CompTIA Security+ SY0-701 All Acronyms Flashcards

FrontBack
DLPData Loss Prevention
IPSIntrusion Prevention System
ISPInternet Service Provider
VBAVisual Basic
PKCSPublic Key Cryptography Standards
NTLMNew Technology LAN Manager
P12PKCS #12
SCADASupervisory Control and Data Acquisition
SFTPSecured File Transfer Protocol
IRCInternet Relay Chat
DPOData Privacy Officer
OSOperating System
TGTTicket Granting Ticket
XSRFCross-site Request Forgery
HOTPHMAC-based One-time Password
PSKPre-shared Key
NISTNational Institute of Standards & Technology
PBXPrivate Branch Exchange
SOARSecurity Orchestration, Automation, Response
IaCInfrastructure as Code
SHASecure Hashing Algorithm
TACACS+Terminal Access Controller Access Control System
RARegistration Authority
SPIMSpam over Internet Messaging
SSOSingle Sign-on
XMLExtensible Markup Language
VMVirtual Machine
CSUChannel Service Unit
WIPSWireless Intrusion Prevention System
DNATDestination Network Address Translation
IPSecInternet Protocol Security
CARCorrective Action Report
IKEInternet Key Exchange
PHIPersonal Health Information
COPECorporate Owned, Personally Enabled
GPGGnu Privacy Guard
MLMachine Learning
BIABusiness Impact Analysis
RPORecovery Point Objective
TOUTime-of-use
VTCVideo Teleconferencing
BYODBring Your Own Device
PATPort Address Translation
RATRemote Access Trojan
IdPIdentity Provider
PEDPersonal Electronic Device
NIDSNetwork-based Intrusion Detection System
NTPNetwork Time Protocol
PDUPower Distribution Unit
POTSPlain Old Telephone Service
AES-256Advanced Encryption Standards 256-bit
OSINTOpen-source Intelligence
RC4Rivest Cipher version 4
L2TPLayer 2 Tunneling Protocol
SWGSecure Web Gateway
URIUniform Resource Identifier
IaaSInfrastructure as a Service
PEMPrivacy Enhanced Mail
RFIDRadio Frequency Identifier
SANSubject Alternative Name
WPSWi-Fi Protected Setup
AIArtificial Intelligence
GREGeneric Routing Encapsulation
RSARivest, Shamir, & Adleman
ECBElectronic Code Book
HDDHard Disk Drive
MSSPManaged Security Service Provider
SAMLSecurity Assertions Markup Language
AROAnnualized Rate of Occurrence
MTTFMean Time to Failure
SMSShort Message Service
MDFMain Distribution Frame
OCSPOnline Certificate Status Protocol
P2PPeer to Peer
SPFSender Policy Framework
SRTPSecure Real-Time Protocol
GDPRGeneral Data Protection Regulation
RDPRemote Desktop Protocol
TPMTrusted Platform Module
MDMMobile Device Management
PCAPPacket Capture
TTPTactics, Techniques, and Procedures
BPABusiness Partners Agreement
IoTInternet of Things
IDFIntermediate Distribution Frame
IEEEInstitute of Electrical and Electronics Engineers
MTUMaximum Transmission Unit
OTOperational Technology
S/MIMESecure/Multipurpose Internet Mail Extensions
TCP/IPTransmission Control Protocol/Internet Protocol
BPDUBridge Protocol Data Unit
CIOChief Information Officer
GPUGraphics Processing Unit
NATNetwork Address Translation
PAMPluggable Authentication Modules
EFSEncrypted File System
IoCIndicators of Compromise
NGFWNext-generation Firewall
SMTPSimple Mail Transfer Protocol
SoCSystem on Chip
SQLStructured Query Language
VoIPVoice over IP
PCIDSS Payment Card Industry Data Security Standard
RTBHRemotely Triggered Black Hole
APAccess Point
CIRTComputer Incident Response Team
CSRFCross-site Request Forgery
CVECommon Vulnerability Enumeration
DBADatabase Administrator
