CompTIA CySA+ CS0-003 All Acronyms Flashcards
Acronym | Definition |
---|---|
ACL | Access Control List |
API | Application Programming Interface |
APT | Advanced Persistent Threat |
ARP | Address Resolution Protocol |
AV | Antivirus |
BC | Business Continuity |
BCP | Business Continuity Plan |
BGP | Border Gateway Protocol |
BIA | Business Impact Analysis |
C2 | Command and Control |
CA | Certificate Authority |
CASB | Cloud Access Security Broker |
CDN | Content Delivery Network |
CERT | Computer Emergency Response Team |
CHD | Cardholder Data |
CI/CD | Continuous Integration and Continuous Delivery |
CIS | Center for Internet Security |
COBIT | Control Objectives for Information and Related Technologies |
CSIRT | Cybersecurity Incident Response Team |
CSRF | Cross-site Request Forgery |
CVE | Common Vulnerabilities and Exposures |
CVSS | Common Vulnerability Scoring System |
DDoS | Distributed Denial of Service |
DoS | Denial of Service |
DKIM | Domain Keys Identified Mail |
DLP | Data Loss Prevention |
DMARC | Domain-based Message Authentication, Reporting, and Conformance |
DNS | Domain Name Service |
DR | Disaster Recovery |
EDR | Endpoint Detection and Response |
FIM | File Integrity Monitoring |
FTP | File Transfer Protocol |
GDB | GNU Debugger |
GPO | Group Policy Objects |
HIDS | Host-based Intrusion Detection System |
HIPS | Host-based Intrusion Prevention System |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol Secure |
IaaS | Infrastructure as a Service |
ICMP | Internet Control Message Protocol |
ICS | Industrial Control Systems |
IDS | Intrusion Detection System |
IoC | Indicators of Compromise |
IP | Internet Protocol |
IPS | Intrusion Prevention System |
IR | Incident Response |
ISO | International Organization for Standardization |
IT | Information Technology |
ITIL | Information Technology Infrastructure Library |
JSON | JavaScript Object Notation |
KPI | Key Performance Indicator |
LAN | Local Area Network |
LDAPS | Lightweight Directory Access Protocol |
LFI | Local File Inclusion |
LOI | Letter of Intent |
MAC | Media Access Control |
MFA | Multifactor Authentication |
MOU | Memorandum of Understanding |
MSF | Metasploit Framework |
MSP | Managed Service Provider |
MSSP | Managed Security Service Provider |
MTTD | Mean Time to Detect |
MTTR | Mean Time to Repair |
NAC | Network Access Control |
NDA | Non-disclosure Agreement |
NGFW | Next-generation Firewall |
NIDS | Network-based Intrusion Detection System |
NTP | Network Time Protocol |
OpenVAS | Open Vulnerability Assessment Scanner |
OS | Operating System |
OSSTMM | Open Source Security Testing Methodology Manual |
OT | Operational Technology |
OWASP | Open Web Application Security Project |
PAM | Privileged Access Management |
PCI DSS | Payment Card Industry Data Security Standard |
PHP | Hypertext Preprocessor |
PID | Process Identifier |
PII | Personally Identifiable Information |
PKI | Public Key Infrastructure |
PLC | Programmable Logic Controller |
POC | Proof of Concept |
RCE | Remote Code Execution |
RDP | Remote Desktop Protocol |
REST | Representational State Transfer |
RFI | Remote File Inclusion |
RXSS | Reflected Cross-site Scripting |
SaaS | Software as a Service |
SAML | Security Assertion Markup Language |
SASE | Secure Access Secure Edge |
SCADA | Supervisory Control and Data Acquisition |
SDLC | Software Development Life Cycle |
SDN | Software-defined Networking |
