Bash, the Crucial Exams Chat Bot
AI Bot
ISC2 CISSP - All Acronyms Flashcards
Hashed Message Authentication Code
COBIT
DNS
OS
Operating System
Virtual Private Network
Domain Name System
Private Branch Exchange
Control Objectives for Information and Related Technologies
PBX
VPN
HMAC
Front | Back |
AAA | Authentication Authorization Accounting |
ACL | Access Control List |
AES | Advanced Encryption Standard |
ALE | Annualized Loss Expectancy |
AP | Access Point |
API | Application Programming Interface |
ARP | Address Resolution Protocol |
ASLR | Address Space Layout Randomization |
BCP | Business Continuity Plan |
BGP | Border Gateway Protocol |
BIA | Business Impact Analysis |
BIOS | Basic Input/Output System |
BYOD | Bring Your Own Device |
CA | Certificate Authority |
CAB | Change Advisory Board |
CAPEX | Capital Expenditures |
CBC | Cipher Block Chaining |
CBT | Computer-Based Training |
CCMP | Counter Mode with Cipher Block Chaining Message Authentication Code Protocol |
CCTV | Closed-Circuit Television |
CDN | Content Delivery Network |
CERT | Computer Emergency Response Team |
CFO | Chief Financial Officer |
CIA | Confidentiality Integrity Availability |
CIO | Chief Information Officer |
CIRT | Cyber Incident Response Team |
CISO | Chief Information Security Officer |
CMDB | Configuration Management Database |
COBIT | Control Objectives for Information and Related Technologies |
CPU | Central Processing Unit |
CRL | Certificate Revocation List |
CSIRT | Computer Security Incident Response Team |
CSR | Certificate Signing Request |
DAC | Discretionary Access Control |
DBMS | Database Management System |
DDoS | Distributed Denial of Service |
DEP | Data Execution Prevention |
DES | Data Encryption Standard |
DH | Diffe-Hellman |
DHCP | Dynamic Host Configuration Protocol |
DLP | Data Loss Prevention |
DMZ | Demilitarized Zone |
DNS | Domain Name System |
DoS | Denial of Service |
DRP | Disaster Recovery Plan |
DSA | Digital Signature Algorithm |
EAP | Extensible Authentication Protocol |
ECC | Elliptic Curve Cryptography |
EF | Exposure Factor |
EFS | Encrypting File System |
ESP | Encapsulating Security Payload |
FAR | Federal Acquisition Regulation |
FDE | Full Disk Encryption |
FIPS | Federal Information Processing Standard |
FISMA | Federal Information Security Management Act |
FTP | File Transfer Protocol |
GPO | Group Policy Object |
GUID | Globally Unique Identifier |
HIDS | Host-based Intrusion Detection System |
HIPS | Host-based Intrusion Prevention System |
HMAC | Hashed Message Authentication Code |
HTML | HyperText Markup Language |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol Secure |
IaaS | Infrastructure as a Service |
IAM | Identity and Access Management |
ICMP | Internet Control Message Protocol |
ICS | Industrial Control System |
IDE | Integrated Development Environment |
IDS | Intrusion Detection System |
IEC | International Electrotechnical Commission |
IEEE | Institute of Electrical and Electronics Engineers |
IETF | Internet Engineering Task Force |
IIS | Internet Information Services |
IMAP | Internet Message Access Protocol |
IoT | Internet of Things |
IP | Internet Protocol |
IPS | Intrusion Prevention System |
IPSec | Internet Protocol Security |
IR | Incident Response |
ISACA | Information Systems Audit and Control Association |
ISO | International Organization for Standardization |
ISP | Internet Service Provider |
ITIL | Information Technology Infrastructure Library |
ITSM | Information Technology Service Management |
KDC | Key Distribution Center |
LAN | Local Area Network |
LDAP | Lightweight Directory Access Protocol |
MAC | Mandatory Access Control |
MAN | Metropolitan Area Network |
MFA | Multi-Factor Authentication |
MITM | Man in the Middle |
MPLS | Multiprotocol Label Switching |
