CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

CompTIA CySA+ CS0-003 All Acronyms Flashcards

AcronymDefinition
ACLAccess Control List
APIApplication Programming Interface
APTAdvanced Persistent Threat
ARPAddress Resolution Protocol
AVAntivirus
BCBusiness Continuity
BCPBusiness Continuity Plan
BGPBorder Gateway Protocol
BIABusiness Impact Analysis
C2Command and Control
CACertificate Authority
CASBCloud Access Security Broker
CDNContent Delivery Network
CERTComputer Emergency Response Team
CHDCardholder Data
CI/CDContinuous Integration and Continuous Delivery
CISCenter for Internet Security
COBITControl Objectives for Information and Related Technologies
CSIRTCybersecurity Incident Response Team
CSRFCross-site Request Forgery
CVECommon Vulnerabilities and Exposures
CVSSCommon Vulnerability Scoring System
DDoSDistributed Denial of Service
DoSDenial of Service
DKIMDomain Keys Identified Mail
DLPData Loss Prevention
DMARCDomain-based Message Authentication, Reporting, and Conformance
DNSDomain Name Service
DRDisaster Recovery
EDREndpoint Detection and Response
FIMFile Integrity Monitoring
FTPFile Transfer Protocol
GDBGNU Debugger
GPOGroup Policy Objects
HIDSHost-based Intrusion Detection System
HIPSHost-based Intrusion Prevention System
HTTPHypertext Transfer Protocol
HTTPSHypertext Transfer Protocol Secure
IaaSInfrastructure as a Service
ICMPInternet Control Message Protocol
ICSIndustrial Control Systems
IDSIntrusion Detection System
IoCIndicators of Compromise
IPInternet Protocol
IPSIntrusion Prevention System
IRIncident Response
ISOInternational Organization for Standardization
ITInformation Technology
ITILInformation Technology Infrastructure Library
JSONJavaScript Object Notation
KPIKey Performance Indicator
LANLocal Area Network
LDAPSLightweight Directory Access Protocol
LFILocal File Inclusion
LOILetter of Intent
MACMedia Access Control
MFAMultifactor Authentication
MOUMemorandum of Understanding
MSFMetasploit Framework
MSPManaged Service Provider
MSSPManaged Security Service Provider
MTTDMean Time to Detect
MTTRMean Time to Repair
NACNetwork Access Control
NDANon-disclosure Agreement
NGFWNext-generation Firewall
NIDSNetwork-based Intrusion Detection System
NTPNetwork Time Protocol
OpenVASOpen Vulnerability Assessment Scanner
OSOperating System
OSSTMMOpen Source Security Testing Methodology Manual
OTOperational Technology
OWASPOpen Web Application Security Project
PAMPrivileged Access Management
PCI DSSPayment Card Industry Data Security Standard
PHPHypertext Preprocessor
PIDProcess Identifier
PIIPersonally Identifiable Information
PKIPublic Key Infrastructure
PLCProgrammable Logic Controller
POCProof of Concept
RCERemote Code Execution
RDPRemote Desktop Protocol
RESTRepresentational State Transfer
RFIRemote File Inclusion
RXSSReflected Cross-site Scripting
SaaSSoftware as a Service
SAMLSecurity Assertion Markup Language
SASESecure Access Secure Edge
SCADASupervisory Control and Data Acquisition
SDLCSoftware Development Life Cycle
SDNSoftware-defined Networking
SFTPSecure File Transfer Protocol
SIEMSecurity Information and Event Management
SLAService-level Agreement
SLOService-level Objective
SOARSecurity Orchestration, Automation, and Response
SMBServer Message Block
SMTPSimple Mail Transfer Protocol
SNMPSimple Network Management Protocol
SOCSecurity Operations Center
SPFSender Policy Framework
SQLStructured Query Languge
SSLSecure Sockets Layer
SSOSingle Sign-on
SSRFServer-side Request Forgery
STIXStructured Threat Information Expression
SWGSecure Web Gateway
TCPTransmission Control Protocol
TFTPTrivial File Transfer Protocol
TLSTransport Layer Security
TRACETrade Reporting and Compliance Engine
TTPTactics, Techniques, and Procedures
UEBAUser and Entity Behavior Analytics
URIUniform Resource Identifier
URLUniform Resource Locator
USBUniversal Serial Bus
VLANVirtual LAN
VMVirtual Machine
VPNVirtual Private Network
WAFWeb Application Firewall
WANWide Area Network
XDRExtended Detection Response
XMLExtensible Markup Language
XSSCross-site Scripting
XXEXML External Entity
ZAPZed Attack Proxy
ZTNAZero Trust Network Access
Front
DKIM
Click the card to flip
Back
Domain Keys Identified Mail
Front
MSF
Back
Metasploit Framework
Front
SSO
Back
Single Sign-on
Front
OWASP
Back
Open Web Application Security Project
Front
CDN
Back
Content Delivery Network
Front
XML
Back
Extensible Markup Language
Front
BC
Back
Business Continuity
Front
SASE
Back
Secure Access Secure Edge
Front
IR
Back
Incident Response
Front
MSSP
Back
Managed Security Service Provider
Front
USB
Back
Universal Serial Bus
Front
XDR
Back
Extended Detection Response
Front
ARP
Back
Address Resolution Protocol
Front
DLP
Back
Data Loss Prevention
Front
HTTP
Back
Hypertext Transfer Protocol
Front
SIEM
Back
Security Information and Event Management
Front
PKI
Back
Public Key Infrastructure
