Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
150 Cards in this Set
- Front
- Back
3DES
|
Triple Digital Encryption Standard
|
|
AAA
|
Authentication, Authorization, and Accounting
|
|
ACL
|
Access Control List
|
|
AES
|
Advanced Encryption Standard
|
|
AES256
|
Advanced Encryption Standards 256bit
|
|
AH
|
Authentication Header
|
|
ALE
|
Annualized Loss Expectancy
|
|
AP
|
Access Point
|
|
ARO
|
Annualized Rate of Occurrence
|
|
ARP
|
Address Resolution Protocol
|
|
AUP
|
Acceptable Use Policy
|
|
BCP
|
Business Continuity Planning
|
|
BIOS
|
Basic Input / Output System
|
|
BOTS
|
Network Robots
|
|
CA
|
Certificate Authority
|
|
CAC
|
Common Access Card
|
|
CAN
|
Controller Area Network
|
|
CCMP
|
Counter-Mode/CBC- Mac Protocol
|
|
CCTV
|
Closed-circuit television
|
|
CERT
|
Computer Emergency Response Team
|
|
CHAP
|
Challenge Handshake Authentication Protocol
|
|
CIRT
|
Computer Incident Response Team
|
|
CRC
|
Cyclical Redundancy Check
|
|
CRL
|
Certification Revocation List
|
|
DAC
|
Discretionary Access Control
|
|
DDOS
|
Distributed Denial of Service
|
|
DEP
|
Data Execution Prevention
|
|
DES
|
Digital Encryption Standard
|
|
DHCP
|
Dynamic Host Configuration Protocol
|
|
DLL
|
Dynamic Link Library
|
|
DLP
|
Data Loss Prevention
|
|
DMZ
|
Demilitarized Zone
|
|
DNS
|
Domain Name Service (Server)
|
|
DOS
|
Denial of Service
|
|
DRP
|
Disaster Recovery Plan
|
|
DSA
|
Digital Signature Algorithm
|
|
EAP
|
Extensible Authentication Protocol
|
|
ECC
|
Elliptic Curve Cryptography
|
|
EFS
|
Encrypted File System
|
|
EMI
|
Electromagnetic Interference
|
|
ESP
|
Encapsulated Security Payload
|
|
FTP
|
File Transfer Protocol
|
|
GPU
|
Graphic Processing Unit
|
|
GRE
|
Generic Routing Encapsulation
|
|
HDD
|
Hard Disk Drive
|
|
HIDS
|
Host Based Intrusion Detection System
|
|
HIPS
|
Host Based Intrusion Prevention System
|
|
HMAC
|
Hashed Message Authentication Code
|
|
HSM
|
Hardware Security Module
|
|
HTTP
|
Hypertext Transfer Protocol
|
|
HTTPS
|
Hypertext Transfer Protocol over SSL
|
|
HVAC
|
Heating, Ventilation Air Conditioning
|
|
IaaS
|
Infrastructure as a Service
|
|
ICMP
|
Internet Control Message Protocol
|
|
ID
|
Identification
|
|
IKE
|
Internet Key Exchange
|
|
IM
|
Instant messaging
|
|
IMAP4
|
Internet Message Access Protocol v4
|
|
IP
|
Internet Protocol
|
|
IPSEC
|
Internet Protocol Security
|
|
IRC
|
Internet Relay Chat
|
|
ISP
|
Internet Service Provider
|
|
IV
|
Initialization Vector
|
|
KDC
|
Key Distribution Center
|
|
L2TP
|
Layer 2 Tunneling Protocol
|
|
LANMAN
|
Local Area Network Manager
|
|
LDAP
|
Lightweight Directory Access Protocol
|
|
LEAP
|
Lightweight Extensible Authentication Protocol
|
|
MAC
|
Mandatory Access Control / Media Access Control / Message Authentication Code
|
|
MAN
|
Metropolitan Area Network
|
|
MBR
|
Master Boot Record
|
|
MD5
|
Message Digest 5
|
|
MSCHAP
|
Microsoft Challenge Handshake Authentication Protocol
|
|
MTU
|
Maximum Transmission Unit