MSP | Managed Service Provider |
MTBF | Mean Time Between Failures |
MTTF | Mean Time To Failure |
MTTR | Mean Time To Repair |
NAT | Network Address Translation |
NDA | Non-Disclosure Agreement |
NFC | Near Field Communication |
NIDS | Network Intrusion Detection System |
NIPS | Network Intrusion Prevention System |
NIST | National Institute of Standards and Technology |
NOC | Network Operations Center |
NSA | National Security Agency |
NTFS | New Technology File System |
OAuth | Open Authorization |
OJT | On the Job Training |
OS | Operating System |
OSI | Open Systems Interconnection |
OTP | One-Time Password |
PaaS | Platform as a Service |
PAC | Proxy Auto-Config |
PAT | Port Address Translation |
PBX | Private Branch Exchange |
PCI DSS | Payment Card Industry Data Security Standard |
PCMCIA | Personal Computer Memory Card International Association |
PDU | Protocol Data Unit |
PEAP | Protected Extensible Authentication Protocol |
PKI | Public Key Infrastructure |
POAM | Plan of Action and Milestones |
POP3 | Post Office Protocol v3 |
PPP | Point-to-Point Protocol |
PTZ | Pan Tilt Zoom |
RA | Reliability Analysis |
RADIUS | Remote Authentication Dial-In User Service |
RAM | Random Access Memory |
RAT | Remote Access Trojan |
RFI | Request for Information |
RFID | Radio-Frequency Identification |
RFP | Request for Proposal |
ROI | Return on Investment |
ROM | Read-Only Memory |
RSA | Rivest Shamir Adleman |
SaaS | Software as a Service |
SAML | Security Assertion Markup Language |
SCADA | Supervisory Control and Data Acquisition |
SDLC | System Development Life Cycle |
SDN | Software Defined Networking |
SHA | Secure Hash Algorithm |
SIEM | Security Information and Event Management |
SIM | Subscriber Identity Module |
SLA | Service Level Agreement |
SMB | Server Message Block |
SMIME | Secure/Multipurpose Internet Mail Extensions |
SMTP | Simple Mail Transfer Protocol |
SNMP | Simple Network Management Protocol |
SOA | Service Oriented Architecture |
SOC | Security Operations Center |
SOX | Sarbanes-Oxley Act |
SPF | Sender Policy Framework |
SQL | Structured Query Language |
SSH | Secure Shell |
SSID | Service Set Identifier |
SSL | Secure Sockets Layer |
SSO | Single Sign-On |
STP | Shielded Twisted Pair |
SWOT | Strengths Weaknesses Opportunities Threats |
TCO | Total Cost of Ownership |
TCP | Transmission Control Protocol |
TFTP | Trivial File Transfer Protocol |
TLS | Transport Layer Security |
TPM | Trusted Platform Module |
UAT | User Acceptance Testing |
UDP | User Datagram Protocol |
UPS | Uninterruptible Power Supply |
URI | Uniform Resource Identifier |
URL | Uniform Resource Locator |
USB | Universal Serial Bus |
UTM | Unified Threat Management |
UUID | Universally Unique Identifier |
VDI | Virtual Desktop Infrastructure |
VoIP | Voice over Internet Protocol |
VPN | Virtual Private Network |
VTC | Video Teleconferencing |
WAN | Wide Area Network |
WEP | Wired Equivalent Privacy |
WiFi | Wireless Fidelity |
WIPS | Wireless Intrusion Prevention System |
WLAN | Wireless Local Area Network |
WORM | Write Once Read Many |
WPA | Wi-Fi Protected Access |
WPA2 | Wi-Fi Protected Access 2 |
XML | Extensible Markup Language |
XOR | Exclusive OR |
XSRF | Cross-Site Request Forgery |
XSS | Cross-Site Scripting |
Front
BCP
Click the card to flip
Back
Business Continuity Plan
Front
OAuth
Back
Open Authorization
Front
ROI
Back
Return on Investment
Front
BYOD
Back
Bring Your Own Device
Front
LDAP
Back
Lightweight Directory Access Protocol
Front
DSA
Back
Digital Signature Algorithm
Front
ICS
Back
Industrial Control System
Front
NSA
Back
National Security Agency
Front
PPP
Back
Point-to-Point Protocol
Front
DAC
Back
Discretionary Access Control
Front
DHCP
Back
Dynamic Host Configuration Protocol
Front
ACL
Back
Access Control List
Front
FTP
Back
