign-on
Front
CCMP
Back
Counter Mode/CBC-MAC Protocol
Front
ISO
Back
International Standards Organization
Front
MMS
Back
Multimedia Message Service
Front
VM
Back
Virtual Machine
Front
VPN
Back
Virtual Private Network
Front
HSM
Back
Hardware Security Module
Front
GPS
Back
Global Positioning System
Front
KDC
Back
Key Distribution Center
Front
RC4
Back
Rivest Cipher version 4
Front
SOAP
Back
Simple Object Access Protocol
Front
TOC
Back
Time-of-check
Front
WIPS
Back
Wireless Intrusion Prevention System
Front
ESP
Back
Encapsulated Security Payload
Front
RDP
Back
Remote Desktop Protocol
Front
TLS
Back
Transport Layer Security
Front
PEAP
Back
Protected Extensible Authentication Protocol
Front
RPO
Back
Recovery Point Objective
Front
DBA
Back
Database Administrator
Front
BASH
Back
Bourne Again Shell
Front
IEEE
Back
Institute of Electrical and Electronics Engineers
Front
MTBF
Back
Mean Time Between Failures
Front
OAUTH
Back
Open Authorization
Front
RACE
Back
Research and Development in Advanced Communications Technologies in Europe
Front
PTZ
Back
Pan-tilt-zoom
Front
LDAP
Back
Lightweight Directory Access Protocol
Front
VPC
Back
Virtual Private Cloud
Front
XDR
Back
Extended Detection and Response
Front
CP
Back
Contingency Planning
Front
XSS
Back
Cross-site Scripting
Front
AP
Back
Access Point
Front
MSP
Back
Managed Service Provider
Front
MSSP
Back
Managed Security Service Provider
Front
OT
Back
Operational Technology
Front
PIV
Back
Personal Identity Verification
Front
STIX
Back
Structured Threat Information eXchange
Front
GDPR
Back
General Data Protection Regulation
Front
HTTP
Back
Hypertext Transfer Protocol
Front
FPGA
Back
Field Programmable Gate Array
Front
RTO
Back
Recovery Time Objective
Front
SWG
Back
Secure Web Gateway
Front
BYOD
Back
Bring Your Own Device
Front
HTML
Back
Hypertext Markup Language
Front
IoC
Back
Indicators of Compromise
Front
SIEM
Back
Security Information and Event Management
Front
ECDSA
Back
Elliptic Curve Digital Signature Algorithm
Front
LEAP
Back
Lightweight Extensible Authentication Protocol
Front
POP
Back
Post Office Protocol
Front
SLE
Back
Single Loss Expectancy
Front
RSA
Back
Rivest, Shamir, & Adleman
Front
NFC
Back
Near Field Communication
Front
VoIP
Back
Voice over IP
Front
CSO
Back
Chief Security Officer
Front
MSA
Back
Master Service Agreement
Front
SMS
Back
Short Message Service
Front
URL
Back
Universal Resource Locator
Front
WPA
Back
Wi-Fi Protected Access
Front
CSP
Back
Cloud Service Provider
Front
FRR
Back
False Rejection Rate
Front
MFD
Back
Multifunction Device
Front
VLSM
Back
Variable Length Subnet Masking
Front
WPS
Back
Wi-Fi Protected Setup
Front
DoS
Back
Denial of Service
Front
FACL
Back
File System Access Control List
Front
RAS
Back
Remote Access Server
Front
TPM
Back
Trusted Platform Module
Front
WAP
Back
Wireless Access Point
Front
AI
Back
Artificial Intelligence
Front
CSRF
Back
Cross-site Request Forgery
Front
ICS
Back
Industrial Control Systems
Front
IDF
Back
Intermediate Distribution Frame
Front
L2TP
Back
Layer 2 Tunneling Protocol
Front
SHA
Back
Secure Hashing Algorithm
Front
SLA
Back
Service-level Agreement
Front
OCSP
Back
Online Certificate Status Protocol
Front
RIPEMD
Back
RACE Integrity Primitives Evaluation Message Digest
Front
RTOS
Back
Real-time Operating System
Front
SSH
Back
Secure Shell
Front
ECC
Back
Elliptic Curve Cryptography
Front
IaaS
Back
Infrastructure as a Service
Front
NAT
Back
Network Address Translation
Front
SDLM
Back
Software Development Lifecycle Methodology
Front
CHAP
Back
Challenge Handshake Authentication Protocol
Front
SE Linux
Back
Security-enhanced Linux
Front
SRTP
Back
Secure Real-Time Protocol
Front
TOU
Back
Time-of-use
Front
