Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
270 Cards in this Set
- Front
- Back
DLP |
Data Loss Prevention: detects potential breaches and exfiltration of data. Endpoint (in use), network traffic (in transit), dat storage (at rest) |
|
DMARC |
Domain message authentication reporting and conformance |
|
DMZ |
Demilitarized zone |
|
DNAT |
Destination network address transaction |
|
DNS |
Domain name server (DNS) |
|
DoS |
Denial of service |
|
DPO |
Data privacy officer |
|
DRP |
Disaster recovery plan |
|
DSA |
Digital signature algorithm |
|
DSL |
Digital subscriber line |
|
EAP |
Extensible authentication protocol |
|
ECB |
Electronic code book |
|
ECC |
Elliptic curve cryptography |
|
ECDHE |
Elliptic curve diffie-hellman ephemeral |
|
ECDSA |
ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM |
|
EDR |
ENDPOINT DETECTION & RESPONSE: monitor collection activity data from endpoints. Analyze data to identify threats patterns or IOCs. Automatically respond to identified threats to remove or mitigate them, notify appropriate teams, etc. forensics and analysis tools to research threats and search for suspicious activities |
|
EFS |
ENCRYPTED FILE SYSTEM |
|
EOL |
END OF LIFE |
|
EOS |
END OF SERVICE |
|
ERP |
ENTERPRISE RESOURCE PLANNING |
|
ESN |
ELECTRONIC SERIAL NUMBER |
|
ESP |
ENCAPSULATED SECURITY PAYLOAD |
|
FACL |
FILE SYSTEM ACCESS CONTROL LIST |
|
FDE |
FULL DESK ENCRYPTION |
|
FPGA |
FIELD PROGRAMMABLE GATE ARRAY |
|
FRR |
FALSE REJECTION RATE |
|
FTP |
FILE TRANSFER PROTOCOL |
|
FTPS |
SECURED FILE TRANSFER PROTOCOL |
|
GCM |
GALOIS COUNTER MODE |
|
GDPR |
GENERAL DATA PROTECTION REGULATION |
|
GPG |
GNU PRIVACY GUARD |
|
GPO |
GROUP POLICY OBJECT |
|
GPS |
GLOBAL POSITIONING SYSTEM |
|
GPU |
GRAPHICS PRCESSING UNIT |
|
GRE |
GENERIC ROUTING ENCAPSULATION |
|
HA |
HIGH AVAILABILITY |
|
HDD |
HARD DISK DRIVE |
|
HIDS |
HOST-BASED INTRUSION DETECTION SYSTEM |
|
HIPS |
HOST BASED INTRUSION PREVENTION SYSTEM |
|
HMAC |
HASHED MESSAGE AUTHENTICATION CODE |
|
HOTP |
HMAC BASED ONE TIME PW |
|
HSM |
HARDWARE SECURITY MODULE |
|
HTML |
HYPERTEXT MARKUP LANGUAGE |
|
HTTP |
HYPERTEXT TRANSFER PROTOCOL |
|
HTTPS |
HYPERTEXT TRANSFER PROTOCOL OVER SSL/TLS |
|
IaaS |
INFRASTRUCTURE AS A SERVICE |
|
ICMP |
INTERNET CONTROL MESSAGE PROTOCOL |
|
ICS |
INDUSTRIAL CONTROL SYSTEMS |
|
IDEA |
INTERNATIONAL DATA ENCRYPTION ALGORITHM |
|
IDF |
INTERMEDIATE DISTRIBUTION FRAME |
|
IDP |
IDENTITY PROVIDER |
|
IDS |
INTRUSIONDETECTION SYSTEM |
|
IEEE |
INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS |
|
IKE |
INTERNET KEY EXCHANGE |
|
IM |
INSTANT MESSAGING |
|
IMAP4 |
