CompTIA CySA+ CS0-003 All Acronyms Flashcards

OSSTMMOpen Source Security Testing Methodology Manual
HIPSHost-based Intrusion Prevention System
MOUMemorandum of Understanding
RCERemote Code Execution
CDNContent Delivery Network
CVECommon Vulnerabilities and Exposures
IRIncident Response
SOCSecurity Operations Center
FIMFile Integrity Monitoring
GPOGroup Policy Objects
SWGSecure Web Gateway
TRACETrade Reporting and Compliance Engine
USBUniversal Serial Bus
ZTNAZero Trust Network Access
NTPNetwork Time Protocol
NDANon-disclosure Agreement
DDoSDistributed Denial of Service
SDNSoftware-defined Networking
BIABusiness Impact Analysis
EDREndpoint Detection and Response
CACertificate Authority
DRDisaster Recovery
LFILocal File Inclusion
CHDCardholder Data
VPNVirtual Private Network
COBITControl Objectives for Information and Related Technologies
SMTPSimple Mail Transfer Protocol
ICSIndustrial Control Systems
TLSTransport Layer Security
VMVirtual Machine
ICMPInternet Control Message Protocol
PLCProgrammable Logic Controller
SAMLSecurity Assertion Markup Language
IaaSInfrastructure as a Service
SCADASupervisory Control and Data Acquisition
URLUniform Resource Locator
MTTRMean Time to Repair
SaaSSoftware as a Service
MTTDMean Time to Detect
PCI DSSPayment Card Industry Data Security Standard
BCPBusiness Continuity Plan
DKIMDomain Keys Identified Mail
SDLCSoftware Development Life Cycle
RESTRepresentational State Transfer
SNMPSimple Network Management Protocol
UEBAUser and Entity Behavior Analytics
RDPRemote Desktop Protocol
ARPAddress Resolution Protocol
HTTPSHypertext Transfer Protocol Secure
LDAPSLightweight Directory Access Protocol
MACMedia Access Control
PAMPrivileged Access Management
MFAMultifactor Authentication
TCPTransmission Control Protocol
URIUniform Resource Identifier
WANWide Area Network
ISOInternational Organization for Standardization
CASBCloud Access Security Broker
NGFWNext-generation Firewall
SMBServer Message Block
TFTPTrivial File Transfer Protocol
XXEXML External Entity
NIDSNetwork-based Intrusion Detection System
POCProof of Concept
SPFSender Policy Framework
LANLocal Area Network
CVSSCommon Vulnerability Scoring System
SASESecure Access Secure Edge
SIEMSecurity Information and Event Management
DoSDenial of Service
IoCIndicators of Compromise
SSLSecure Sockets Layer
ACLAccess Control List
FTPFile Transfer Protocol
HTTPHypertext Transfer Protocol
SFTPSecure File Transfer Protocol
SLOService-level Objective
DNSDomain Name Service
MSSPManaged Security Service Provider
NACNetwork Access Control
DLPData Loss Prevention
PIIPersonally Identifiable Information
SLAService-level Agreement
XDRExtended Detection Response
ITInformation Technology
CSRFCross-site Request Forgery
MSPManaged Service Provider
BGPBorder Gateway Protocol
PIDProcess Identifier
SSRFServer-side Request Forgery
DMARCDomain-based Message Authentication, Reporting, and Conformance
HIDSHost-based Intrusion Detection System
GDBGNU Debugger
PKIPublic Key Infrastructure
IDSIntrusion Detection System
RXSSReflected Cross-site Scripting
CISCenter for Internet Security
OpenVASOpen Vulnerability Assessment Scanner
SOARSecurity Orchestration, Automation, and Response
MSFMetasploit Framework
KPIKey Performance Indicator
STIXStructured Threat Information Expression
XMLExtensible Markup Language
C2Command and Control
SSOSingle Sign-on
PHPHypertext Preprocessor
OWASPOpen Web Application Security Project
OSOperating System
CI/CDContinuous Integration and Continuous Delivery
ZAPZed Attack Proxy
IPSIntrusion Prevention System
WAFWeb Application Firewall
BCBusiness Continuity
LOILetter of Intent
ITILInformation Technology Infrastructure Library
OTOperational Technology
RFIRemote File Inclusion
CERTComputer Emergency Response Team
IPInternet Protocol
SQLStructured Query Languge
TTPTactics, Techniques, and Procedures
JSONJavaScript Object Notation
APIApplication Programming Interface
XSSCross-site Scripting
CSIRTCybersecurity Incident Response Team
APTAdvanced Persistent Threat