• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/270

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

270 Cards in this Set

  • Front
  • Back

DLP

Data Loss Prevention: detects potential breaches and exfiltration of data. Endpoint (in use), network traffic (in transit), dat storage (at rest)

DMARC

Domain message authentication reporting and conformance

DMZ

Demilitarized zone

DNAT

Destination network address transaction

DNS

Domain name server (DNS)

DoS

Denial of service

DPO

Data privacy officer

DRP

Disaster recovery plan

DSA

Digital signature algorithm

DSL

Digital subscriber line

EAP

Extensible authentication protocol

ECB

Electronic code book

ECC

Elliptic curve cryptography

ECDHE

Elliptic curve diffie-hellman ephemeral

ECDSA

ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM

EDR

ENDPOINT DETECTION & RESPONSE: monitor collection activity data from endpoints. Analyze data to identify threats patterns or IOCs. Automatically respond to identified threats to remove or mitigate them, notify appropriate teams, etc. forensics and analysis tools to research threats and search for suspicious activities

EFS

ENCRYPTED FILE SYSTEM

EOL

END OF LIFE

EOS

END OF SERVICE

ERP

ENTERPRISE RESOURCE PLANNING

ESN

ELECTRONIC SERIAL NUMBER

ESP

ENCAPSULATED SECURITY PAYLOAD

FACL

FILE SYSTEM ACCESS CONTROL LIST

FDE

FULL DESK ENCRYPTION

FPGA

FIELD PROGRAMMABLE GATE ARRAY

FRR

FALSE REJECTION RATE

FTP

FILE TRANSFER PROTOCOL

FTPS

SECURED FILE TRANSFER PROTOCOL

GCM

GALOIS COUNTER MODE

GDPR

GENERAL DATA PROTECTION REGULATION

GPG

GNU PRIVACY GUARD

GPO

GROUP POLICY OBJECT

GPS

GLOBAL POSITIONING SYSTEM

GPU

GRAPHICS PRCESSING UNIT

GRE

GENERIC ROUTING ENCAPSULATION

HA

HIGH AVAILABILITY

HDD

HARD DISK DRIVE

HIDS

HOST-BASED INTRUSION DETECTION SYSTEM

HIPS

HOST BASED INTRUSION PREVENTION SYSTEM

HMAC

HASHED MESSAGE AUTHENTICATION CODE

HOTP

HMAC BASED ONE TIME PW

HSM

HARDWARE SECURITY MODULE

HTML

HYPERTEXT MARKUP LANGUAGE

HTTP

HYPERTEXT TRANSFER PROTOCOL

HTTPS

HYPERTEXT TRANSFER PROTOCOL OVER SSL/TLS

IaaS

INFRASTRUCTURE AS A SERVICE

ICMP

INTERNET CONTROL MESSAGE PROTOCOL

ICS

INDUSTRIAL CONTROL SYSTEMS

IDEA

INTERNATIONAL DATA ENCRYPTION ALGORITHM

IDF

INTERMEDIATE DISTRIBUTION FRAME

IDP

IDENTITY PROVIDER

IDS

INTRUSIONDETECTION SYSTEM

IEEE

INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS

IKE

INTERNET KEY EXCHANGE

IM

INSTANT MESSAGING

IMAP4

INTERNET MESSAGE ACCESS PROTOCOL 4

IoC

INDICATORS OF COMPROMISE

IoT

INTERNET OF THINGS

IP

INTERNET PROTOCOL

IPSec

INTERNET PROTOCOL SECURITY



IR

INCIDENT RESPONSE

IRC

INTERNET RELAY CHAT

IRP

INCIDENT RESPONSE PLAN

ISO

INTERNATIONAL ORGANIZATION FOR STANDARDIZATION

ISP

INTERNET SERVICE PROVIDER

ISSO

INFO SYSTEMS SECURITY OFFICER

ITCP

IT CONTIGENCY PLAN

IV

INITIALIZATION VECTOR

KDC

KEY DISTRIBUTION CENTER

KEK

KEY ENCRYPTION KEY

L2TP

LAYER 2 TUNNELING PROTOCOL

LAN

LOCAL AREA NETWORK

LDAP

LIGHTWEIGHT DIRECTORY ACCES PROTOCOL

LEAP

LIGHTWEIGHT EXTENSIBLE AUTHENTICATION PROTOCOL

MaaS

MONITORING AS A SERVICE

MAC

MANDATORY ACCESS CONTROL

MAC

MEDIA ACCESS CONTROL

MAC

MESSAGE AUTHENTICATION CONTROL

MAM

MOBILE APP MGMT

MAN

METROPOLITAN AREA NETWORK

MBR

MASTER BOOT RECORD

MD5

MESSAGE DIGEST 5

MDF

MAIN DISTRIBUTION FRAME

MDM

MOBILE DEVICE MGMT

MFA

MULTIFACTOR AUTHENTICATION

MFD

MULTIFUNCTION DEVICE

MITM

MAN IN THE MIDDLE

ML

MACHINE LEARNING

MMS

MULTIMEDIA MESSAGE SERVICE

MOA

MEMORANDUM OF AGREEMDNT

MOU

MEMORANDUM OF UNDERSTANDING

MPLS

MULTI-PROTOCOL LABEL SWITCHIMG

MSA

MEASUREMENT SYSTEM ANALYSIS

MSCHAP

MICROSOFT CHALLENGE HANDSHAKE AUTHENTICATION PROTOCOL

MSP

MANAGED SERVICE PROVIDER

MSSP

MANAGED SECURITY SERVICE PROVIDER

MTBF

MEAN TIME BETWEEN FAILURES

MTTF

MEAN TIME TO FAILURE

MTTR

MEAN TIME TO RECOVER

MTU

MAXIMUM TRANSMISSION UNIT

NAC

NETWORK ACCESS CONTROL

NAS

NETWORK ATTACHED STORAGE

NAT

NETWORK ADDRESS TRANSLATION

NDA

NON DISCLOSURE AGREEMENT

NFC

NEAR FIELD COMMUNICATION

NFV

NETWORK FUNCTIONS VISUALIZATION

NIC

NETWORK INTERFACE CARD

NIDS

NETWROK BASED INTRUSION DETECTION SYSTEM

NIPS

NETWROK BASED INTRUSION PREVENTION SYSTEM

NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

NTFS

NEW TECH FILE SYSTEM

NTLM

NEW TECH LAN MANAGER

NTP

NETWORK TIME PROTOCOL

OAUTH

OPEN AUTHORIZATION

OCSP

ONLINE CERTIFICATE STATUS PROTOCOL

OID

OBJECT IDENTIFIER

OS

OPERATING SYSTEM

OSI

OPEN SYSTEMS INTERCONNECTION

OSINT

OPEN SOURCE INTELLIGENCE

OSPF

OPEN SHORTEST PATH FIRST

OT

OPERATIONAL TECHNOLOGY

OTA

OVER THE AIR

OTG

ON THE GO

OVAL

OPEN VULNERABILITY ASSESSMENT LANGUAGE

OWASP

OPEN WEB APP SECURITY PROJECT

P12

PKCS #12

P2P

PEER 2 PEER