VDI
Back
Virtual Desktop Infrastructure
Front
PUP
Back
Potentially Unwanted Program
Front
IM
Back
Instant Messaging
Front
PSK
Back
Pre-shared Key
Front
IoT
Back
Internet of Things
Front
PAM
Back
Pluggable Authentication Modules
Front
ASLR
Back
Address Space Layout Randomization
Front
OTA
Back
Over the Air
Front
PAP
Back
Password Authentication Protocol
Front
DES
Back
Digital Encryption Standard
Front
RBAC
Back
Rule-based Access Control
Front
FIM
Back
File Integrity Management
Front
SMTP
Back
Simple Mail Transfer Protocol
Front
UDP
Back
User Datagram Protocol
Front
VBA
Back
Visual Basic
Front
CVE
Back
Common Vulnerability Enumeration
Front
CMS
Back
Content Management System
Front
ECDHE
Back
Elliptic Curve Diffie-Hellman Ephemeral
Front
IR
Back
Incident Response
Front
Authentication
Back
Protocol
Front
P12
Back
PKCS #12
Front
SASE
Back
Secure Access Service Edge
Front
TSIG
Back
Transaction Signature
Front
IDEA
Back
International Data Encryption Algorithm
Front
SPF
Back
Sender Policy Framework
Front
TTP
Back
Tactics, Techniques, and Procedures
Front
XSRF
Back
Cross-site Request Forgery
Front
MAN
Back
Metropolitan Area Network
Front
OVAL
Back
Open Vulnerability Assessment Language
Front
SoC
Back
System on Chip
Front
PDU
Back
Power Distribution Unit
Front
NIPS
Back
Network-based Intrusion Prevention System
Front
SaaS
Back
Software as a Service
Front
BGP
Back
Border Gateway Protocol
Front
EDR
Back
Endpoint Detection and Response
Front
NGFW
Back
Next-generation Firewall
Front
PFS
Back
Perfect Forward Secrecy
Front
SEH
Back
Structured Exception Handler
Front
SAN
Back
Subject Alternative Name
Front
AAA
Back
Authentication, Authorization, and Accounting
Front
CTO
Back
Chief Technology Officer
Front
OS
Back
Operating System
Front
UPS
Back
Uninterruptable Power Supply
Front
GPU
Back
Graphics Processing Unit
Front
P2P
Back
Peer to Peer
Front
GRE
Back
Generic Routing Encapsulation
Front
IPSec
Back
Internet Protocol Security
Front
S/MIME
Back
Secure/Multipurpose Internet Mail Extensions
Front
SMTPS
Back
Simple Mail Transfer Protocol Secure
Front
AIS
Back
Automated Indicator Sharing
Front
MFP
Back
Multifunction Printer
Front
ERP
Back
Enterprise Resource Planning
Front
PBX
Back
Private Branch Exchange
Front
PGP
Back
Pretty Good Privacy
Front
RAD
Back
Rapid Application Development
Front
SCADA
Back
Supervisory Control and Data Acquisition
Front
BPA
Back
Business Partners Agreement
Front
CIO
Back
Chief Information Officer
Front
GCM
Back
Galois Counter Mode
Front
IdP
Back
Identity Provider
Front
NTLM
Back
New Technology LAN Manager
Front
MTTF
Back
Mean Time to Failure
Front
PAC
Back
Proxy Auto Configuration
Front
CAR
Back
Corrective Action Report
Front
DKIM
Back
DomainKeys Identified Mail
Front
ML
Back
Machine Learning
Front
SHTTP
Back
Secure Hypertext Transfer Protocol
Front
SQLi
Back
SQL Injection
Front
WAF
Back
Web Application Firewall
Front
HIPS
Back
Host-based Intrusion Prevention System
Front
PBKDF2
Back
Password-based Key Derivation Function 2
Front
RA
Back
Registration Authority
Front
GPO
Back
Group Policy Object
Front
HMAC
Back
Hashed Message Authentication Code
Front
MD5
Back
Message Digest 5
Front
MTU
Back
Maximum Transmission Unit
Front
PPTP
Back
Point-to-Point Tunneling Protocol
Front
RFID
Back
Radio Frequency Identifier
Front
SCEP
Back
Simple Certificate Enrollment Protocol
Front
DNAT
Back
Destination Network Address Translation
Front
FTP
Back
File Transfer Protocol
Front
SFTP
Back
Secured File Transfer Protocol
Front
USB OTG
Back
USB On the Go
Front
ARP
Back
Address Resolution Protocol
Front
DSA
Back
Digital Signature Algorithm
Front
TCP/IP
Back
Transmission Control Protocol/Internet Protocol
Front
ICMP