HTTPSHypertext Transfer Protocol Secure
BCPBusiness Continuity Planning
SQLiSQL Injection
WIDSWireless Intrusion Detection System
XSSCross-site Scripting
BASHBourne Again Shell
CSPCloud Service Provider
CIAConfidentiality, Integrity, Availability
CFBCipher Feedback
CMSContent Management System
HAHigh Availability
IVInitialization Vector
ECCElliptic Curve Cryptography
ISOInternational Standards Organization
LANLocal Area Network
NTFSNew Technology File System
SDNSoftware-defined Networking
SLAService-level Agreement
COOPContinuity of Operation Planning
CYODChoose Your Own Device
LEAPLightweight Extensible Authentication Protocol
NFCNear Field Communication
CCTVClosed-circuit Television
OAUTHOpen Authorization
PAPPassword Authentication Protocol
ACLAccess Control List
DLLDynamic Link Library
DMARCDomain Message Authentication Reporting and Conformance
IDEAInternational Data Encryption Algorithm
OVALOpen Vulnerability Assessment Language
SOAPSimple Object Access Protocol
TKIPTemporal Key Integrity Protocol
VPNVirtual Private Network
AAAAuthentication, Authorization, and Accounting
AISAutomated Indicator Sharing
SHTTPSecure Hypertext Transfer Protocol
XORExclusive Or
CRCCyclical Redundancy Check
MFAMultifactor Authentication
PKIPublic Key Infrastructure
CACertificate Authority
CPContingency Planning
SDKSoftware Development Kit
HSMHardware Security Module
OSPFOpen Shortest Path First
RAIDRedundant Array of Inexpensive Disks
APIApplication Programming Interface
DEPData Execution Prevention
FIMFile Integrity Management
MMSMultimedia Message Service
MTTRMean Time to Recover
PFSPerfect Forward Secrecy
SSLSecure Sockets Layer
USB OTGUSB On the Go
UTPUnshielded Twisted Pair
VDEVirtual Desktop Environment
RTOSReal-time Operating System
ATT&CKAdversarial Tactics, Techniques, and Common Knowledge
FTPFile Transfer Protocol
HTMLHypertext Markup Language
IMAPInternet Message Access Protocol
MANMetropolitan Area Network
PIVPersonal Identity Verification
RBACRule-based Access Control
SCAPSecurity Content Automation Protocol
UPSUninterruptable Power Supply
EAPExtensible Authentication Protocol
MACMessage Authentication Code
PaaSPlatform as a Service
PPPPoint-to-Point Protocol
FDEFull Disk Encryption
HIDSHost-based Intrusion Detection System
HIPSHost-based Intrusion Prevention System
MSAMaster Service Agreement
OIDObject Identifier
SE LinuxSecurity-enhanced Linux
FRRFalse Rejection Rate
UAVUnmanned Aerial Vehicle
CSOChief Security Officer
IMInstant Messaging
LDAPLightweight Directory Access Protocol
SIMSubscriber Identity Module
AHAuthentication Header
EDREndpoint Detection and Response
AUPAcceptable Use Policy
HVACHeating, Ventilation Air Conditioning
MD5Message Digest 5
SLESingle Loss Expectancy
SNMPSimple Network Management Protocol
CSRCertificate Signing Request
MTBFMean Time Between Failures
ALEAnnualized Loss Expectancy
MFPMultifunction Printer
AuthenticationProtocol
SEDSelf-encrypting Drives
ECDHEElliptic Curve Diffie-Hellman Ephemeral
ICSIndustrial Control Systems
RTPReal-time Transport Protocol
TOCTime-of-check
NDANon-disclosure Agreement
OTAOver the Air
SSHSecure Shell
UATUser Acceptance Testing
BIOSBasic Input/Output System
CBCCipher Block Chaining
GCMGalois Counter Mode
POPPost Office Protocol
WTLSWireless TLS
MaaSMonitoring as a Service
URLUniversal Resource Locator
FACLFile System Access Control List
