Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
343 Cards in this Set
- Front
- Back
- 3rd side (hint)
IT |
Information Technology |
|
|
NAT |
Network Address Translation |
|
|
Infosec |
Information Systems Security |
|
|
APT |
Advanced Persistent Threat A cyber attack that continuously uses advanced techniques to conduct cyber epionage or crime |
|
|
AV |
Antivirus |
|
|
CERT (team) |
Computer Emergency Response Team |
|
|
CIRT |
Computer Incident Response Team |
|
|
CIS |
Center For Internet Security |
Place |
|
CISA |
Certified Information Systems Auditor |
Certification |
|
CISM |
Certified Information Systems Manager |
Certification |
|
CISO |
Chief Information Security Officer |
Job title |
|
CISSP |
Certified Information Systems Security Professional |
Certification |
|
COBIT |
Control OBjectives for Information & related Technologies COBIT is a framework created by ISACA for information technology management and IT governance. |
Framework |
|
CSA |
Cloud Security Alliance |
Cloud |
|
CSO |
Chief Security Officer |
Job title |
|
DDoS |
Distributed Denial Of Service A DDoS attack floods a targeted server, service or network with malicious traffic or data from multiple sources (often botnets), in order to attempt to disrupt normal traffic and availability of service |
|
|
DLP |
Data Loss Prevention |
|
|
DNS |
Domain Name System |
|
|
DoS |
Denial Of Service A DoS attack floods a targeted server, service or network with malicious traffic or data from multiple sources, (often botnets), in order to attempt to disrupt normal traffic and availability of service |
|
|
EDR |
Endpoint Detection & Response Endpoint detection and response, also known as endpoint threat detection and response, is a cyber technology that continually monitors and responds to mitigate cyber threats. |
Cybersecurity 101 |
|
GRC |
Governance, Risk Management & Compliance |
Cybersecurity 101 |
|
HTTPS |
Secure Hypertext Transfer Protocol |
|
|
IA |
Information Assurance |
|
|
IAM |
Identity & Access Management |
|
|
IDS/IDP |
Intrusion Detection Systems / Intrusion Detection & Prevention |
|
|
ISACA |
Information Systems Audit and Control Association |
Organization |
|
(ISC)2 |
International Information Systems Security Certification Consortium |
An organization |
|
ISO |
International Organization for Standardization |
Organization |
|
ISSA |
Information Systems Security Association |
This is an organization |
|
ISSO |
Information Systems Security Officer |
Job title |
|
ISSPM |
Information Systems Security Program Manager |
Job title |
|
MSSP |
Managed Security Services Provider |
|
|
NCSA |
National Cyber Security Alliance |
Organization |
|
OPSEC |
Operational Security |
|
|
OSINT |
Open Source Intelligence |
Cybersecurity 101 |
|
SIEM |
Security Information and Event Management |
|
|
SOC |
Security Operations Center |
|
|
TTP |
Tactics Techniques and Procedures |
|
|
VPN |
Virtual Private Network |
|
|
AD |
Active Directory |
|
|
ESI |
Electronically Stored Information |
Legal Cybersecurity 101 |
|
IIS |
Internet Information System |
|
|
MDM |
Mobile Device Management |
|
|
NSA |
National Security Agency |
|
|
PCI |
Payment Card Industry |
|
|
PenTest |
Penetration Test(er) |
|
|
RMF |
Risk Management Framework |
Cybersecurity 101 / Framework |
|
SOX |
Sarbanes - Oxley Act |
|
|
SSL |
Secure Socket Layer |
|
|
SSO |
Single Sign- On |
Security / Authentication |
|
BIOS |
Basic Input Output System |
|
|
PSS |
Physical Security Systems |
Security |
|
AP |
Access Point |
|
|
WAP |
Wireless Access Point |
|
|
ACL |
Access Control List |
|
|
AES |
Advanced Encryption Standard |
|
|
ASP |
Application Service Provider An application service provider is a business providing computer-based services to customers over a network; such as access to a particular software application using a standard protocol. |
App |
|
ASCII |
American Standard Code for Information Interchange |
Code |
|
BCM or BCP |
Business Continuity Management or Business Continuity Plan |
|
|
Bluesnarfing |