Back
Internet Control Message Protocol
Front
MS-CHAP
Back
Microsoft Challenge-Handshake Authentication Protocol
Front
UEFI
Back
Unified Extensible Firmware Interface
Front
CA
Back
Certificate Authority
Front
CRC
Back
Cyclical Redundancy Check
Front
NTP
Back
Network Time Protocol
Front
RAT
Back
Remote Access Trojan
Front
FTPS
Back
File Transfer Protocol Secure
Front
SOC
Back
Security Operations Center
Front
DDoS
Back
Distributed Denial of Service
Front
OSPF
Back
Open Shortest Path First
Front
TAXII
Back
Trusted Automated eXchange of Indicator Information
Front
UEM
Back
Unified Endpoint Management
Front
DLL
Back
Dynamic Link Library
Front
IaC
Back
Infrastructure as Code
Front
MDF
Back
Main Distribution Frame
Front
WO
Back
Work Order
Front
PPP
Back
Point-to-Point Protocol
Front
TACACS+
Back
Terminal Access Controller Access Control System
Front
DAC
Back
Discretionary Access Control
Front
MBR
Back
Master Boot Record
Front
POTS
Back
Plain Old Telephone Service
Front
VDE
Back
Virtual Desktop Environment
Front
BPDU
Back
Bridge Protocol Data Unit
Front
DMARC
Back
Domain Message Authentication Reporting and Conformance
Front
URI
Back
Uniform Resource Identifier
Front
AH
Back
Authentication Header
Front
CVSS
Back
Common Vulnerability Scoring System
Front
ACL
Back
Access Control List
Front
NAC
Back
Network Access Control
Front
SOAR
Back
Security Orchestration, Automation, Response
Front
UAT
Back
User Acceptance Testing
Front
AUP
Back
Acceptable Use Policy
Front
SSD
Back
Solid State Drive
Front
GPG
Back
Gnu Privacy Guard
Front
RTBH
Back
Remotely Triggered Black Hole
Front
CBC
Back
Cipher Block Chaining
Front
CFB
Back
Cipher Feedback
Front
XML
Back
Extensible Markup Language
Front
AV
Back
Antivirus
Front
IRP
Back
Incident Response Plan
Front
SAE
Back
Simultaneous Authentication of Equals
Front
FDE
Back
Full Disk Encryption
Front
HDD
Back
Hard Disk Drive
Front
MOU
Back
Memorandum of Understanding
Front
VLAN
Back
Virtual Local Area Network
Front
IAM
Back
Identity and Access Management
Front
ISP
Back
Internet Service Provider
Front
MOA
Back
Memorandum of Agreement
Front
NDA
Back
Non-disclosure Agreement
Front
PaaS
Back
Platform as a Service
Front
TOTP
Back
Time-based One-time Password
Front
WIDS
Back
Wireless Intrusion Detection System
Front
CYOD
Back
Choose Your Own Device
Front
DNS
Back
Domain Name System
Front
TGT
Back
Ticket Granting Ticket
Front
API
Back
Application Programming Interface
Front
COOP
Back
Continuity of Operation Planning
Front
DEP
Back
Data Execution Prevention
Front
DRP
Back
Disaster Recovery Plan
Front
ESN
Back
Electronic Serial Number
Front
IMAP
Back
Internet Message Access Protocol
Front
PCAP
Back
Packet Capture
Front
PED
Back
Personal Electronic Device
Front
PHI
Back
Personal Health Information
Front
UTM
Back
Unified Threat Management
Front
CSR
Back
Certificate Signing Request
Front
NTFS
Back
New Technology File System
Front
WTLS
Back
Wireless TLS
Front
CIA
Back
Confidentiality, Integrity, Availability
Front
NIDS
Back
Network-based Intrusion Detection System
Front
SD-WAN
Back
Software-defined Wide Area Network
Front
DSL
Back
Digital Subscriber Line
Front
LAN
Back
Local Area Network
Front
OSINT
Back
Open-source Intelligence
Front
PAT
Back
Port Address Translation
Front
CERT
Back
Computer Emergency Response Team
Front
PCI
Back
DSS Payment Card Industry Data Security Standard
Front
MPLS
Back
Multi-protocol Label Switching
Front
ISSO
Back
Information Systems Security Officer
Front
SDK
Back
Software Development Kit
Front
SNMP
Back
Simple Network Management Protocol
Front
EFS
Back
Encrypted File System
Front
TKIP
Back
Temporal Key Integrity Protocol
Front
IPS
Back
Intrusion Prevention System
1/321