CompTIA Security+ SY0-701 All Acronyms Flashcards

FrontBack
IPSecInternet Protocol Security
OIDObject Identifier
SSDSolid State Drive
STIXStructured Threat Information eXchange
VLANVirtual Local Area Network
WAFWeb Application Firewall
MACMessage Authentication Code
DMARCDomain Message Authentication Reporting and Conformance
NDANon-disclosure Agreement
SDNSoftware-defined Networking
IPInternet Protocol
SaaSSoftware as a Service
HMACHashed Message Authentication Code
CMSContent Management System
HIDSHost-based Intrusion Detection System
RDPRemote Desktop Protocol
SCEPSimple Certificate Enrollment Protocol
SOAPSimple Object Access Protocol
TPMTrusted Platform Module
DESDigital Encryption Standard
KEKKey Encryption Key
BPDUBridge Protocol Data Unit
CARCorrective Action Report
DKIMDomainKeys Identified Mail
SEDSelf-encrypting Drives
SHTTPSecure Hypertext Transfer Protocol
SLAService-level Agreement
CSRFCross-site Request Forgery
GCMGalois Counter Mode
IDEAInternational Data Encryption Algorithm
OSINTOpen-source Intelligence
RFIDRadio Frequency Identifier
BGPBorder Gateway Protocol
IoCIndicators of Compromise
ISSOInformation Systems Security Officer
AuthenticationProtocol
PEDPersonal Electronic Device
PIIPersonally Identifiable Information
SQLStructured Query Language
ECBElectronic Code Book
VTCVideo Teleconferencing
IVInitialization Vector
MOUMemorandum of Understanding
PTZPan-tilt-zoom
URLUniversal Resource Locator
VoIPVoice over IP
COPECorporate Owned, Personally Enabled
NFCNear Field Communication
DoSDenial of Service
SLESingle Loss Expectancy
SMTPSSimple Mail Transfer Protocol Secure
TCP/IPTransmission Control Protocol/Internet Protocol
AISAutomated Indicator Sharing
APIApplication Programming Interface
MTUMaximum Transmission Unit
NIDSNetwork-based Intrusion Detection System
PFSPerfect Forward Secrecy
POTSPlain Old Telephone Service
TAXIITrusted Automated eXchange of Indicator Information
RADIUSRemote Authentication Dial-in User Service
UTMUnified Threat Management
P12PKCS #12
PPPPoint-to-Point Protocol
AAAAuthentication, Authorization, and Accounting
DLLDynamic Link Library
MTTRMean Time to Recover
TGTTicket Granting Ticket
APAccess Point
BPABusiness Partners Agreement
CHAPChallenge Handshake Authentication Protocol
LANLocal Area Network
DNATDestination Network Address Translation
IEEEInstitute of Electrical and Electronics Engineers
PBXPrivate Branch Exchange
AUPAcceptable Use Policy
CBCCipher Block Chaining
NISTNational Institute of Standards & Technology
PAMPluggable Authentication Modules
WIPSWireless Intrusion Prevention System
XMLExtensible Markup Language
BCPBusiness Continuity Planning
GPOGroup Policy Object
L2TPLayer 2 Tunneling Protocol
CTMCounter Mode
ECDSAElliptic Curve Digital Signature Algorithm
HSMHardware Security Module
NTPNetwork Time Protocol
XDRExtended Detection and Response
CCTVClosed-circuit Television
CVECommon Vulnerability Enumeration
IDSIntrusion Detection System
RBACRule-based Access Control
UEMUnified Endpoint Management
AVAntivirus
CTOChief Technology Officer
FRRFalse Rejection Rate
GPUGraphics Processing Unit
SDLCSoftware Development Lifecycle
SOWStatement of Work
UPSUninterruptable Power Supply
URIUniform Resource Identifier
FIMFile Integrity Management
IoTInternet of Things
RIPEMDRACE Integrity Primitives Evaluation Message Digest