SFTP | Secure File Transfer Protocol |
SIEM | Security Information and Event Management |
SLA | Service-level Agreement |
SLO | Service-level Objective |
SOAR | Security Orchestration, Automation, and Response |
SMB | Server Message Block |
SMTP | Simple Mail Transfer Protocol |
SNMP | Simple Network Management Protocol |
SOC | Security Operations Center |
SPF | Sender Policy Framework |
SQL | Structured Query Languge |
SSL | Secure Sockets Layer |
SSO | Single Sign-on |
SSRF | Server-side Request Forgery |
STIX | Structured Threat Information Expression |
SWG | Secure Web Gateway |
TCP | Transmission Control Protocol |
TFTP | Trivial File Transfer Protocol |
TLS | Transport Layer Security |
TRACE | Trade Reporting and Compliance Engine |
TTP | Tactics, Techniques, and Procedures |
UEBA | User and Entity Behavior Analytics |
URI | Uniform Resource Identifier |
URL | Uniform Resource Locator |
USB | Universal Serial Bus |
VLAN | Virtual LAN |
VM | Virtual Machine |
VPN | Virtual Private Network |
WAF | Web Application Firewall |
WAN | Wide Area Network |
XDR | Extended Detection Response |
XML | Extensible Markup Language |
XSS | Cross-site Scripting |
XXE | XML External Entity |
ZAP | Zed Attack Proxy |
ZTNA | Zero Trust Network Access |
Front
ICS
Click the card to flip
Back
Industrial Control Systems
Front
MOU
Back
Memorandum of Understanding
Front
SMB
Back
Server Message Block
Front
ITIL
Back
Information Technology Infrastructure Library
Front
SLO
Back
Service-level Objective
Front
BIA
Back
Business Impact Analysis
Front
CVE
Back
Common Vulnerabilities and Exposures
Front
REST
Back
Representational State Transfer
Front
CHD
Back
Cardholder Data
Front
OSSTMM
Back
Open Source Security Testing Methodology Manual
Front
SMTP
Back
Simple Mail Transfer Protocol
Front
XDR
Back
Extended Detection Response
Front
ACL
Back
Access Control List
Front
HTTP
Back
Hypertext Transfer Protocol
Front
MTTD
Back
Mean Time to Detect
Front
HIPS
Back
Host-based Intrusion Prevention System
Front
SAML
Back
Security Assertion Markup Language
Front
STIX
Back
Structured Threat Information Expression
Front
LFI
Back
Local File Inclusion
Front
SASE
Back
Secure Access Secure Edge
Front
IPS
Back
Intrusion Prevention System
Front
DMARC
Back
Domain-based Message Authentication, Reporting, and Conformance
Front
LAN
Back
Local Area Network
Front
SPF
Back
Sender Policy Framework
Front
XML
Back
Extensible Markup Language
Front
DKIM
Back
Domain Keys Identified Mail
Front
OS
Back
Operating System
Front
TTP
Back
Tactics, Techniques, and Procedures
Front
VM
Back
Virtual Machine
Front
WAN
Back
Wide Area Network
Front
ZAP
Back
Zed Attack Proxy
Front
EDR
Back
Endpoint Detection and Response
Front
PII
Back
Personally Identifiable Information
Front
DNS
Back
Domain Name Service
Front
OT
Back
Operational Technology
Front
OpenVAS
Back
Open Vulnerability Assessment Scanner
Front
BC
Back
Business Continuity
Front
C2
Back
Command and Control
Front
PAM
Back
Privileged Access Management
Front
URL
Back
Uniform Resource Locator
Front
SCADA
Back
Supervisory Control and Data Acquisition
Front
CSIRT
Back
Cybersecurity Incident Response Team
Front
KPI
Back
Key Performance Indicator
Front
PID
Back
Process Identifier
Front
GDB
Back
GNU Debugger
Front
SFTP
Back
Secure File Transfer Protocol
Front
VLAN
Back
Virtual LAN
Front
BGP
Back
Border Gateway Protocol
Front
IR
Back
Incident Response
Front
RFI
