Bash, the Crucial Exams Chat Bot
AI Bot

ISC2 CISSP - All Acronyms Flashcards

Hashed Message Authentication Code
COBIT
DNS
OS
Operating System
Virtual Private Network
Domain Name System
Private Branch Exchange
Control Objectives for Information and Related Technologies
PBX
VPN
HMAC
FrontBack
AAAAuthentication Authorization Accounting
ACLAccess Control List
AESAdvanced Encryption Standard
ALEAnnualized Loss Expectancy
APAccess Point
APIApplication Programming Interface
ARPAddress Resolution Protocol
ASLRAddress Space Layout Randomization
BCPBusiness Continuity Plan
BGPBorder Gateway Protocol
BIABusiness Impact Analysis
BIOSBasic Input/Output System
BYODBring Your Own Device
CACertificate Authority
CABChange Advisory Board
CAPEXCapital Expenditures
CBCCipher Block Chaining
CBTComputer-Based Training
CCMPCounter Mode with Cipher Block Chaining Message Authentication Code Protocol
CCTVClosed-Circuit Television
CDNContent Delivery Network
CERTComputer Emergency Response Team
CFOChief Financial Officer
CIAConfidentiality Integrity Availability
CIOChief Information Officer
CIRTCyber Incident Response Team
CISOChief Information Security Officer
CMDBConfiguration Management Database
COBITControl Objectives for Information and Related Technologies
CPUCentral Processing Unit
CRLCertificate Revocation List
CSIRTComputer Security Incident Response Team
CSRCertificate Signing Request
DACDiscretionary Access Control
DBMSDatabase Management System
DDoSDistributed Denial of Service
DEPData Execution Prevention
DESData Encryption Standard
DHDiffe-Hellman
DHCPDynamic Host Configuration Protocol
DLPData Loss Prevention
DMZDemilitarized Zone
DNSDomain Name System
DoSDenial of Service
DRPDisaster Recovery Plan
DSADigital Signature Algorithm
EAPExtensible Authentication Protocol
ECCElliptic Curve Cryptography
EFExposure Factor
EFSEncrypting File System
ESPEncapsulating Security Payload
FARFederal Acquisition Regulation
FDEFull Disk Encryption
FIPSFederal Information Processing Standard
FISMAFederal Information Security Management Act
FTPFile Transfer Protocol
GPOGroup Policy Object
GUIDGlobally Unique Identifier
HIDSHost-based Intrusion Detection System
HIPSHost-based Intrusion Prevention System
HMACHashed Message Authentication Code
HTMLHyperText Markup Language
HTTPHypertext Transfer Protocol
HTTPSHypertext Transfer Protocol Secure
IaaSInfrastructure as a Service
IAMIdentity and Access Management
ICMPInternet Control Message Protocol
ICSIndustrial Control System
IDEIntegrated Development Environment
IDSIntrusion Detection System
IECInternational Electrotechnical Commission
IEEEInstitute of Electrical and Electronics Engineers
IETFInternet Engineering Task Force
IISInternet Information Services
IMAPInternet Message Access Protocol
IoTInternet of Things
IPInternet Protocol
IPSIntrusion Prevention System
IPSecInternet Protocol Security
IRIncident Response
ISACAInformation Systems Audit and Control Association
ISOInternational Organization for Standardization
ISPInternet Service Provider
ITILInformation Technology Infrastructure Library
ITSMInformation Technology Service Management
KDCKey Distribution Center
LANLocal Area Network
LDAPLightweight Directory Access Protocol
MACMandatory Access Control
MANMetropolitan Area Network
MFAMulti-Factor Authentication
MITMMan in the Middle
MPLSMultiprotocol Label Switching
MSPManaged Service Provider
MTBFMean Time Between Failures
MTTFMean Time To Failure
MTTRMean Time To Repair
NATNetwork Address Translation
NDANon-Disclosure Agreement
NFCNear Field Communication
NIDSNetwork Intrusion Detection System