VBAVisual Basic
WOWork Order
AROAnnualized Rate of Occurrence
CIRTComputer Incident Response Team
HOTPHMAC-based One-time Password
MaaSMonitoring as a Service
OCSPOnline Certificate Status Protocol
OTAOver the Air
WTLSWireless TLS
FDEFull Disk Encryption
SIMSubscriber Identity Module
HTTPSHypertext Transfer Protocol Secure
SSLSecure Sockets Layer
BIOSBasic Input/Output System
DEPData Execution Prevention
DNSDomain Name System
NTFSNew Technology File System
PEMPrivacy Enhanced Mail
CASBCloud Access Security Broker
MSSPManaged Security Service Provider
PDUPower Distribution Unit
AES-256Advanced Encryption Standards 256-bit
APTAdvanced Persistent Threat
UDPUser Datagram Protocol
FTPSFile Transfer Protocol Secure
MOAMemorandum of Agreement
OAUTHOpen Authorization
RTORecovery Time Objective
SASESecure Access Service Edge
SD-WANSoftware-defined Wide Area Network
SSOSingle Sign-on
VMVirtual Machine
XSRFCross-site Request Forgery
IMAPInternet Message Access Protocol
OSPFOpen Shortest Path First
CRCCyclical Redundancy Check
ISOInternational Standards Organization
MDMMobile Device Management
RTPReal-time Transport Protocol
WIDSWireless Intrusion Detection System
SSHSecure Shell
TOTPTime-based One-time Password
DPOData Privacy Officer
DRPDisaster Recovery Plan
CSOChief Security Officer
MFAMultifactor Authentication
PaaSPlatform as a Service
SWGSecure Web Gateway
WPSWi-Fi Protected Setup
XORExclusive Or
PAPPassword Authentication Protocol
AHAuthentication Header
NACNetwork Access Control
SPIMSpam over Internet Messaging
CACertificate Authority
DSLDigital Subscriber Line
FACLFile System Access Control List
HAHigh Availability
IAMIdentity and Access Management
NATNetwork Address Translation
PACProxy Auto Configuration
SMTPSimple Mail Transfer Protocol
HDDHard Disk Drive
IRCInternet Relay Chat
IRPIncident Response Plan
MTTFMean Time to Failure
SCADASupervisory Control and Data Acquisition
VDEVirtual Desktop Environment
ALEAnnualized Loss Expectancy
RSARivest, Shamir, & Adleman
UTPUnshielded Twisted Pair
ACLAccess Control List
IPSIntrusion Prevention System
MFDMultifunction Device
POPPost Office Protocol
PBKDF2Password-based Key Derivation Function 2
PCIDSS Payment Card Industry Data Security Standard
RATRemote Access Trojan
CERTComputer Emergency Response Team
MTBFMean Time Between Failures
IaCInfrastructure as Code
LEAPLightweight Extensible Authentication Protocol
CRLCertificate Revocation List
IMInstant Messaging
SMSShort Message Service
CSRCertificate Signing Request
OTOperational Technology
MMSMultimedia Message Service
OSOperating System
PCAPPacket Capture
SHASecure Hashing Algorithm
UEFIUnified Extensible Firmware Interface
XSSCross-site Scripting
DBADatabase Administrator
CFBCipher Feedback
LDAPLightweight Directory Access Protocol
CVSSCommon Vulnerability Scoring System
FPGAField Programmable Gate Array
UAVUnmanned Aerial Vehicle
EFSEncrypted File System
NTLMNew Technology LAN Manager
SOCSecurity Operations Center
BYODBring Your Own Device
MSPManaged Service Provider
TACACS+Terminal Access Controller Access Control System
CSUChannel Service Unit
IDFIntermediate Distribution Frame
IRIncident Response
NGFWNext-generation Firewall
ROIReturn on Investment
AESAdvanced Encryption Standard
ASLRAddress Space Layout Randomization
BIABusiness Impact Analysis
HTMLHypertext Markup Language