PaaS

PLATFORM AS A SERVICE

PAC

PROXY AUTO CONFIGURATION

PAM

PRIVILEGED ACCESS MGMT

PAM

PLUGGABLE AUTHENTICATION MODULES

PAP

PASSWORD AUTHENTICATION PROTOCOL

PAT

PORT ADDRESS TRANSLATION

PBKDF2

PW BASED KEY DERIVATION FUNCTION 2

PBX

PRIVATE BRANCH EXCHANGE

PCAP

PACKET CAPTURE

PCI DSS

PAYMENT CARD INDUSTRY DATA SECURITY STANDARD

PDU

POWER DISTRIBUTION UNIT

PEAP

PROTECTED EXTENSIBLE AUTH PROTOCOL

PED

PERSONAL ELECTRONIC DEVICE

PEM

PRIVACY ENHANCED MAIL

PFS

PERFECT FOWARD SECRECY

PFX

PERSONAL INFO EXCHANGE

PGP

PRETTY GOOD PRIVACY

PHI

PERSONAL HEALTH INFO

PII

PERSONALLY INDETIFIABLE INFO

PIV

PERSONAL IDENTITY VERIFICATION

PKCS

PUBLIC KEY CRYPTOGRAPGHY STANDARDS

PKI

PUBLIC KEY INFRASTUCTURE

POP

POST OFFICE PROTOCOL

POTS

PLAIN OLD TELEPHONE SERVIVE

PPP

POINT-TO-POINT PROTOCOL

PPTP

POINT-TO-POINT TUNNELING PROTOCOL

PSK

PRE-SHARED KEY

PTZ

PAN-TILT ZOOM

QA

QUALITY ASSURANCE

QoS

QUALITY OF SERVICE

PUP

POTENTIALLY UNWANTED PROGRAM

RA

RECOVERY AGENT

RA

REGISTRATION AUTHORITY

RACE

RESEARCH AND DEVELOPMENT IN ADVACNED COMMUNICATIONS TECHNOLOGIES IN EUROPE

RAD

RAPID APP DEVELOPMENT

RADIUS

REMOTE AUTH DIAL IN USER SERVICE

RAID

REDUNDANT ARRAY OF INEXPESIVE DISKS

RAM

RANDOM ACCESS MEMORY

RAS

REMOTE ACCESS SERVER

RAT

REMOTE ACCESS TROJAN

RC4

RIVEST CIPHER VERSION 4

RCS

RICH COMMUNICATION SERVICES

RFC

REQUEST FOR COMMENTS

RFID

RADIOFREQUENCY IDENTIFIER

RIPEMD

RACE INTEGRITY PRIMITIVES EVALUATIONMESSAGE DIGEST

ROI

RETURN ON INVESTMENT

RPO

RECOVERY POINT OBJECTIVE

RSA

RIVEST, SHAMIR, & ADLEMAN

RTBH

REMOTE TRIGGERED BLACK HOLE

RTO

RECOVERY TIME OBJECTIVE

RTOS

REAL TIME OPERATING SYSTEM

RTP

REAL TIME TRANSPORT PROTOCOL

S/MIME

SEURE/MULTIPURPOSE INTERNET MAIL EXTENSIONS

SaaS

SOFTWARE AS A SERVICE

SAE

SIMULTANEOUS AUTH OF EQUALS

SAML

SECURITY ASSERTIONS MARKUP LANGUAGE

SAN

STORAGE AREA NETWORK

SAN

SUBJECT ALTERNATIVE NAME

SCADA

SYSTEM CONTROL & DATA AQUISITION

SCAP

SECURITY CONTENT AUTH PROTOCOL

SCEP

SIMPLE CERTIFICATE ENROLLMENT PROTOCOL

SDK

SOFTWARE DEVELOPMENT KIT

SDLC

SOFTWARE DEVELOPMENT LIFE CYCLE

SDLM

SOFTWARE DEVELOPMENT LIFE CYCLE METHODOLOGY

SDN

SOFTWARE DEFINED NETWORKING

SDV

SOFTWARE DEFINED VISIBILITY

SED

SELF-ENCRYPTING DRIVES

SEH

STRUCTURED EXCEPTION HANDLER

SFTP

SECURED FILE TRANSFER PROTOCOL

SHA