NIPSNetwork Intrusion Prevention System
NISTNational Institute of Standards and Technology
NOCNetwork Operations Center
NSANational Security Agency
NTFSNew Technology File System
OAuthOpen Authorization
OJTOn the Job Training
OSOperating System
OSIOpen Systems Interconnection
OTPOne-Time Password
PaaSPlatform as a Service
PACProxy Auto-Config
PATPort Address Translation
PBXPrivate Branch Exchange
PCI DSSPayment Card Industry Data Security Standard
PCMCIAPersonal Computer Memory Card International Association
PDUProtocol Data Unit
PEAPProtected Extensible Authentication Protocol
PKIPublic Key Infrastructure
POAMPlan of Action and Milestones
POP3Post Office Protocol v3
PPPPoint-to-Point Protocol
PTZPan Tilt Zoom
RAReliability Analysis
RADIUSRemote Authentication Dial-In User Service
RAMRandom Access Memory
RATRemote Access Trojan
RFIRequest for Information
RFIDRadio-Frequency Identification
RFPRequest for Proposal
ROIReturn on Investment
ROMRead-Only Memory
RSARivest Shamir Adleman
SaaSSoftware as a Service
SAMLSecurity Assertion Markup Language
SCADASupervisory Control and Data Acquisition
SDLCSystem Development Life Cycle
SDNSoftware Defined Networking
SHASecure Hash Algorithm
SIEMSecurity Information and Event Management
SIMSubscriber Identity Module
SLAService Level Agreement
SMBServer Message Block
SMIMESecure/Multipurpose Internet Mail Extensions
SMTPSimple Mail Transfer Protocol
SNMPSimple Network Management Protocol
SOAService Oriented Architecture
SOCSecurity Operations Center
SOXSarbanes-Oxley Act
SPFSender Policy Framework
SQLStructured Query Language
SSHSecure Shell
SSIDService Set Identifier
SSLSecure Sockets Layer
SSOSingle Sign-On
STPShielded Twisted Pair
SWOTStrengths Weaknesses Opportunities Threats
TCOTotal Cost of Ownership
TCPTransmission Control Protocol
TFTPTrivial File Transfer Protocol
TLSTransport Layer Security
TPMTrusted Platform Module
UATUser Acceptance Testing
UDPUser Datagram Protocol
UPSUninterruptible Power Supply
URIUniform Resource Identifier
URLUniform Resource Locator
USBUniversal Serial Bus
UTMUnified Threat Management
UUIDUniversally Unique Identifier
VDIVirtual Desktop Infrastructure
VoIPVoice over Internet Protocol
VPNVirtual Private Network
VTCVideo Teleconferencing
WANWide Area Network
WEPWired Equivalent Privacy
WiFiWireless Fidelity
WIPSWireless Intrusion Prevention System
WLANWireless Local Area Network
WORMWrite Once Read Many
WPAWi-Fi Protected Access
WPA2Wi-Fi Protected Access 2
XMLExtensible Markup Language
XORExclusive OR
XSRFCross-Site Request Forgery
XSSCross-Site Scripting
Front
BCP
Click the card to flip
Back
Business Continuity Plan
Front
OAuth
Back
Open Authorization
Front
ROI
Back
Return on Investment
Front
BYOD
Back
Bring Your Own Device
Front
LDAP
Back
Lightweight Directory Access Protocol
Front
DSA
Back
Digital Signature Algorithm
Front
ICS
Back
Industrial Control System
Front
NSA
Back
National Security Agency
Front
PPP
Back
Point-to-Point Protocol
Front
DAC
Back
Discretionary Access Control
Front
DHCP
Back
Dynamic Host Configuration Protocol
Front
ACL
Back
Access Control List
Front
FTP
Back
File Transfer Protocol
Front
NFC
Back
Near Field Communication
Front
RFI
Back
Request for Information
Front
WIPS
Back
Wireless Intrusion Prevention System
Front
ISACA
Back
Information Systems Audit and Control Association
Front
SDLC
Back
System Development Life Cycle
Front
WEP
Back
Wired Equivalent Privacy
Front
CIO
Back
Chief Information Officer
Front
IPS
Back
Intrusion Prevention System
Front
PDU
Back
Protocol Data Unit
Front
CRL
Back
Certificate Revocation List
Front
DRP