Bluetooth Snarfing An attack on a Bluetooth-enabled device that allows download of all contact details, along with other information, without leaving any trace of the attack. |
|
|
B2B |
Business 2 Business |
|
|
P2P |
Peer 2 Peer |
|
|
CEH |
Certified Ethical Hacker |
|
|
CHAP |
Challenge Handshake Authentication Protocol |
Protocol |
|
CIS |
Center for Internet Security |
Place |
|
CISMP |
Certificate in Information Systems Management Principles |
|
|
CISSP |
Certificate for Information System Security Professional |
Certification |
|
CC |
Common Criteria |
Cybersecurity 101 |
|
CPU |
Central Processing Unit |
|
|
CVE |
Common Vulnerabilities and Exposures |
Vulnerabilities and exploits |
|
DES |
Data Encryption Standard |
Encryption |
|
DPO |
Data Protection Officer |
Job title |
|
DRM |
Digital Rights Management |
Legal |
|
FTP |
File Transfer Protocol |
|
|
GUI |
Graphical User Interface |
|
|
CLI |
Command Line Interface |
|
|
HTML |
Hypertext Markup Language |
|
|
HTTP |
Hypertext Transfer Protocol |
|
|
IM |
Instant Message |
|
|
DM |
Direct Message |
|
|
IPSec |
Internet Protocol Security |
|
|
ISP |
Internet Service Provider |
|
|
ISO |
International Organization for Standardization |
Organization |
|
ISSAP |
Information Systems Security Architecture Professional |
Certification |
|
ISSEP |
InformationSystemsSecurity Engineering Professional |
|
|
ISSMP |
Information Systems Security Management Professional |
Certification |
|
LAN |
Local Area Network |
|
|
WAN |
Wide Area Network |
|
|
LFM |
Log File Monitor |
Monitoring Blue team |
|
L2TP |
Layer-2 Tunnelling Protocol |
|
|
MAC |
Media Access Control |
|
|
Mbps |
Megabits Per Second |
|
|
MitM |
Man In The Middle |
|
|
MIME |
Multipurpose Internet Extensions |
Protocol / |
|
MSO |
Multiple Sign- On |
Authentication |
|
NDA |
Non-Disclosure Agreement |
Legal / Business (administration) |
|
OS |
Operating System |
|
|
RAM |
Random Access Memory |
|
|
OWASP |
Open Web Application Security Project |
|
|
PAP |
Password Authentication Protocol |
Protocol / Authentication |
|
PDA |
Personal Digital Assistant |
|
|
|
Portable Document Format |
|
|
PIN |
Personal Identification Number |
|
|
PKI |
Public Key Infrastructure |
|
|
RADIUS |
Remote Authentication Dial- In User Service |
|
|
RAID |
Redundant Array of Inexpensive Disks |
|
|
RDC |
Remote Desktop Connection |
|
|
SANS |
SysAdmin Audit Network Security |
|
|
SEO |
Search Engine Optimization |
|
|
SET |
Secure Electronic Transaction Secure electronic transaction (SET) was an early communications protocol used by e-commerce websites to secure electronic debit and credit card payments. Secure electronic transaction was used to facilitate the secure transmission of consumer card information via electronic portals on the Internet |
Protocol (e-commerce) |
|
SLA |
Service Level Agreement |
|
|
SPIM |
Spam sent through Instant Messenger |
|
|
SOHO |
Small Office, Home Office |
|
|
SSCP |
Systems Security Certified Practitioner |
Certification |
|
SSID |
Service Set IDentifier |
|
|
TCP/IP |
Transmission Control Protocol / Internet Protocol |
|
|
TFA |
Two- Factor Authentication |
Cybersecurity 101 |
|
UPS |
Uninterruptible Power Supply |
|
|
URL |
Uniform Resource Locator |
|
|
USB |
Universal Serial Bus |
|
|
VoIP/VOB |
Voice Over Internet Protocol / Voice Over Broadband |
|
|
WEP |
Wired Equivalent Privacy IEEE's original 802.11 standard for wireless networking that was designed to tackle the vulnerabilities that come from data sharing radio waves. It had many flaws and shoukd NOT be relied on to provide adequate security |
|
|
WPA |
WiFi Protected Access A more secure version of 802.11 that uses TKIP (Temporal Key Integrity Protocol) |
|
|
WiFi |
Wireless Fidelity 802.11 : the family of standards for wireless LANs 802.11a : wireless standard operating at 5Ghz and running at up to 54 Mbps. 802.11b : operates at 2.4Ghz and up to 11 Mbps 802.11g : operating at 2.4Ghz but up to 54 Mbps 802.11i : wireless standard that uses AES, a more secure method of handling authentication. (New) 802.11n : 300 Mbps bandwidth; faster & greater range but costly. 802.11ac : improved bandwidth and backwards compatible but costly.