INTERNET MESSAGE ACCESS PROTOCOL 4 |
|
IoC |
INDICATORS OF COMPROMISE |
|
IoT |
INTERNET OF THINGS |
|
IP |
INTERNET PROTOCOL |
|
IPSec |
INTERNET PROTOCOL SECURITY |
|
IR |
INCIDENT RESPONSE |
|
IRC |
INTERNET RELAY CHAT |
|
IRP |
INCIDENT RESPONSE PLAN |
|
ISO |
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION |
|
ISP |
INTERNET SERVICE PROVIDER |
|
ISSO |
INFO SYSTEMS SECURITY OFFICER |
|
ITCP |
IT CONTIGENCY PLAN |
|
IV |
INITIALIZATION VECTOR |
|
KDC |
KEY DISTRIBUTION CENTER |
|
KEK |
KEY ENCRYPTION KEY |
|
L2TP |
LAYER 2 TUNNELING PROTOCOL |
|
LAN |
LOCAL AREA NETWORK |
|
LDAP |
LIGHTWEIGHT DIRECTORY ACCES PROTOCOL |
|
LEAP |
LIGHTWEIGHT EXTENSIBLE AUTHENTICATION PROTOCOL |
|
MaaS |
MONITORING AS A SERVICE |
|
MAC |
MANDATORY ACCESS CONTROL |
|
MAC |
MEDIA ACCESS CONTROL |
|
MAC |
MESSAGE AUTHENTICATION CONTROL |
|
MAM |
MOBILE APP MGMT |
|
MAN |
METROPOLITAN AREA NETWORK |
|
MBR |
MASTER BOOT RECORD |
|
MD5 |
MESSAGE DIGEST 5 |
|
MDF |
MAIN DISTRIBUTION FRAME |
|
MDM |
MOBILE DEVICE MGMT |
|
MFA |
MULTIFACTOR AUTHENTICATION |
|
MFD |
MULTIFUNCTION DEVICE |
|
MITM |
MAN IN THE MIDDLE |
|
ML |
MACHINE LEARNING |
|
MMS |
MULTIMEDIA MESSAGE SERVICE |
|
MOA |
MEMORANDUM OF AGREEMDNT |
|
MOU |
MEMORANDUM OF UNDERSTANDING |
|
MPLS |
MULTI-PROTOCOL LABEL SWITCHIMG |
|
MSA |
MEASUREMENT SYSTEM ANALYSIS |
|
MSCHAP |
MICROSOFT CHALLENGE HANDSHAKE AUTHENTICATION PROTOCOL |
|
MSP |
MANAGED SERVICE PROVIDER |
|
MSSP |
MANAGED SECURITY SERVICE PROVIDER |
|
MTBF |
MEAN TIME BETWEEN FAILURES |
|
MTTF |
MEAN TIME TO FAILURE |
|
MTTR |
MEAN TIME TO RECOVER |
|
MTU |
MAXIMUM TRANSMISSION UNIT |
|
NAC |
NETWORK ACCESS CONTROL |
|
NAS |
NETWORK ATTACHED STORAGE |
|
NAT |
NETWORK ADDRESS TRANSLATION |
|
NDA |
NON DISCLOSURE AGREEMENT |
|
NFC |
NEAR FIELD COMMUNICATION |
|
NFV |
NETWORK FUNCTIONS VISUALIZATION |
|
NIC |
NETWORK INTERFACE CARD |
|
NIDS |
NETWROK BASED INTRUSION DETECTION SYSTEM |
|
NIPS |
NETWROK BASED INTRUSION PREVENTION SYSTEM |
|
NIST |
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY |
|
NTFS |
NEW TECH FILE SYSTEM |
|
NTLM |
NEW TECH LAN MANAGER |
|
NTP |
NETWORK TIME PROTOCOL |
|
OAUTH |
OPEN AUTHORIZATION |
|
OCSP |
ONLINE CERTIFICATE STATUS PROTOCOL |
|
OID |
OBJECT IDENTIFIER |
|
OS |
OPERATING SYSTEM |
|
OSI |
OPEN SYSTEMS INTERCONNECTION |
|
OSINT |
OPEN SOURCE INTELLIGENCE |
|
OSPF |
OPEN SHORTEST PATH FIRST |
|
OT |
OPERATIONAL TECHNOLOGY |
|
OTA |
OVER THE AIR |
|
OTG |
ON THE GO |
|
OVAL |
OPEN VULNERABILITY ASSESSMENT LANGUAGE |
|
OWASP |
OPEN WEB APP SECURITY PROJECT |
|
P12 |
PKCS #12 |
|
P2P |
PEER 2 PEER |
|
PaaS |
PLATFORM AS A SERVICE |
|
PAC |
PROXY AUTO CONFIGURATION |