Back
Disaster Recovery Plan
Front
GPO
Back
Group Policy Object
Front
SOC
Back
Security Operations Center
Front
SSL
Back
Secure Sockets Layer
Front
RADIUS
Back
Remote Authentication Dial-In User Service
Front
RAT
Back
Remote Access Trojan
Front
SAML
Back
Security Assertion Markup Language
Front
SHA
Back
Secure Hash Algorithm
Front
PTZ
Back
Pan Tilt Zoom
Front
VTC
Back
Video Teleconferencing
Front
BGP
Back
Border Gateway Protocol
Front
DNS
Back
Domain Name System
Front
SDN
Back
Software Defined Networking
Front
ECC
Back
Elliptic Curve Cryptography
Front
SSO
Back
Single Sign-On
Front
WLAN
Back
Wireless Local Area Network
Front
SOX
Back
Sarbanes-Oxley Act
Front
CISO
Back
Chief Information Security Officer
Front
ALE
Back
Annualized Loss Expectancy
Front
DoS
Back
Denial of Service
Front
COBIT
Back
Control Objectives for Information and Related Technologies
Front
RFP
Back
Request for Proposal
Front
SPF
Back
Sender Policy Framework
Front
UTM
Back
Unified Threat Management
Front
NIPS
Back
Network Intrusion Prevention System
Front
PAC
Back
Proxy Auto-Config
Front
PEAP
Back
Protected Extensible Authentication Protocol
Front
SQL
Back
Structured Query Language
Front
MSP
Back
Managed Service Provider
Front
ARP
Back
Address Resolution Protocol
Front
FAR
Back
Federal Acquisition Regulation
Front
PCI DSS
Back
Payment Card Industry Data Security Standard
Front
CPU
Back
Central Processing Unit
Front
IDE
Back
Integrated Development Environment
Front
ITIL
Back
Information Technology Infrastructure Library
Front
UPS
Back
Uninterruptible Power Supply
Front
ASLR
Back
Address Space Layout Randomization
Front
IR
Back
Incident Response
Front
TLS
Back
Transport Layer Security
Front
EFS
Back
Encrypting File System
Front
SMIME
Back
Secure/Multipurpose Internet Mail Extensions
Front
CCTV
Back
Closed-Circuit Television
Front
MAC
Back
Mandatory Access Control
Front
CSIRT
Back
Computer Security Incident Response Team
Front
WPA
Back
Wi-Fi Protected Access
Front
DMZ
Back
Demilitarized Zone
Front
NTFS
Back
New Technology File System
Front
PKI
Back
Public Key Infrastructure
Front
IMAP
Back
Internet Message Access Protocol
Front
DDoS
Back
Distributed Denial of Service
Front
TPM
Back
Trusted Platform Module
Front
KDC
Back
Key Distribution Center
Front
MAN
Back
Metropolitan Area Network
Front
SaaS
Back
Software as a Service
Front
SWOT
Back
Strengths Weaknesses Opportunities Threats
Front
MTTR
Back
Mean Time To Repair
Front
NDA
Back
Non-Disclosure Agreement
Front
PCMCIA
Back
Personal Computer Memory Card International Association
Front
RA
Back
Reliability Analysis
Front
VDI
Back
Virtual Desktop Infrastructure
Front
CIA
Back
Confidentiality Integrity Availability
Front
TFTP
Back
Trivial File Transfer Protocol
Front
SSID
Back
Service Set Identifier
Front
LAN
Back
Local Area Network
Front
VPN
Back
Virtual Private Network
Front
OSI
Back
Open Systems Interconnection
Front
VoIP
Back
Voice over Internet Protocol
Front
CMDB
Back
Configuration Management Database
Front
IPSec
Back
Internet Protocol Security
Front
MTTF
Back
Mean Time To Failure
Front
DES
Back
Data Encryption Standard
Front
SIM
Back
Subscriber Identity Module
Front
CBC
Back
Cipher Block Chaining
Front
IaaS
Back
Infrastructure as a Service
Front
IIS
Back
Internet Information Services
Front
IP
Back
Internet Protocol
Front
MTBF
Back
Mean Time Between Failures
Front
AP
Back
Access Point
Front
XSRF
Back
Cross-Site Request Forgery
Front
XOR
Back
Exclusive OR
Front
GUID
Back
Globally Unique Identifier
Front
ROM
Back
Read-Only Memory
Front
WORM
Back
Write Once Read Many
Front
CA
Back
Certificate Authority
Front
HIDS