From semiconductorstore.com:
802.11In 1997, the Institute of Electrical and Electronics Engineers (IEEE) created the first WLAN standard. They called it 802.11 after the name of the group formed to oversee its development. Unfortunately, 802.11 only supported a maximum network bandwidth 2 Mbps, too slow for most applications.802.11bIEEE expanded on the original 802.11 standard in July 1999, creating the 802.11b specification. 802.11b supports bandwidth up to 11 Mbps, comparable to traditional Ethernet.802.11b uses the same unregulated radio signaling frequency (2.4 GHz) as the original 802.11 standard. Vendors often prefer using these frequencies to lower their production costs. Being unregulated, 802.11b devices can have interference from microwave ovens, cordless phones, and other appliances using the same 2.4 GHz range. However, by installing 802.11b devices an adequate distance from other appliances, interference can easily be avoided.Pros of 802.11b - lowest cost; signal range is good and not easily obstructedCons of 802.11b - slowest maximum speed; home appliances may interfere on the unregulated frequency band802.11aWhile 802.11b was in development, IEEE created a second extension to the original 802.11 standard called 802.11a. Because 802.11b gained in popularity much faster than did 802.11a, some folks believe that 802.11a was created after 802.11b. In fact, 802.11a was created at the same time. Due to its higher cost, 802.11a is usually found on business networks whereas 802.11b better serves the home market.802.11a supports bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz. This higher frequency compared to 802.11b shortens the range of 802.11a networks. An 802.11a access point transmitter may cover less than one-fourth the area of a comparable 802.11b/g unit. The higher frequency also means 802.11a signals have more difficulty penetrating walls and other obstructions.Because 802.11a and 802.11b utilize different frequencies, the two technologies are incompatible with each other. Some vendors offer hybrid 802.11a/b network gear, but these products merely implement the two standards side by side, as the connected devices must use either one or the other.Pros of 802.11a - fast maximum speed; regulated frequencies prevent signal interference from other devicesCons of 802.11a - highest cost; shorter range signal that is more easily obstructed802.11gIn 2002 and 2003, WLAN products supporting a newer standard called 802.11g emerged on the market. 802.11g attempts to combine the best of both 802.11a and 802.11b. 802.11g supports bandwidth up to 54 Mbps, and it uses the 2.4 GHz frequency for greater range. 802.11g is backwards compatible with 802.11b, meaning that 802.11g access points will work with 802.11b wireless network adapters and vice versa.Pros of 802.11g - fast maximum speed; signal range is good and not easily obstructedCons of 802.11g - costs more than 802.11b; appliances may interfere on the unregulated signal frequency802.11n802.11n (also sometimes known as "Wireless N") was designed to improve on 802.11g in the amount of bandwidth supported by utilizing multiple wireless signals and antennas (called MIMO technology) instead of one. Industry standards groups ratified 802.11n in 2009 with specifications providing for up to 300 Mbps of network bandwidth. 