|
PAM |
PRIVILEGED ACCESS MGMT |
|
PAM |
PLUGGABLE AUTHENTICATION MODULES |
|
PAP |
PASSWORD AUTHENTICATION PROTOCOL |
|
PAT |
PORT ADDRESS TRANSLATION |
|
PBKDF2 |
PW BASED KEY DERIVATION FUNCTION 2 |
|
PBX |
PRIVATE BRANCH EXCHANGE |
|
PCAP |
PACKET CAPTURE |
|
PCI DSS |
PAYMENT CARD INDUSTRY DATA SECURITY STANDARD |
|
PDU |
POWER DISTRIBUTION UNIT |
|
PEAP |
PROTECTED EXTENSIBLE AUTH PROTOCOL |
|
PED |
PERSONAL ELECTRONIC DEVICE |
|
PEM |
PRIVACY ENHANCED MAIL |
|
PFS |
PERFECT FOWARD SECRECY |
|
PFX |
PERSONAL INFO EXCHANGE |
|
PGP |
PRETTY GOOD PRIVACY |
|
PHI |
PERSONAL HEALTH INFO |
|
PII |
PERSONALLY INDETIFIABLE INFO |
|
PIV |
PERSONAL IDENTITY VERIFICATION |
|
PKCS |
PUBLIC KEY CRYPTOGRAPGHY STANDARDS |
|
PKI |
PUBLIC KEY INFRASTUCTURE |
|
POP |
POST OFFICE PROTOCOL |
|
POTS |
PLAIN OLD TELEPHONE SERVIVE |
|
PPP |
POINT-TO-POINT PROTOCOL |
|
PPTP |
POINT-TO-POINT TUNNELING PROTOCOL |
|
PSK |
PRE-SHARED KEY |
|
PTZ |
PAN-TILT ZOOM |
|
QA |
QUALITY ASSURANCE |
|
QoS |
QUALITY OF SERVICE |
|
PUP |
POTENTIALLY UNWANTED PROGRAM |
|
RA |
RECOVERY AGENT |
|
RA |
REGISTRATION AUTHORITY |
|
RACE |
RESEARCH AND DEVELOPMENT IN ADVACNED COMMUNICATIONS TECHNOLOGIES IN EUROPE |
|
RAD |
RAPID APP DEVELOPMENT |
|
RADIUS |
REMOTE AUTH DIAL IN USER SERVICE |
|
RAID |
REDUNDANT ARRAY OF INEXPESIVE DISKS |
|
RAM |
RANDOM ACCESS MEMORY |
|
RAS |
REMOTE ACCESS SERVER |
|
RAT |
REMOTE ACCESS TROJAN |
|
RC4 |
RIVEST CIPHER VERSION 4 |
|
RCS |
RICH COMMUNICATION SERVICES |
|
RFC |
REQUEST FOR COMMENTS |
|
RFID |
RADIOFREQUENCY IDENTIFIER |
|
RIPEMD |
RACE INTEGRITY PRIMITIVES EVALUATIONMESSAGE DIGEST |
|
ROI |
RETURN ON INVESTMENT |
|
RPO |
RECOVERY POINT OBJECTIVE |
|
RSA |
RIVEST, SHAMIR, & ADLEMAN |
|
RTBH |
REMOTE TRIGGERED BLACK HOLE |
|
RTO |
RECOVERY TIME OBJECTIVE |
|
RTOS |
REAL TIME OPERATING SYSTEM |
|
RTP |
REAL TIME TRANSPORT PROTOCOL |
|
S/MIME |
SEURE/MULTIPURPOSE INTERNET MAIL EXTENSIONS |
|
SaaS |
SOFTWARE AS A SERVICE |
|
SAE |
SIMULTANEOUS AUTH OF EQUALS |
|
SAML |
SECURITY ASSERTIONS MARKUP LANGUAGE |
|
SAN |
STORAGE AREA NETWORK |
|
SAN |
SUBJECT ALTERNATIVE NAME |
|
SCADA |
SYSTEM CONTROL & DATA AQUISITION |
|
SCAP |
SECURITY CONTENT AUTH PROTOCOL |
|
SCEP |
SIMPLE CERTIFICATE ENROLLMENT PROTOCOL |
|
SDK |
SOFTWARE DEVELOPMENT KIT |
|
SDLC |
SOFTWARE DEVELOPMENT LIFE CYCLE |
|
SDLM |
SOFTWARE DEVELOPMENT LIFE CYCLE METHODOLOGY |
|
SDN |
SOFTWARE DEFINED NETWORKING |
|
SDV |
SOFTWARE DEFINED VISIBILITY |
|
SED |
SELF-ENCRYPTING DRIVES |
|
SEH |
STRUCTURED EXCEPTION HANDLER |
|
SFTP |
SECURED FILE TRANSFER PROTOCOL |
|
SHA |
SECURE HASHING ALGORITHM |
|
SHTTP |