Back
Remote File Inclusion
Front
COBIT
Back
Control Objectives for Information and Related Technologies
Front
URI
Back
Uniform Resource Identifier
Front
OWASP
Back
Open Web Application Security Project
Front
FIM
Back
File Integrity Monitoring
Front
NDA
Back
Non-disclosure Agreement
Front
ARP
Back
Address Resolution Protocol
Front
ZTNA
Back
Zero Trust Network Access
Front
IP
Back
Internet Protocol
Front
IoC
Back
Indicators of Compromise
Front
UEBA
Back
User and Entity Behavior Analytics
Front
IT
Back
Information Technology
Front
NAC
Back
Network Access Control
Front
TCP
Back
Transmission Control Protocol
Front
JSON
Back
JavaScript Object Notation
Front
RCE
Back
Remote Code Execution
Front
TRACE
Back
Trade Reporting and Compliance Engine
Front
DDoS
Back
Distributed Denial of Service
Front
HIDS
Back
Host-based Intrusion Detection System
Front
MTTR
Back
Mean Time to Repair
Front
MSP
Back
Managed Service Provider
Front
DLP
Back
Data Loss Prevention
Front
RXSS
Back
Reflected Cross-site Scripting
Front
DR
Back
Disaster Recovery
Front
SLA
Back
Service-level Agreement
Front
BCP
Back
Business Continuity Plan
Front
FTP
Back
File Transfer Protocol
Front
XSS
Back
Cross-site Scripting
Front
IDS
Back
Intrusion Detection System
Front
POC
Back
Proof of Concept
Front
SDN
Back
Software-defined Networking
Front
API
Back
Application Programming Interface
Front
CIS
Back
Center for Internet Security
Front
SIEM
Back
Security Information and Event Management
Front
MSF
Back
Metasploit Framework
Front
SOAR
Back
Security Orchestration, Automation, and Response
Front
LDAPS
Back
Lightweight Directory Access Protocol
Front
GPO
Back
Group Policy Objects
Front
LOI
Back
Letter of Intent
Front
MSSP
Back
Managed Security Service Provider
Front
PHP
Back
Hypertext Preprocessor
Front
NTP
Back
Network Time Protocol
Front
ICMP
Back
Internet Control Message Protocol
Front
MAC
Back
Media Access Control
Front
SNMP
Back
Simple Network Management Protocol
Front
SWG
Back
Secure Web Gateway
Front
USB
Back
Universal Serial Bus
Front
HTTPS
Back
Hypertext Transfer Protocol Secure
Front
SaaS
Back
Software as a Service
Front
CASB
Back
Cloud Access Security Broker
Front
NGFW
Back
Next-generation Firewall
Front
SDLC
Back
Software Development Life Cycle
Front
SSO
Back
Single Sign-on
Front
CSRF
Back
Cross-site Request Forgery
Front
PCI DSS
Back
Payment Card Industry Data Security Standard
Front
CI/CD
Back
Continuous Integration and Continuous Delivery
Front
CA
Back
Certificate Authority
Front
APT
Back
Advanced Persistent Threat
Front
MFA
Back
Multifactor Authentication
Front
SSRF
Back
Server-side Request Forgery
Front
NIDS
Back
Network-based Intrusion Detection System
Front
SOC
Back
Security Operations Center
Front
TFTP
Back
Trivial File Transfer Protocol
Front
ISO
Back
International Organization for Standardization
Front
SSL
Back
Secure Sockets Layer
Front
IaaS
Back
Infrastructure as a Service
Front
XXE
Back
XML External Entity
Front
TLS
Back
Transport Layer Security
Front
DoS
Back
Denial of Service
Front
PLC
Back
Programmable Logic Controller
Front
SQL
Back
Structured Query Languge
Front
CDN
Back
Content Delivery Network
Front
CERT
Back
Computer Emergency Response Team
Front
PKI
Back
Public Key Infrastructure
Front
VPN
Back
Virtual Private Network
Front
AV
Back
Antivirus
Front
CVSS
Back
Common Vulnerability Scoring System
Front
RDP
Back
Remote Desktop Protocol
Front
WAF
Back
Web Application Firewall
1/128