802.11n also offers somewhat better range over earlier Wi-Fi standards due to its increased signal intensity, and it is backward-compatible with 802.11b/g gear.Pros of 802.11n - fastest maximum speed and best signal range; more resistant to signal interference from outside sourcesCons of 802.11n - standard is not yet finalized; costs more than 802.11g; the use of multiple signals may greatly interfere with nearby 802.11b/g based networks802.11acThe newest generation of Wi-Fi signaling in popular use, 802.11ac utilizes dual band wireless technology, supporting simultaneous connections on both the 2.4 GHz and 5 GHz Wi-Fi bands. 802.11ac offers backward compatibility to 802.11b/g/n and bandwidth rated up to 1300 Mbps on the 5 GHz band plus up to 450 Mbps on 2.4 GHz.Pros of 802.11ac – offers improved bandwidth and more flexibility through simultaneous connection support; backwards compatibility allows use of existing technologiesCons of 802.11ac –dual bands mean increased cost; still prone to interference on the 2.4GHz frequency |
|
|
WLAN |
Wireless Local Area Network |
|
|
WiMax |
Wi-Fi Max - The next generation of wireless technology, with wireless ranges of up to 10 miles and broadband speeds. |
|
|
MFA |
Multi Factor Authentication |
|
|
PII |
Personally Identifiable Information |
|
|
OS |
Operating System |
|
|
RAT |
Remote Access Trojan |
|
|
IoT |
Internet of Things |
|
|
C&C or C2 |
Command & Control |
|
|
CEO |
Chief Executive Officer |
|
|
COO |
Chief Operations Officer |
Job title |
|
CISO or CSO |
Chief (Information) Security Officer / Chief Security Officer |
|
|
CIO |
Chief Information Officer |
|
|
CTO |
Chief Technology Officer |
Job title |
|
SCF |
Security Culture Framework |
|
|
AC |
Access Control |
|
|
AD |
Active Directory |
|
|
VPN |
Virtual Private Network |
|
|
BCP/DR |
Business Continuity Planning / Disaster Recovery |
Business (administration) |
|
API |
Application Programming Interface |
|
|
OSI Model |
Open System Interconnection Model |
|
|
OSI Model & Layers |
Open Systems Interconnection Model All = Application Layer (7) People = Presentation Layer (6) Seem = Session Layer (5) To = Transport Layer (4) Need = Network Layer (3) Data = Data Link Layer (2) Processing = Physical (1) |
|
|
PAP |
Password Authentication Protocol |
Protocol |
|
Cryptography PAIN model |
Privacy Authentication Integrity Non-repudiation |
|
|
IDS |
Intrusion Detection Systems |
|
|
NSM |
Network Security Monitoring |
|
|
ESM |
Enterprise Security Management Enterprise Security Management is the process of controlling configuration, deployment, and monitoring of security policy across multiple platforms and security point products. |
|
|
NIST |
National Institute of Standards and Technology |
|
|
Network TAP |
Test Access Port |
|
|
SPAN (port mirroring) |
Switched Port Analyzer |
|
|
IDS |
Intrusion Detection System |
|
|
IPS |
Intrusion Prevention System |
|
|
ACL |
Access Control List |
|
|
ANSI |
American National Standards Institute |
|
|
ASCII |
American Standard Code For Information Interchange |
|
|
ATM |
Asynchronous Transfer Mode |
|
|
DHCP |
Dynamic Host Configuration Protocol |
|
|
DNS |
Domain Name System |
|
|
FSB |
Front Side Bus |
|
|
FTP |
File Transfer Protocol |
|
|
GPU |
Graphics Processing Unit |
|
|
GUI |
Graphical User Interface |
|
|
CLI |
Command Line Interface |
|
|
GUID |
Globally Unique IDentifier |
|
|
HTTP |
Hyper Text Transfer Protocol |
|
|
HTTPS |
HyperText Transfer Protocol over SSL - OR - HyperTextTransferProtocol Secure |
|
|
I/O |
Input / Output |
|
|
ICANN |
Internet Corporation For Assigned Names And Numbers |
Organization |
|
ICF |