File Transfer Protocol
Front
NFC
Back
Near Field Communication
Front
RFI
Back
Request for Information
Front
WIPS
Back
Wireless Intrusion Prevention System
Front
ISACA
Back
Information Systems Audit and Control Association
Front
SDLC
Back
System Development Life Cycle
Front
WEP
Back
Wired Equivalent Privacy
Front
CIO
Back
Chief Information Officer
Front
IPS
Back
Intrusion Prevention System
Front
PDU
Back
Protocol Data Unit
Front
CRL
Back
Certificate Revocation List
Front
DRP
Back
Disaster Recovery Plan
Front
GPO
Back
Group Policy Object
Front
SOC
Back
Security Operations Center
Front
SSL
Back
Secure Sockets Layer
Front
RADIUS
Back
Remote Authentication Dial-In User Service
Front
RAT
Back
Remote Access Trojan
Front
SAML
Back
Security Assertion Markup Language
Front
SHA
Back
Secure Hash Algorithm
Front
PTZ
Back
Pan Tilt Zoom
Front
VTC
Back
Video Teleconferencing
Front
BGP
Back
Border Gateway Protocol
Front
DNS
Back
Domain Name System
Front
SDN
Back
Software Defined Networking
Front
ECC
Back
Elliptic Curve Cryptography
Front
SSO
Back
Single Sign-On
Front
WLAN
Back
Wireless Local Area Network
Front
SOX
Back
Sarbanes-Oxley Act
Front
CISO
Back
Chief Information Security Officer
Front
ALE
Back
Annualized Loss Expectancy
Front
DoS
Back
Denial of Service
Front
COBIT
Back
Control Objectives for Information and Related Technologies
Front
RFP
Back
Request for Proposal
Front
SPF
Back
Sender Policy Framework
Front
UTM
Back
Unified Threat Management
Front
NIPS
Back
Network Intrusion Prevention System
Front
PAC
Back
Proxy Auto-Config
Front
PEAP
Back
Protected Extensible Authentication Protocol
Front
SQL
Back
Structured Query Language
Front
MSP
Back
Managed Service Provider
Front
ARP
Back
Address Resolution Protocol
Front
FAR
Back
Federal Acquisition Regulation
Front
PCI DSS
Back
Payment Card Industry Data Security Standard
Front
CPU
Back
Central Processing Unit
Front
IDE
Back
Integrated Development Environment
Front
ITIL
Back
Information Technology Infrastructure Library
Front
UPS
Back
Uninterruptible Power Supply
Front
ASLR
Back
Address Space Layout Randomization
Front
IR
Back
Incident Response
Front
TLS
Back
Transport Layer Security
Front
EFS
Back
Encrypting File System
Front
SMIME
Back
Secure/Multipurpose Internet Mail Extensions
Front
CCTV
Back
Closed-Circuit Television
Front
MAC
Back
Mandatory Access Control
Front
CSIRT
Back
Computer Security Incident Response Team
Front
WPA
Back
Wi-Fi Protected Access
Front
DMZ
Back
Demilitarized Zone
Front
NTFS
Back
New Technology File System
Front
PKI
Back
Public Key Infrastructure
Front
IMAP
Back
Internet Message Access Protocol
Front
DDoS
Back
Distributed Denial of Service
Front
TPM
Back
Trusted Platform Module
Front
KDC
Back
Key Distribution Center
Front
MAN
Back
Metropolitan Area Network
Front
SaaS
Back
Software as a Service
Front
SWOT
Back
Strengths Weaknesses Opportunities Threats
Front
MTTR
Back
Mean Time To Repair
Front
NDA
Back
Non-Disclosure Agreement
Front
PCMCIA
Back
Personal Computer Memory Card International Association
Front
RA
Back
Reliability Analysis
Front
VDI
Back
Virtual Desktop Infrastructure
Front
CIA
Back
Confidentiality Integrity Availability
Front
TFTP
Back
Trivial File Transfer Protocol
Front
SSID
Back
Service Set Identifier
Front
LAN
Back
Local Area Network
Front
VPN
Back
Virtual Private Network
Front
OSI
Back
Open Systems Interconnection
Front
VoIP
Back
Voice over Internet Protocol
Front
CMDB
Back
Configuration Management Database
Front
IPSec
Back
Internet Protocol Security
Front
MTTF
Back
Mean Time To Failure
Front
DES
Back
Data Encryption Standard
Front
SIM
Back
Subscriber Identity Module
Front
CBC
Back
Cipher Block Chaining
Front
IaaS
Back
Infrastructure as a Service
Front
IIS
Back
Internet Information Services
Front
IP
Back
Internet Protocol
Front
MTBF
Back
Mean Time Between Failures
Front
