👻🕸️ Cybersecurity Awareness Month Sale - 50% off select memberships! 🕸️👻

20 hours, 42 minutes remaining!

CompTIA CySA+ CS0-003 All Acronyms Flashcards

FrontBack
BCBusiness Continuity
BIABusiness Impact Analysis
SaaSSoftware as a Service
CSIRTCybersecurity Incident Response Team
CERTComputer Emergency Response Team
CI/CDContinuous Integration and Continuous Delivery
OWASPOpen Web Application Security Project
PAMPrivileged Access Management
BGPBorder Gateway Protocol
CSRFCross-site Request Forgery
CACertificate Authority
DLPData Loss Prevention
RESTRepresentational State Transfer
SASESecure Access Secure Edge
ISOInternational Organization for Standardization
PIIPersonally Identifiable Information
SNMPSimple Network Management Protocol
ITILInformation Technology Infrastructure Library
PHPHypertext Preprocessor
CVSSCommon Vulnerability Scoring System
SDLCSoftware Development Life Cycle
LOILetter of Intent
WANWide Area Network
MOUMemorandum of Understanding
MSFMetasploit Framework
NTPNetwork Time Protocol
IDSIntrusion Detection System
OSSTMMOpen Source Security Testing Methodology Manual
ITInformation Technology
RFIRemote File Inclusion
TRACETrade Reporting and Compliance Engine
OSOperating System
MTTRMean Time to Repair
SDNSoftware-defined Networking
SOCSecurity Operations Center
TTPTactics, Techniques, and Procedures
STIXStructured Threat Information Expression
PCI DSSPayment Card Industry Data Security Standard
UEBAUser and Entity Behavior Analytics
LFILocal File Inclusion
SMTPSimple Mail Transfer Protocol
IPSIntrusion Prevention System
OpenVASOpen Vulnerability Assessment Scanner
SMBServer Message Block
TLSTransport Layer Security
VPNVirtual Private Network
AVAntivirus
CHDCardholder Data
CISCenter for Internet Security
BCPBusiness Continuity Plan
URIUniform Resource Identifier
XMLExtensible Markup Language
NIDSNetwork-based Intrusion Detection System
PIDProcess Identifier
VLANVirtual LAN
JSONJavaScript Object Notation
LANLocal Area Network
DNSDomain Name Service
ZTNAZero Trust Network Access
SLAService-level Agreement
MTTDMean Time to Detect
POCProof of Concept
CASBCloud Access Security Broker
SIEMSecurity Information and Event Management
EDREndpoint Detection and Response
KPIKey Performance Indicator
SAMLSecurity Assertion Markup Language
SCADASupervisory Control and Data Acquisition
GDBGNU Debugger
HTTPHypertext Transfer Protocol
SPFSender Policy Framework
ZAPZed Attack Proxy
IPInternet Protocol
VMVirtual Machine
FTPFile Transfer Protocol
NACNetwork Access Control
URLUniform Resource Locator
TCPTransmission Control Protocol
DDoSDistributed Denial of Service
SSOSingle Sign-on
CDNContent Delivery Network
MSPManaged Service Provider
SOARSecurity Orchestration, Automation, and Response
APIApplication Programming Interface
ARPAddress Resolution Protocol
HIPSHost-based Intrusion Prevention System
PKIPublic Key Infrastructure
SLOService-level Objective
FIMFile Integrity Monitoring
XDRExtended Detection Response
COBITControl Objectives for Information and Related Technologies
NDANon-disclosure Agreement
XXEXML External Entity
DRDisaster Recovery
WAFWeb Application Firewall
HIDSHost-based Intrusion Detection System
IoCIndicators of Compromise
DKIMDomain Keys Identified Mail
SFTPSecure File Transfer Protocol
SSLSecure Sockets Layer
ACLAccess Control List
PLCProgrammable Logic Controller
GPOGroup Policy Objects
SSRFServer-side Request Forgery
APTAdvanced Persistent Threat
RCERemote Code Execution
SQLStructured Query Languge
IRIncident Response
OTOperational Technology
IaaSInfrastructure as a Service
MFAMultifactor Authentication
HTTPSHypertext Transfer Protocol Secure
RXSSReflected Cross-site Scripting
SWGSecure Web Gateway
TFTPTrivial File Transfer Protocol
LDAPSLightweight Directory Access Protocol
DoSDenial of Service
USBUniversal Serial Bus
C2Command and Control
MACMedia Access Control
NGFWNext-generation Firewall
RDPRemote Desktop Protocol
MSSPManaged Security Service Provider
CVECommon Vulnerabilities and Exposures
ICMPInternet Control Message Protocol
ICSIndustrial Control Systems
XSSCross-site Scripting
DMARCDomain-based Message Authentication, Reporting, and Conformance

Share on...
Follow us on...