Internet Connection Firewall |
Network security |
|
ICMP |
Internet Control Message Protocol |
Protocol |
|
ICS |
Internet Connection Sharing |
|
|
IEEE |
Institute Of Electrical And Electronics Engineers |
Institute / Organization |
|
IMAP |
Internet Message Access Protocol |
|
|
IP |
Internet Protocol |
|
|
IPX |
Internetwork Packet eXchange |
|
|
IRC |
Internet Relay Chat |
|
|
ISA |
Industry Standard Architecture |
Used in industrial PCs |
|
ISO |
International Organization For Standardization |
|
|
IT |
Information Technology |
|
|
LAN |
Local Area Network |
|
|
WAN |
Wide Area Network |
|
|
LDAP |
Lightweight Directory Access Protocol |
|
|
MAC (ADDRESS) |
Media Access Control Address |
|
|
MANET |
Mobile Ad Hoc Network |
Networking |
|
MBPS |
Megabits Per Second |
|
|
KBPS |
KiloBits Per Second |
|
|
MCA |
Micro Channel Architecture |
Standards Cybersecurity 101 Architecture |
|
MIPS |
Million Instructions Per Second |
Cybersecurity 101 (Speed) |
|
NAT |
Network Address Translation |
|
|
NETBIOS |
Network Basic Input / Output System |
|
|
NIC |
Network Interface Card |
|
|
NNTP |
Network News Transfer Protocol |
|
|
NOC |
Network Operations Center |
|
|
NTFS |
New Technology File System |
|
|
P2P |
Peer To Peer |
|
|
POP3 |
Post Office Protocol 3 |
|
|
PPP |
Point To Point Protocol |
Protocol |
|
PPTP |
Point To Point Tunneling Protocol |
Protocol |
|
RAID |
Redundant Array Of Independent Disks |
|
|
RAM |
Random Access Memory |
|
|
ROM |
Read - Only Memory |
|
|
RDC |
Remote Desktop Connection (or Client) / Remote Data Collection |
|
|
RPC |
Remote Procedure Call |
|
|
SAN |
Storage Area Network |
|
|
SCSI |
Small Computer System Interface |
|
|
SMB |
Server Message Block |
|
|
SMTP |
Simple Transfer Protocol |
|
|
SNMP |
Simple Network Management Protocol |
Protocol |
|
SOA |
Service - Oriented Architecture |
|
|
SOL |
**** Out Of Luck (Joke card) |
|
|
SOAP |
Simple Object Access Protocol |
Protocol |
|
SSH |
Secure SHell |
|
|
SSID |
Service Set IDentifier |
|
|
SSL |
Secure Sockets Layer |
|
|
TCP/IP |
Transmission Control Protocol / Internet Protocol |
|
|
TTL (DNS) |
Time To Live |
|
|
UDP |
User Datagram Protocol |
|
|
UNC |
Universal Naming Convention In a network, the Universal Naming Convention (UNC) is a way to identify a shared file in a computer without having to specify (or know) the storage device it is on |
Cybersecurity 101 |
|
UPNP |
Universal Plug And Play |
|
|
UPS |
Uninterruptible Power Supply |
|
|
URI |
Uniform Resource Identifier |
|
|
URL |
Uniform Resource Locator |
|
|
VLE |
Virtual Learning Environment |
|
|
VOIP |
Voice Over Internet Protocol |
|
|
VPI |
Virtual Path Identifier |
|
|
VPN |
Virtual Private Network |
|
|
VPS |
Virtual Private Server |
A server |
|
WAIS |
Wide Area Information Server |
Servers |
|
WAN |
Wide Area Network |
|
|
WEP |
Wired Equivalent Privacy A security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN. |
|
|
WI-FI |
WIreless FIdelity |
|
|
WPA |
Wi-Fi Protected Access |
|
|
WWW |
World Wide Web |
|
|
XHMTL |
Extensible HyperText Markup Language |
|
|
XML |
Extensible Markup Language |
|
|
SIEM |
Security Information And Event Management |
|
|
IaaS |
Infrastructure as a Service |
|
|
PaaS |
Platform as a Service |
|
|
SaaS |
Software as a Service |
|
|
XaaS |
Anything asaService |
|
|
DBaaS |
Database as a Service |
|
|
CaaS |
Communication as a Service |
|
|
DaaS |