|
|
NAC
|
Network Access Control
|
|
NAT
|
Network Address Translation
|
|
NIDS
|
Network Based Intrusion Detection System
|
|
NIPS
|
Network Based Intrusion Prevention System
|
|
NIST
|
National Institute of Standards & Technology
|
|
NOS
|
Network Operating System
|
|
NTFS
|
New Technology File System
|
|
NTLM
|
New Technology LANMAN
|
|
NTP
|
Network Time Protocol
|
|
OS
|
Operating System
|
|
OVAL
|
Open Vulnerability Assessment Language
|
|
PAP
|
Password Authentication Protocol
|
|
PAT
|
Port Address Translation
|
|
PBX
|
Private Branch Exchange
|
|
PEAP
|
Protected Extensible Authentication Protocol
|
|
PED
|
Personal Electronic Device
|
|
PGP
|
Pretty Good Privacy
|
|
PII
|
Personally Identifiable Information
|
|
PKI
|
Public Key Infrastructure
|
|
POTS
|
Plain Old Telephone Service
|
|
PPP
|
Point-to- point Protocol
|
|
PPTP
|
Point to Point Tunneling Protocol
|
|
PSK
|
Pre-Shared Key
|
|
PTZ
|
Pan-Tilt- Zoom
|
|
RA
|
Recovery Agent
|
|
RAD
|
Rapid application development
|
|
RADIUS
|
Remote Authentication Dial-in User Server
|
|
RAID
|
Redundant Array of Inexpensive Disks
|
|
RAS
|
Remote Access Server
|
|
RBAC
|
Role Based Access Control
|
|
RuBAC
|
Rule Based Access Control
|
|
RSA
|
Rivest, Shamir, & Adleman
|
|
RTO
|
Recovery Time Objective
|
|
RTP
|
Real-Time Transport Protocol
|
|
S/MIME
|
Secure / Multipurpose internet Mail Extensions
|
|
SaaS
|
Software as a Service
|
|
SCAP
|
Security Content Automation Protocol
|
|
SCSI
|
Small Computer System Interface
|
|
SDLC
|
Software Development Life Cycle
|
|
SDLM
|
Software Development Life Cycle Methodology
|
|
SHA
|
Secure Hashing Algorithm
|
|
SHTTP
|
Secure Hypertext Transfer Protocol
|
|
SIM
|
Subscriber Identity Module
|
|
SLA
|
Service Level Agreement
|
|
SLE
|
Single Loss Expectancy
|
|
SMS
|
Short Message Service
|
|
SMTP
|
Simple Mail Transfer Protocol
|
|
SNMP
|
Simple Network Management Protocol
|
|
SONET
|
Synchronous Optical Network Technologies
|
|
SPIM
|
Spam over Internet Messaging
|
|
SSH
|
Secure Shell
|
|
SSL
|
Secure Sockets Layer
|
|
SSO
|
Single Sign On
|
|
STP
|
Shielded Twisted Pair
|
|
TACACS
|
Terminal Access Controller Access Control System
|
|
TCP/IP
|
Transmission Control Protocol / Internet Protocol
|
|
TKIP
|
Temporal Key Integrity Protocol
|
|
TLS
|
Transport Layer Security
|
|
TPM
|
Trusted Platform Module
|
|
UAT
|
User Acceptance Testing
|
|
UPS
|
Uninterruptable Power Supply
|
|
URL
|
Universal Resource Locator
|
|
USB
|
Universal Serial Bus
|
|
UTP
|
Unshielded Twisted Pair
|
|
VLAN
|
Virtual Local Area Network
|
|
VoIP
|
Voice over IP
|
|
VPN
|
Virtual Private Network
|
|
VTC
|
Video Teleconferencing
|
|
WAF
|
Web-Application Firewall
|
|
WAP
|
Wireless Access Point
|
|
WEP
|
Wired Equivalent Privacy
|
|
WIDS
|
Wireless Intrusion Detection System
|
|
WIPS
|
Wireless Intrusion Prevention System
|
|
WPA
|
Wireless Protected Access
|
|
XSRF
|
Cross-Site Request Forgery
|
|
XSS
|
Cross-Site Scripting
|