Front
VPN
Back
Virtual Private Network
Front
HIPS
Back
Host-based Intrusion Prevention System
Front
IPS
Back
Intrusion Prevention System
Front
REST
Back
Representational State Transfer
Front
CERT
Back
Computer Emergency Response Team
Front
JSON
Back
JavaScript Object Notation
Front
SMTP
Back
Simple Mail Transfer Protocol
Front
MOU
Back
Memorandum of Understanding
Front
URI
Back
Uniform Resource Identifier
Front
FIM
Back
File Integrity Monitoring
Front
TTP
Back
Tactics, Techniques, and Procedures
Front
ISO
Back
International Organization for Standardization
Front
NIDS
Back
Network-based Intrusion Detection System
Front
DDoS
Back
Distributed Denial of Service
Front
SDLC
Back
Software Development Life Cycle
Front
ZTNA
Back
Zero Trust Network Access
Front
BIA
Back
Business Impact Analysis
Front
SAML
Back
Security Assertion Markup Language
Front
UEBA
Back
User and Entity Behavior Analytics
Front
DMARC
Back
Domain-based Message Authentication, Reporting, and Conformance
Front
IP
Back
Internet Protocol
Front
PLC
Back
Programmable Logic Controller
Front
RFI
Back
Remote File Inclusion
Front
SLA
Back
Service-level Agreement
Front
CI/CD
Back
Continuous Integration and Continuous Delivery
Front
SSRF
Back
Server-side Request Forgery
Front
ICS
Back
Industrial Control Systems
Front
LDAPS
Back
Lightweight Directory Access Protocol
Front
TLS
Back
Transport Layer Security
Front
WAN
Back
Wide Area Network
Front
CVSS
Back
Common Vulnerability Scoring System
Front
ITIL
Back
Information Technology Infrastructure Library
Front
SNMP
Back
Simple Network Management Protocol
Front
TCP
Back
Transmission Control Protocol
Front
XSS
Back
Cross-site Scripting
Front
APT
Back
Advanced Persistent Threat
Front
LOI
Back
Letter of Intent
Front
DR
Back
Disaster Recovery
Front
RDP
Back
Remote Desktop Protocol
Front
BGP
Back
Border Gateway Protocol
Front
ZAP
Back
Zed Attack Proxy
Front
IoC
Back
Indicators of Compromise
Front
PCI DSS
Back
Payment Card Industry Data Security Standard
Front
SDN
Back
Software-defined Networking
Front
SWG
Back
Secure Web Gateway
Front
SLO
Back
Service-level Objective
Front
SOAR
Back
Security Orchestration, Automation, and Response
Front
XXE
Back
XML External Entity
Front
HTTPS
Back
Hypertext Transfer Protocol Secure
Front
SOC
Back
Security Operations Center
Front
SPF
Back
Sender Policy Framework
Front
NAC
Back
Network Access Control
Front
RXSS
Back
Reflected Cross-site Scripting
Front
OpenVAS
Back
Open Vulnerability Assessment Scanner
Front
SMB
Back
Server Message Block
Front
COBIT
Back
Control Objectives for Information and Related Technologies
Front
CHD
Back
Cardholder Data
Front
IaaS
Back
Infrastructure as a Service
Front
PID
Back
Process Identifier
Front
HIDS
Back
Host-based Intrusion Detection System
Front
BCP
Back
Business Continuity Plan
Front
AV
Back
Antivirus
Front
URL
Back
Uniform Resource Locator
Front
STIX
Back
Structured Threat Information Expression
Front
VLAN
Back
Virtual LAN
Front
IDS
Back
Intrusion Detection System
Front
MAC
Back
Media Access Control
Front
NGFW
Back
Next-generation Firewall
Front
PHP
Back
Hypertext Preprocessor
Front
API
Back
Application Programming Interface
Front
SaaS
Back
Software as a Service
Front
LAN
Back
Local Area Network
Front
SCADA
Back
Supervisory Control and Data Acquisition
Front
VM
Back
Virtual Machine
Front
RCE
Back
Remote Code Execution
Front
TRACE
Back
Trade Reporting and Compliance Engine
Front
CSIRT
Back
Cybersecurity Incident Response Team
Front
FTP
Back
File Transfer Protocol
Front
MFA
Back
Multifactor Authentication
Front
MSP
Back
Managed Service Provider
Front
OS
Back
Operating System
Front
LFI
Back
Local File Inclusion
Front
KPI
Back
Key Performance Indicator
Front
SQL
Back
Structured Query Languge
Front
SSL
Back
Secure Sockets Layer
Front
PAM
Back
Privileged Access Management
Front
EDR
Back
Endpoint Detection and Response
Front
IT
Back
Information Technology
Front
NTP
Back
Network Time Protocol
Front
MTTD
Back
Mean Time to Detect
Front
SFTP
Back
Secure File Transfer Protocol
Front
CA
Back
Certificate Authority
Front
PII
Back
Personally Identifiable Information
Front
MTTR
Back
Mean Time to Repair
Front
ACL
Back
Access Control List
Front
POC
Back
Proof of Concept
Front
WAF
Back
Web Application Firewall
Front
CASB
Back
Cloud Access Security Broker
Front
OSSTMM
Back
Open Source Security Testing Methodology Manual
Front
CVE
Back
Common Vulnerabilities and Exposures
Front
GDB
Back
GNU Debugger
Front
CSRF
Back
Cross-site Request Forgery
Front
ICMP
Back
Internet Control Message Protocol
Front
C2
Back
Command and Control
Front
DoS
Back
Denial of Service
Front
NDA
Back
Non-disclosure Agreement
Front
CIS
Back
Center for Internet Security
Front
OT
Back
Operational Technology
Front
TFTP
Back
Trivial File Transfer Protocol
Front
DNS
Back
Domain Name Service
Front
GPO
Back
Group Policy Objects
1/128