Desktop as a Service A DaaS platform allows you to use a fully functioning hosted desktop for any applications that you would normally be able to run on a typical desktop. They are easy to use and purchase and require no maintenance, IT, or dedicated cybersecurity to run. |
|
|
CI |
Continuous Integration |
Cybersecurity 101 |
|
CD |
Continuous Delivery |
|
|
ESM |
Enterprise Security Monitoring Enterprise Security Management is the process of controlling configuration, deployment, and monitoring of security policy across multiple platforms and security point products. |
|
|
RCE |
Remote Code Execution (vulnerability) |
Vulnerabilities and exploits |
|
CVE |
Common Vulnerabilities And Exposures |
|
|
SIEM |
Security Information and Event Management |
|
|
ISCM |
Information Security Continuous Monitoring |
Watching |
|
PCI Compliance |
Payment Card Industry Compliance
An information security standard for organizations that handle branded credit cards from the major card schemes mandated by (but not administered by) the Payment Industry Security Standards Council. |
E-commerce legal standards |
|
SACL |
System Access Control Lists |
|
|
RTO & RPO |
Recovery Time Objective & Recovery Point Objective |
|
|
BIA |
Business Impact Analysis |
Business administration |
|
MTBF |
Mean Time Between Failures |
|
|
BCP |
Business Continuity Plan |
|
|
CYOD |
Choose Your Own Device |
|
|
BYOD |
Bring Your Own Device |
|
|
USB OTG |
USB On The Go? The use of portable devices, such as a smartphone, as USB |
|
|
TKIP |
Temporal Key Integrity Protocol (Used with WPA) |
Security |
|
RAID |
Redundant Array of Inexpensive Disks |
|
|
MTTR |
Mean Time To Recover |
|
|
ACL |
Access Control List |
|
|
SRTP |
Secure Real-time Transport Protocol |
Protocol |
|
TLS |
Transport Layer Security |
Protocol |
|
SFTP |
Secure File Transfer Protocol |
|
|
SMTP |
Simple Mail Transfer Protocol |
|
|
NFC |
Near Field Communication |
|
|
XSRF |
Cross-site Request Forgery |
|
|
NAS |
Network Attached Storage |
|
|
NFS |
Network File System |
|
|
WEP |
Wired Equivalent Privacy |
|
|
RFI |
Radio Frequency Interference |
|
|
EMI |
Electromagnetic Interference |
|
|
API |
Application Programming Interface |
Software dev |
|
NTLM and LanMan |
New Technology LAN Manager |
|
|
DLP |
Data Loss Prevention |
|
|
HSM |
Hardware Security Module |
|
|
COPE |
Company- Owned, Personally Enabled |
|
|
SED |
Self-Encrypting Drive |
|
|
WPS |
Wi-Fi Protected Setup |
Wireless |
|
OWASP |
Open Web Application Security Project |
|
|
EFS |
Encrypting File System |
|
|
UTM |
Unified Threat Management |
|
|
SDK |
Software Development Kit |
Software dev |
|
API |
Application Programming Interface |
|
|
SSH |
Secure SHell |
|
|
UAC |
(Windows) User Account Control |
Windows |
|
NIDS |
Network(-based) Intrusion Detection System |
|
|
NIPS |
Network Intrusion Prevention System |
|
|
DLP |
Data Loss Prevention |
|
|
SCADA |
Supervisory Control And Data Acquisition |
Servers |
|
TPM |
Trusted Platform Module Trusted Platform Module is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. |
Cryptography |
|
ICS |
Industrial Control System |
Cybersecurity 101 |
|
RAT |
Remote Access Trojan or Remote Administration Tool |
|
|
APT |
Advanced Persistent Threat |
|
|
PKI |
Public Key Infrastructure |
Cryptography |
|
NoSQL |
Nonrelational SQL A NoSQL database provides a mechanism for storage and retrieval of data that is modeled in means other than the tabular relations used in relational databases. |
|
|
NPS |
Network Policy Server |
Server |
|
NAT |
Network Address Translation |
|
|
PBX |