SECURE HYPERTEXT TRANSFER PROTOCOL |
|
SIEM |
SECURITY INFO & EVENT MGMT |
|
SIM |
SUBSCRIBER IDENTIFIER MODULE |
|
SIP |
SESSION INITIATION PROTOCOL |
|
SLA |
SERVICE LEVEL AGREEMENT |
|
SLE |
SINGLE LOSS EXPECTANCY |
|
S/MIME |
SECURITY/MULTIPURPOSE INTERNET MAIL EXCHANGER |
|
SMS |
SHORT MESSAGE SERVICE |
|
SMTP |
SIMPLE MAIL TRANSFER PROTOCOL |
|
SMTPS |
SIMPLE MAIL TRANSFER PROTOCOL SECURE |
|
SNMP |
SIMPLE NETWORK MGMT PROTOCOL |
|
SOAP |
SIMPLE OBJECT ACCESS PROTOCOL |
|
SOAR |
SECURITY ORCHESTRATION , AUTOMATION, RESPONSE |
|
SoC |
SYSTEM ON CHIP |
|
SOC |
SECURITY OPERATIONS CENTER |
|
SPF |
SENDER PRIVACY FRAMEWORK |
|
SPIM |
SPAM OVER INTERNET MESSAGING |
|
SQL |
STRUCTURED QUERY LANGUAGE |
|
SQLi |
SQL INJECTION |
|
SRTP |
SECURE REAL TIME PROTOCOL |
|
SSD |
SOLID STATE DRIVE |
|
SSH |
SECURE SHELL |
|
SSL |
SECURE SOCKETS LAYER |
|
SSO |
SINGLE SIGN ON |
|
STIX |
STRUCTURED THEAT INFO EXCHANGE |
|
STP |
SHIELDED TWISTED PAIR |
|
SWG |
SECURE WEB GATEWAY |
|
TACACS+ |
TERMINAL ACCESS CONTROLLER ACCESS CONTROL SYSTEM |
|
TAXII |
TRUSTED AUTOMATED EXCHANGE OF INDICATOR INFO |
|
TCP/IP |
TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL |
|
TGT |
TICKET GRANTING SYSTEM |
|
TKIP |
TEMPORAL KEY INTEGRITY PROTOCOL |
|
TLS |
TRANSPORT LAYER SECURITY |
|
TOTP |
TIME BASED ONE TIME PW |
|
TPM |
TRUSTED PLATFORM MODULE |
|
TSIG |
TRANSACTION SIGNATURE |
|
TTP |
TACTICS, TECHNIQUES & PROCEDURES |
|
UAT |
USER ACCEPTANCE TESTING |
|
UAV |
UNMANNED AERIAL VEHICLE |
|
UDP |
USER DATAGRAM PROTOCOL |
|
UEFI |
UNIFIED EXTENSIBLE FIRMWARE INTERFACE |
|
UEM |
UNIFIED ENDPOINT MGMT |
|
UPS |
UNINTERRUPTABLE POWER SUPPLY |
|
URI |
UNIFORM RESOURCE IDENTIFIER |
|
URL |
UNIVERSAL RESOURCE LOCATOR |
|
USB |
UNIVERSAL SERIAL BUS |
|
USB OTG |
USB ON THE GO |
|
UTM |
UNIFIED THREAT MGMT |
|
UTP |
UNSHIELDED TWISTED PAIR |
|
VBA |
VISUAL BASIC |
|
VDE |
VIRTUAL DESKTOP ENVIRONMENT |
|
VDI |
VIRTUAL DESKTOP INFRASTRUCTURE |
|
VLAN |
VIRTUAL LOCAL AREA NETWORK |
|
VLSM |
VARIABLE LENGTH SUBNET MASKING |
|
VM |
VIRTUAL MACHINE |
|
VoIP |
VOICE OVER IP |
|
VPC |
VIRTUAL PRIVATE CLOUD |
|
VPN |
VIRTUAL PRIVATE NETWORK |
|
VTC |
VIDEO TELECONFERENCING |
|
WAF |
WEB APP FIREWALL |
|
WAP |
WIRELESS ACCES POINT |
|
WEP |
WIRED EQUIVALENT PRIVACY |
|
WIDS |
WIRELESS INTRUSION DETECTION SYSTEM |
|
WIPS |
WIRELESS INTRUSION PREVENTION SYSTEM |
|
WORM |
WRITE ONCE READ MANY |
|
WPA |
WIFI PROTECTED ACCESS |
|
WPS |
WIFI PROTECTED SETUP |
|
WTLS |
WIRELESS TLS |
|
XaaS |
ANYTHING AS A SERVICE |
|
XML |
EXTENSIBLE MARKUP LANGUAGE |
|
XOR |
EXCLUSIVE OR |
|
XSFR |
CROSS SITE REQUEST FORGERY |
|
XSS |
CROSS SITE SCRIPTING |