Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
146 Cards in this Set
- Front
- Back
ARO |
Annualized Rate of Occurance |
|
SLE |
Single Loss Expectancy |
|
ALE |
Annual Loss Expectancy |
|
RAT |
Remote Access Trojan |
|
AAA |
Authentication, Authorization, and Accounting |
|
ABAC |
Attribute-based access control |
|
ACL |
Access Control List |
|
AES |
Advanced Encryption Standard |
|
AH |
Authentication Header |
|
APT |
Advanced persistent threat |
|
BPA |
Business Partners Agreement |
|
BYOD |
Bring your own device |
|
CA |
Certificate Authority |
|
CAC |
Common Access Card |
|
CBC |
Cipher Block Chaining |
|
CCMP |
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol |
|
CER |
Canonical Encoding Rules |
|
CHAP |
Challenge Handshake Authentication Protocol |
|
COPE |
Corporate-owned, personally enabled |
|
CRL |
Certificate revocation list |
|
CSR |
Certificate signing request |
|
CTM |
Counter mode |
|
CYOD |
Choose your own device |
|
DAC |
Discretionary access control |
|
DDoS |
Distributed denial-of-service |
|
DER |
Distinguished Encoding Rules |
|
DES |
Data Encryption Standard |
|
DH |
Diffie-Hellman |
|
DLP |
Data loss prevention |
|
DMZ |
Demilitarized zone |
|
DNS |
Domain Name System |
|
DNSSEC |
Domain Name System Security Extensions |
|
DSA |
Digital signature algorithm |
|
EAP |
Extensible Authentication Protocol |
|
EAP-FAST |
EAP-Flexible Authentication via Secure Tunneling |
|
EAP-TLS |
Extensible Authentication Protocol-Transport Layer Security |
|
EAP-TTLS |
Extensible Authentication Protocol-Tunneled Transport Layer Security |
|
ECB |
Electronic Codebook |
|
EMI |
Electromagnetic interference |
|
EMP |
Electromagnetic pulse |
|
ESP |
Encapsulating Security Payload |
|
FAR |
False acceptance rate |
|
FDE |
Full disk encryption |
|
FRR |
False rejection rate |
|
FTPS |
File Transfer Protocol Secure |
|
GCM |
Galois/Counter Mode |
|
GPO |
Group Policy Object |
|
GPS |
Global Positioning System |
|
HIDS |
Host-based intrusion detection system |
|
HMAC |
Hash-based Message Authentication Code |
|
HOTP |
HMAC-based One-time Password |
|
HSM |
Hardware security module |
|
HTTPS |
Hypertext Transfer Protocol Secure |
|
HVAC |
Heating, ventilation, and air conditioning |
|
IaaS |
Infrastructure as a Service |
|
ICS |
Industrial control system |
|
IMAP4 |
Internet Message Access Protocol v4. |
|
IRP |
Incident response plan |
|
IoT |
Internet of things |
|
IPsec |
Internet Protocol security |
|
ISA |
Interconnection security agreement |
|
IV |
Initialization vector |
|
KDC |
Key Distribution Center |
|
LDAP |
Lightweight Directory Access Protocol |
|
LDAPS |
Lightweight Directory Access Protocol Secure |
|
MAC |
Mandatory Access Control or Media Access Control |
|
MD5 |
Message Digest 5 |
|
MDM |
Mobile Device Management |
|
MFD |
Muli-function device |
|
MMS |
Multimedia Messaging Service |
|
MOU |
Memorandum of understanding |
|
MOA |
Memorandum of agreement |
|
MS-CHAPv2 |
Microsoft Challenge Handshake Authentication Protocol version 2 |
|
MTBF |
Mean time between failures |
|
MTTR |
Mean time to recover |
|
NAC |
Network access control |
|
NAT |
Network Address Translation |
|
NDA |
Non-disclosure agreement |
|
NFC |
Near field communication |
|
NIDS |
Network-based intrusion detection system |
|
NIPS |
Network-based intrusion protection system |
|
NIST |
National Institute of Standards and Technology |
|
NTLM |
New Technology LAN Manager |
|
OCSP |
Online Certificate Status Protocol |
|
PaaS |
Platform as a Service |
|
PAP |
Password Authentication Protocol |
|
PBKDF2 |
Password-based Key Derivation Function 2 |
|
PEAP |
Protected Extensible Authentication Protocol |
|
PEM |
Privacy Enhanced Mail |
|
PFX |
Personal Information Exchange |
|
PHI |
Personal Health Information |
|
PII |
Personally Identifiable Information |
|
PIV |
Personal Identity Verification card. |
|
POP3 |
Post Office Protocol version 3 |
|
PSK |
Pre-shared key |
|
PKI |
Public Key Infrastructure |
|
RADIUS |
Remote Authentication Dial-In User Service |
|
RAID |
Redundant array of inexpensive disks |
|
RAT |
Remote access Trojan |
|
RC4 |
Rivest Cipher 4 |
|
RFID |
Radio-frequency identification |
|
RIPEMD |
RACE Integrity Primitives Evaluation Message Digest |
|
RPO |
Recovery Point Objective |
|
RSA |
Rivest,Shamir, and Adleman (asymmetric encryption algorithm) |
|
RSTP |
Rapid Spanning Tree Protocol |
|
RTO |
Recovery time objective |
|
RTOS |
Real-time operating system |
|
rule-BAC |
Rule-based access control |
|
SaaS |
Software as a Service |
|
SAML |
Security Assertion Markup Language |
|
SATCOM |
Satellite Communications |
|
SCADA |
Supervisory control and data acquisition |
|
SDN |
Software defined network |
|
SED |
Self-encrypting drive |
|
SFTP |
Secure File Transfer Protocol |
|
SHA |
Secure Hash Algorithm |
|
SIEM |
Security information and event management |
|
SLA |
Service level agreement |
|
SLE |
Single loss expectancy |
|
S/MIME |
Secure/Multipurpose Internet Mail Extensions |
|
SMS |
Short Message Service |
|
SNMP |
Simple Network Management Protocol |
|
SoC |
System on a chip |
|
SRTP |
Secure Real-time Transport Protocol |
|
SSH |
Secure Shell |
|
SSID |
Service set identifier |
|
SSL |
Secure Sockets Layer |
|
SSO |
Single sign-on |
|
STP |
Spanning Tree Protocol |
|
TACACS+ |
Terminal Access Controller Access-Control System Plus |
|
TKIP |
Temporal Key Integrity Protocol |
|
TLS |
Transport Layer Security |
|
TOTP |
Time-based One-Time Password |
|
TPM |
Trusted Platform Module |
|
UAV |
Unmanned aerial vehicle |
|
UEFI |
Unified Extensible Firmware Interface |
|
USB OTG |
Universal Serial Bus On-the-Go |
|
UTM |
Unified threat management |
|
VDI |
Virtual desktop infrastructure |
|
VDE |
Virtual desktop environment |
|
VLAN |
Virtual Local Area Network |
|
VM |
Virtual machine |
|
VPN |
Virtual private network |
|
WPA |
Wifi protected access |
|
WPS |
Wifi protected setup |
|
XML |
Extensible Markup Language |