Back
Host-based Intrusion Detection System
Front
NAT
Back
Network Address Translation
Front
ESP
Back
Encapsulating Security Payload
Front
TCO
Back
Total Cost of Ownership
Front
URI
Back
Uniform Resource Identifier
Front
XML
Back
Extensible Markup Language
Front
CBT
Back
Computer-Based Training
Front
CSR
Back
Certificate Signing Request
Front
HTTP
Back
Hypertext Transfer Protocol
Front
PBX
Back
Private Branch Exchange
Front
BIA
Back
Business Impact Analysis
Front
RAM
Back
Random Access Memory
Front
XSS
Back
Cross-Site Scripting
Front
NOC
Back
Network Operations Center
Front
DH
Back
Diffe-Hellman
Front
EAP
Back
Extensible Authentication Protocol
Front
CDN
Back
Content Delivery Network
Front
WAN
Back
Wide Area Network
Front
HIPS
Back
Host-based Intrusion Prevention System
Front
OTP
Back
One-Time Password
Front
API
Back
Application Programming Interface
Front
IoT
Back
Internet of Things
Front
ISO
Back
International Organization for Standardization
Front
AES
Back
Advanced Encryption Standard
Front
USB
Back
Universal Serial Bus
Front
IEEE
Back
Institute of Electrical and Electronics Engineers
Front
TCP
Back
Transmission Control Protocol
Front
UDP
Back
User Datagram Protocol
Front
WPA2
Back
Wi-Fi Protected Access 2
Front
HMAC
Back
Hashed Message Authentication Code
Front
ITSM
Back
Information Technology Service Management
Front
RFID
Back
Radio-Frequency Identification
Front
FIPS
Back
Federal Information Processing Standard
Front
CCMP
Back
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
Front
SMTP
Back
Simple Mail Transfer Protocol
Front
CERT
Back
Computer Emergency Response Team
Front
ISP
Back
Internet Service Provider
Front
RSA
Back
Rivest Shamir Adleman
Front
CAB
Back
Change Advisory Board
Front
EF
Back
Exposure Factor
Front
CIRT
Back
Cyber Incident Response Team
Front
HTML
Back
HyperText Markup Language
Front
ICMP
Back
Internet Control Message Protocol
Front
OJT
Back
On the Job Training
Front
IAM
Back
Identity and Access Management
Front
MPLS
Back
Multiprotocol Label Switching
Front
CAPEX
Back
Capital Expenditures
Front
CFO
Back
Chief Financial Officer
Front
POP3
Back
Post Office Protocol v3
Front
SLA
Back
Service Level Agreement
Front
STP
Back
Shielded Twisted Pair
Front
UAT
Back
User Acceptance Testing
Front
UUID
Back
Universally Unique Identifier
Front
SNMP
Back
Simple Network Management Protocol
Front
DEP
Back
Data Execution Prevention
Front
NIST
Back
National Institute of Standards and Technology
Front
PaaS
Back
Platform as a Service
Front
POAM
Back
Plan of Action and Milestones
Front
NIDS
Back
Network Intrusion Detection System
Front
URL
Back
Uniform Resource Locator
Front
DLP
Back
Data Loss Prevention
Front
IEC
Back
International Electrotechnical Commission
Front
MITM
Back
Man in the Middle
Front
OS
Back
Operating System
Front
SCADA
Back
Supervisory Control and Data Acquisition
Front
MFA
Back
Multi-Factor Authentication
Front
SIEM
Back
Security Information and Event Management
Front
AAA
Back
Authentication Authorization Accounting
Front
WiFi
Back
Wireless Fidelity
Front
FISMA
Back
Federal Information Security Management Act
Front
DBMS
Back
Database Management System
Front
SMB
Back
Server Message Block
Front
HTTPS
Back
Hypertext Transfer Protocol Secure
Front
IDS
Back
Intrusion Detection System
Front
IETF
Back
Internet Engineering Task Force
Front
PAT
Back
Port Address Translation
Front
FDE
Back
Full Disk Encryption
Front
SOA
Back
Service Oriented Architecture
Front
SSH
Back
Secure Shell
Front
BIOS
Back
Basic Input/Output System
1/187
All acronyms you could see on the ISC2 CISSP exam!
Share on...
Follow us on...