MSAMaster Service Agreement
PHIPersonal Health Information
PIVPersonal Identity Verification
S/MIMESecure/Multipurpose Internet Mail Extensions
RAIDRedundant Array of Inexpensive Disks
SIEMSecurity Information and Event Management
CIOChief Information Officer
ECCElliptic Curve Cryptography
ISPInternet Service Provider
PATPort Address Translation
RASRemote Access Server
DHCPDynamic Host Configuration Protocol
SQLiSQL Injection
ATT&CKAdversarial Tactics, Techniques, and Common Knowledge
CSPCloud Service Provider
MPLSMulti-protocol Label Switching
SANSubject Alternative Name
UATUser Acceptance Testing
DDoSDistributed Denial of Service
IaaSInfrastructure as a Service
ICMPInternet Control Message Protocol
RTOSReal-time Operating System
SEHStructured Exception Handler
GPGGnu Privacy Guard
TSIGTransaction Signature
VLSMVariable Length Subnet Masking
COOPContinuity of Operation Planning
MANMetropolitan Area Network
MBRMaster Boot Record
SPFSender Policy Framework
DSADigital Signature Algorithm
ESNElectronic Serial Number
P2PPeer to Peer
SCAPSecurity Content Automation Protocol
SRTPSecure Real-Time Protocol
TKIPTemporal Key Integrity Protocol
CIAConfidentiality, Integrity, Availability
IKEInternet Key Exchange
PEAPProtected Extensible Authentication Protocol
RARegistration Authority
TLSTransport Layer Security
CYODChoose Your Own Device
GPSGlobal Positioning System
PGPPretty Good Privacy
RC4Rivest Cipher version 4
SE LinuxSecurity-enhanced Linux
USB OTGUSB On the Go
AIArtificial Intelligence
ARPAddress Resolution Protocol
GREGeneric Routing Encapsulation
MDFMain Distribution Frame
TTPTactics, Techniques, and Procedures
VPCVirtual Private Cloud
MS-CHAPMicrosoft Challenge-Handshake Authentication Protocol
RACEResearch and Development in Advanced Communications Technologies in Europe
DACDiscretionary Access Control
DLPData Loss Prevention
PKCSPublic Key Cryptography Standards
SNMPSimple Network Management Protocol
TOUTime-of-use
VPNVirtual Private Network
WPAWi-Fi Protected Access
EAPExtensible Authentication Protocol
OVALOpen Vulnerability Assessment Language
PKIPublic Key Infrastructure
PPTPPoint-to-Point Tunneling Protocol
TOCTime-of-check
ESPEncapsulated Security Payload
GDPRGeneral Data Protection Regulation
PSKPre-shared Key
SOARSecurity Orchestration, Automation, Response
SoCSystem on Chip
HIPSHost-based Intrusion Prevention System
MFPMultifunction Printer
SAMLSecurity Assertions Markup Language
CPContingency Planning
KDCKey Distribution Center
ECDHEElliptic Curve Diffie-Hellman Ephemeral
HVACHeating, Ventilation Air Conditioning
HTTPHypertext Transfer Protocol
RTBHRemotely Triggered Black Hole
WEPWired Equivalent Privacy
MLMachine Learning
IdPIdentity Provider
RPORecovery Point Objective
SDKSoftware Development Kit
SAESimultaneous Authentication of Equals
VDIVirtual Desktop Infrastructure
BASHBourne Again Shell
EDREndpoint Detection and Response
ERPEnterprise Resource Planning
NIPSNetwork-based Intrusion Prevention System
RADRapid Application Development
SDLMSoftware Development Lifecycle Methodology
WAPWireless Access Point
DHEDiffie-Hellman Ephemeral
MD5Message Digest 5
PUPPotentially Unwanted Program
CAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart
CCMPCounter Mode/CBC-MAC Protocol
FTPFile Transfer Protocol
ICSIndustrial Control Systems
SFTPSecured File Transfer Protocol