• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/146

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

146 Cards in this Set

  • Front
  • Back

ARO

Annualized Rate of Occurance

SLE

Single Loss Expectancy

ALE

Annual Loss Expectancy

RAT

Remote Access Trojan

AAA

Authentication, Authorization, and Accounting

ABAC

Attribute-based access control

ACL

Access Control List

AES

Advanced Encryption Standard

AH

Authentication Header

APT

Advanced persistent threat

BPA

Business Partners Agreement

BYOD

Bring your own device

CA

Certificate Authority

CAC

Common Access Card

CBC

Cipher Block Chaining

CCMP

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol

CER

Canonical Encoding Rules

CHAP

Challenge Handshake Authentication Protocol

COPE

Corporate-owned, personally enabled

CRL

Certificate revocation list

CSR

Certificate signing request

CTM

Counter mode

CYOD

Choose your own device

DAC

Discretionary access control

DDoS

Distributed denial-of-service

DER

Distinguished Encoding Rules

DES

Data Encryption Standard

DH

Diffie-Hellman

DLP

Data loss prevention

DMZ

Demilitarized zone

DNS

Domain Name System

DNSSEC

Domain Name System Security Extensions

DSA

Digital signature algorithm

EAP

Extensible Authentication Protocol

EAP-FAST

EAP-Flexible Authentication via Secure Tunneling

EAP-TLS

Extensible Authentication Protocol-Transport Layer Security

EAP-TTLS

Extensible Authentication Protocol-Tunneled Transport Layer Security

ECB

Electronic Codebook

EMI

Electromagnetic interference

EMP

Electromagnetic pulse

ESP

Encapsulating Security Payload

FAR

False acceptance rate

FDE

Full disk encryption

FRR

False rejection rate

FTPS

File Transfer Protocol Secure

GCM

Galois/Counter Mode

GPO

Group Policy Object

GPS

Global Positioning System

HIDS

Host-based intrusion detection system

HMAC

Hash-based Message Authentication Code

HOTP

HMAC-based One-time Password

HSM

Hardware security module

HTTPS

Hypertext Transfer Protocol Secure

HVAC

Heating, ventilation, and air conditioning

IaaS

Infrastructure as a Service

ICS

Industrial control system

IMAP4

Internet Message Access Protocol v4.

IRP

Incident response plan

IoT

Internet of things

IPsec

Internet Protocol security

ISA

Interconnection security agreement

IV

Initialization vector

KDC

Key Distribution Center

LDAP

Lightweight Directory Access Protocol

LDAPS

Lightweight Directory Access Protocol Secure

MAC

Mandatory Access Control


or


Media Access Control

MD5

Message Digest 5

MDM

Mobile Device Management

MFD

Muli-function device

MMS

Multimedia Messaging Service

MOU

Memorandum of understanding

MOA

Memorandum of agreement

MS-CHAPv2

Microsoft Challenge Handshake Authentication Protocol version 2

MTBF

Mean time between failures

MTTR

Mean time to recover

NAC

Network access control

NAT

Network Address Translation

NDA

Non-disclosure agreement

NFC

Near field communication

NIDS

Network-based intrusion detection system

NIPS

Network-based intrusion protection system

NIST

National Institute of Standards and Technology

NTLM

New Technology LAN Manager

OCSP

Online Certificate Status Protocol

PaaS

Platform as a Service

PAP

Password Authentication Protocol

PBKDF2

Password-based Key Derivation Function 2

PEAP

Protected Extensible Authentication Protocol

PEM

Privacy Enhanced Mail

PFX

Personal Information Exchange

PHI

Personal Health Information

PII

Personally Identifiable Information

PIV

Personal Identity Verification card.

POP3

Post Office Protocol version 3

PSK

Pre-shared key

PKI

Public Key Infrastructure

RADIUS

Remote Authentication Dial-In User Service

RAID

Redundant array of inexpensive disks

RAT

Remote access Trojan

RC4

Rivest Cipher 4

RFID

Radio-frequency identification

RIPEMD

RACE Integrity Primitives Evaluation Message Digest

RPO

Recovery Point Objective

RSA

Rivest,Shamir, and Adleman


(asymmetric encryption algorithm)

RSTP

Rapid Spanning Tree Protocol

RTO

Recovery time objective

RTOS

Real-time operating system

rule-BAC

Rule-based access control

SaaS

Software as a Service

SAML

Security Assertion Markup Language

SATCOM

Satellite Communications

SCADA

Supervisory control and data acquisition

SDN

Software defined network

SED

Self-encrypting drive

SFTP

Secure File Transfer Protocol

SHA

Secure Hash Algorithm

SIEM

Security information and event management

SLA

Service level agreement

SLE

Single loss expectancy

S/MIME

Secure/Multipurpose Internet Mail Extensions

SMS

Short Message Service

SNMP

Simple Network Management Protocol

SoC

System on a chip

SRTP

Secure Real-time Transport Protocol

SSH

Secure Shell

SSID

Service set identifier

SSL

Secure Sockets Layer

SSO

Single sign-on

STP

Spanning Tree Protocol

TACACS+

Terminal Access Controller Access-Control System Plus

TKIP

Temporal Key Integrity Protocol

TLS

Transport Layer Security

TOTP

Time-based One-Time Password

TPM

Trusted Platform Module

UAV

Unmanned aerial vehicle

UEFI

Unified Extensible Firmware Interface

USB OTG

Universal Serial Bus On-the-Go

UTM

Unified threat management

VDI

Virtual desktop infrastructure

VDE

Virtual desktop environment

VLAN

Virtual Local Area Network

VM

Virtual machine

VPN

Virtual private network

WPA

Wifi protected access

WPS

Wifi protected setup

XML

Extensible Markup Language