SECURE HASHING ALGORITHM

SHTTP

SECURE HYPERTEXT TRANSFER PROTOCOL

SIEM

SECURITY INFO & EVENT MGMT

SIM

SUBSCRIBER IDENTIFIER MODULE

SIP

SESSION INITIATION PROTOCOL

SLA

SERVICE LEVEL AGREEMENT

SLE

SINGLE LOSS EXPECTANCY

S/MIME

SECURITY/MULTIPURPOSE INTERNET MAIL EXCHANGER

SMS

SHORT MESSAGE SERVICE

SMTP

SIMPLE MAIL TRANSFER PROTOCOL

SMTPS

SIMPLE MAIL TRANSFER PROTOCOL SECURE

SNMP

SIMPLE NETWORK MGMT PROTOCOL

SOAP

SIMPLE OBJECT ACCESS PROTOCOL

SOAR

SECURITY ORCHESTRATION , AUTOMATION, RESPONSE

SoC

SYSTEM ON CHIP

SOC

SECURITY OPERATIONS CENTER

SPF

SENDER PRIVACY FRAMEWORK

SPIM

SPAM OVER INTERNET MESSAGING

SQL

STRUCTURED QUERY LANGUAGE

SQLi

SQL INJECTION

SRTP

SECURE REAL TIME PROTOCOL

SSD

SOLID STATE DRIVE

SSH

SECURE SHELL

SSL

SECURE SOCKETS LAYER

SSO

SINGLE SIGN ON

STIX

STRUCTURED THEAT INFO EXCHANGE

STP

SHIELDED TWISTED PAIR

SWG

SECURE WEB GATEWAY

TACACS+

TERMINAL ACCESS CONTROLLER ACCESS CONTROL SYSTEM

TAXII

TRUSTED AUTOMATED EXCHANGE OF INDICATOR INFO

TCP/IP

TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL

TGT

TICKET GRANTING SYSTEM

TKIP

TEMPORAL KEY INTEGRITY PROTOCOL

TLS

TRANSPORT LAYER SECURITY

TOTP

TIME BASED ONE TIME PW

TPM

TRUSTED PLATFORM MODULE

TSIG

TRANSACTION SIGNATURE

TTP

TACTICS, TECHNIQUES & PROCEDURES

UAT

USER ACCEPTANCE TESTING

UAV

UNMANNED AERIAL VEHICLE

UDP

USER DATAGRAM PROTOCOL

UEFI

UNIFIED EXTENSIBLE FIRMWARE INTERFACE

UEM

UNIFIED ENDPOINT MGMT

UPS

UNINTERRUPTABLE POWER SUPPLY

URI

UNIFORM RESOURCE IDENTIFIER

URL

UNIVERSAL RESOURCE LOCATOR

USB

UNIVERSAL SERIAL BUS

USB OTG

USB ON THE GO

UTM

UNIFIED THREAT MGMT

UTP

UNSHIELDED TWISTED PAIR

VBA

VISUAL BASIC

VDE

VIRTUAL DESKTOP ENVIRONMENT

VDI

VIRTUAL DESKTOP INFRASTRUCTURE

VLAN

VIRTUAL LOCAL AREA NETWORK

VLSM

VARIABLE LENGTH SUBNET MASKING

VM

VIRTUAL MACHINE

VoIP

VOICE OVER IP

VPC

VIRTUAL PRIVATE CLOUD

VPN

VIRTUAL PRIVATE NETWORK

VTC

VIDEO TELECONFERENCING

WAF

WEB APP FIREWALL

WAP

WIRELESS ACCES POINT

WEP

WIRED EQUIVALENT PRIVACY

WIDS

WIRELESS INTRUSION DETECTION SYSTEM

WIPS

WIRELESS INTRUSION PREVENTION SYSTEM

WORM

WRITE ONCE READ MANY

WPA

WIFI PROTECTED ACCESS

WPS

WIFI PROTECTED SETUP

WTLS

WIRELESS TLS

XaaS

ANYTHING AS A SERVICE

XML

EXTENSIBLE MARKUP LANGUAGE

XOR

EXCLUSIVE OR

XSFR

CROSS SITE REQUEST FORGERY

XSS

CROSS SITE SCRIPTING