AP
Back
Access Point
Front
XSRF
Back
Cross-Site Request Forgery
Front
XOR
Back
Exclusive OR
Front
GUID
Back
Globally Unique Identifier
Front
ROM
Back
Read-Only Memory
Front
WORM
Back
Write Once Read Many
Front
CA
Back
Certificate Authority
Front
HIDS
Back
Host-based Intrusion Detection System
Front
NAT
Back
Network Address Translation
Front
ESP
Back
Encapsulating Security Payload
Front
TCO
Back
Total Cost of Ownership
Front
URI
Back
Uniform Resource Identifier
Front
XML
Back
Extensible Markup Language
Front
CBT
Back
Computer-Based Training
Front
CSR
Back
Certificate Signing Request
Front
HTTP
Back
Hypertext Transfer Protocol
Front
PBX
Back
Private Branch Exchange
Front
BIA
Back
Business Impact Analysis
Front
RAM
Back
Random Access Memory
Front
XSS
Back
Cross-Site Scripting
Front
NOC
Back
Network Operations Center
Front
DH
Back
Diffe-Hellman
Front
EAP
Back
Extensible Authentication Protocol
Front
CDN
Back
Content Delivery Network
Front
WAN
Back
Wide Area Network
Front
HIPS
Back
Host-based Intrusion Prevention System
Front
OTP
Back
One-Time Password
Front
API
Back
Application Programming Interface
Front
IoT
Back
Internet of Things
Front
ISO
Back
International Organization for Standardization
Front
AES
Back
Advanced Encryption Standard
Front
USB
Back
Universal Serial Bus
Front
IEEE
Back
Institute of Electrical and Electronics Engineers
Front
TCP
Back
Transmission Control Protocol
Front
UDP
Back
User Datagram Protocol
Front
WPA2
Back
Wi-Fi Protected Access 2
Front
HMAC
Back
Hashed Message Authentication Code
Front
ITSM
Back
Information Technology Service Management
Front
RFID
Back
Radio-Frequency Identification
Front
FIPS
Back
Federal Information Processing Standard
Front
CCMP
Back
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
Front
SMTP
Back
Simple Mail Transfer Protocol
Front
CERT
Back
Computer Emergency Response Team
Front
ISP
Back
Internet Service Provider
Front
RSA
Back
Rivest Shamir Adleman
Front
CAB
Back
Change Advisory Board
Front
EF
Back
Exposure Factor
Front
CIRT
Back
Cyber Incident Response Team
Front
HTML
Back
HyperText Markup Language
Front
ICMP
Back
Internet Control Message Protocol
Front
OJT
Back
On the Job Training
Front
IAM
Back
Identity and Access Management
Front
MPLS
Back
Multiprotocol Label Switching
Front
CAPEX
Back
Capital Expenditures
Front
CFO
Back
Chief Financial Officer
Front
POP3
Back
Post Office Protocol v3
Front
SLA
Back
Service Level Agreement
Front
STP
Back
Shielded Twisted Pair
Front
UAT
Back
User Acceptance Testing
Front
UUID
Back
Universally Unique Identifier
Front
SNMP
Back
Simple Network Management Protocol
Front
DEP
Back
Data Execution Prevention
Front
NIST
Back
National Institute of Standards and Technology
Front
PaaS
Back
Platform as a Service
Front
POAM
Back
Plan of Action and Milestones
Front
NIDS
Back
Network Intrusion Detection System
Front
URL
Back
Uniform Resource Locator
Front
DLP
Back
Data Loss Prevention
Front
IEC
Back
International Electrotechnical Commission
Front
MITM
Back
Man in the Middle
Front
OS
Back
Operating System
Front
SCADA
Back
Supervisory Control and Data Acquisition
Front
MFA
Back
Multi-Factor Authentication
Front
SIEM
Back
Security Information and Event Management
Front
AAA
Back
Authentication Authorization Accounting
Front
WiFi
Back
Wireless Fidelity
Front
FISMA
Back
Federal Information Security Management Act
Front
DBMS
Back
Database Management System
Front
SMB
Back
Server Message Block
Front
HTTPS
Back
Hypertext Transfer Protocol Secure
Front
IDS
Back
Intrusion Detection System
Front
IETF
Back
Internet Engineering Task Force
Front
PAT
Back
Port Address Translation
Front
FDE
Back
Full Disk Encryption
Front
SOA
Back
Service Oriented Architecture
Front
SSH
Back
Secure Shell
Front
BIOS
Back
Basic Input/Output System
1/187
All acronyms you could see on the ISC2 CISSP exam!