Private Branch Exchange |
Phone system |
|
NAS |
Network Attached Storage |
|
|
TKIP |
Temporal Key Integrity Protocol |
|
|
RFC |
Request For Change |
Administration |
|
NIST Cybersecurity Framework |
National Institute of Standards and Technology |
|
|
SDLC |
Software Development Life Cycle |
|
|
TPM |
Trusted Platform Module |
|
|
AC, DAC, MAC, RBAC, ABAC |
Access Control: Discretionary Access Control (old) Mandatory Access Control (old) Role-Based Access Control (currently prevalent) Attribute-Based Access Control (recent model) |
|
|
TPM |
Trusted Platform Module Trusted Platform Module is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. |
Security Cryptography |
|
WPA2 with CCMP |
Wi-Fi Protected Access 2 with Counter Mode CBC-MAC Protocol (Counter Mode Cipher-block Chaining Message Authentication Code Protocol) |
Protocol |
|
QoS |
Quality of Service |
|
|
SED |
Self-Encrypting Drive |
Hardware / Security / Encryption |
|
HIDS |
Host Intrusion Detection System |
|
|
NIDS |
Network Intrusion Detection System |
|
|
MFD |
Multifunctioning Device |
|
|
VDE |
Virtual Desktop Environment |
|
|
EAP |
Extensible Authentication Protocol |
|
|
WPA-PSK |
Wi-Fi Protected Access - Pre-Shared Key |
|
|
WORM protection |
Write Once, Read Many protection A data storage device in which information, once written, cannot be modified. This write protection affords the assurance that the data cannot be tampered with once it is written to the device. |
Forensics - Chain of Evidence |
|
PDS |
Protected Distribution System |
|
|
APs |
Access Points |
|
|
TPM |
Trusted Platform Module Trusted Platform Module is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys |
Cryptography |
|
URL |
Uniform Resource Locator |
|
|
IRL |
Internet Resource Locator |
|
|
MTTR |
Mean Time To Recover |
|
|
MTBF |
Mean Time Between Failures |
|
|
RTO |
Recovery Time Object |
|
|
RPO |
Recovery Point Objective |
|
|
BCP |
Business Continuity Plan |
Business administration |
|
DLP |
Data Leakage Prevention Used to prevent sensitive corporate data from leaving the organization. |
|
|
EAP |
Extensible Authentication Protocol A connecting device network authentication framework supporting methods such as PKI certificates, smartcards, and passwords. |
|
|
CCMP |
Counter Mode with CBC- MAC (Message Authentication Code) Protocol
A WPA2 standard that uses an AES (Advanced Encryption Standard) block cipher with counter mode. Counter Mode makes pattern detection difficult, thus making this a strong protocol. |
Protocol (wireless) |
|
RADIUS |
Remote Authentication Dial In User Service |
|
|
EFS |
Encrypting File System Software that encrypts files |
|
|
HSM |
Hardware Security Module
A device that is designed to handle cryptographic duties, thus allowing servers to focus on other tasks. |
Security device |
|
TPM |
Trusted Platform Module
Used to encrypt/decrypt disk contents. Stores keys, certificates, and passwords used for disk encryption (in a chip). |
Security device |
|
PaaS |
Platform as a Service
Provides IT services over a network such as virtual servers, databases, and programming APIs. |
|
|
SaaS |
Software as a Service Enables productivity software to be rapidly provisioned over a network. |
|
|
IaaS |
Infrastructure as a Service Refers to network, storage, and backup services offered in the cloud. |
|
|
SecaaS (sometimes ka SaaS) |
Security as a Service Provides hosted and managed security solutions, such as malware screening, through a third party. |
|