IRIncident Response
KEKKey Encryption Key
PACProxy Auto Configuration
PGPPretty Good Privacy
VLSMVariable Length Subnet Masking
VPCVirtual Private Cloud
CHAPChallenge Handshake Authentication Protocol
ARPAddress Resolution Protocol
ESNElectronic Serial Number
IPInternet Protocol
MOUMemorandum of Understanding
RIPEMDRACE Integrity Primitives Evaluation Message Digest
PBKDF2Password-based Key Derivation Function 2
UTMUnified Threat Management
CTMCounter Mode
PUPPotentially Unwanted Program
ROIReturn on Investment
TSIGTransaction Signature
ESPEncapsulated Security Payload
KDCKey Distribution Center
SAESimultaneous Authentication of Equals
DACDiscretionary Access Control
DSADigital Signature Algorithm
DSLDigital Subscriber Line
FTPSFile Transfer Protocol Secure
NACNetwork Access Control
RACEResearch and Development in Advanced Communications Technologies in Europe
RTORecovery Time Objective
CVSSCommon Vulnerability Scoring System
MS-CHAPMicrosoft Challenge-Handshake Authentication Protocol
DHEDiffie-Hellman Ephemeral
DKIMDomainKeys Identified Mail
MPLSMulti-protocol Label Switching
AVAntivirus
CCMPCounter Mode/CBC-MAC Protocol
NIPSNetwork-based Intrusion Prevention System
SDLMSoftware Development Lifecycle Methodology
PPTPPoint-to-Point Tunneling Protocol
APTAdvanced Persistent Threat
CAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart
MSPManaged Service Provider
RASRemote Access Server
SOCSecurity Operations Center
WEPWired Equivalent Privacy
CASBCloud Access Security Broker
CTOChief Technology Officer
DoSDenial of Service
TAXIITrusted Automated eXchange of Indicator Information
AESAdvanced Encryption Standard
ASLRAddress Space Layout Randomization
SOWStatement of Work
MOAMemorandum of Agreement
RADRapid Application Development
SSDSolid State Drive
IAMIdentity and Access Management
SASESecure Access Service Edge
UDPUser Datagram Protocol
FPGAField Programmable Gate Array
VLANVirtual Local Area Network
WAFWeb Application Firewall
DDoSDistributed Denial of Service
MFDMultifunction Device
SMTPSSimple Mail Transfer Protocol Secure
SEHStructured Exception Handler
SIEMSecurity Information and Event Management
PEAPProtected Extensible Authentication Protocol
SCEPSimple Certificate Enrollment Protocol
ISSOInformation Systems Security Officer
SaaSSoftware as a Service
WAPWireless Access Point
DESDigital Encryption Standard
DNSDomain Name System
ECDSAElliptic Curve Digital Signature Algorithm
SD-WANSoftware-defined Wide Area Network
SDLCSoftware Development Lifecycle
STIXStructured Threat Information eXchange
BGPBorder Gateway Protocol
GPSGlobal Positioning System
IRPIncident Response Plan
PIIPersonally Identifiable Information
DHCPDynamic Host Configuration Protocol
DRPDisaster Recovery Plan
HTTPHypertext Transfer Protocol
ICMPInternet Control Message Protocol
HMACHashed Message Authentication Code
IDSIntrusion Detection System
MBRMaster Boot Record
PTZPan-tilt-zoom
TOTPTime-based One-time Password
UEMUnified Endpoint Management
VDIVirtual Desktop Infrastructure
ERPEnterprise Resource Planning
RADIUSRemote Authentication Dial-in User Service
CRLCertificate Revocation List
GPOGroup Policy Object
WOWork Order
XDRExtended Detection and Response
WPAWi-Fi Protected Access
CERTComputer Emergency Response Team
TLSTransport Layer Security
UEFIUnified Extensible Firmware Interface