Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Acronym List

Security+ (SY0-601) Acronym List

AcrynimTermDefinition
AV Antivirus Software designed to detect, prevent, and remove malicious software (malware) from computer systems.
IoC Indicators of Compromise Observable artifacts or behaviors that suggest a security incident or potential breach
PCAP Packet Capture The process of intercepting and logging data traffic on a network for analysis and monitoring
PFS Perfect Forward Secrecy A cryptographic technique that ensures that a session key derived from long-term keys cannot be compromised if one of the keys is compromised in the future.
RAT Remote Access Trojan A type of malicious software that allows unauthorized access to a victims system over a network
SAN Storage Area Network A high-speed network that provides access to block-level data storage
SDV Software-defined Visibility The use of software to dynamically control and optimized the visibility and monitoring of network traffic
XSS Cross-site Scripting A security vulnerability that allows attackers to inject malicious scripts into webpages viewed by other users
ABAC Attribute-based Access Control Access control model that uses attribites to define and enforce access policies
ACL Access Control List A list of rules that specifies which users or system processes are granted access to objects, as well as what operations are allowed.
AH Authentication Header A protocol used to authenticate the sender and verify the integrity of the transmitted data in IPsec.
AI Artificial Intelligence The simulation of human intelligence in machines that are programmed to think and learn
AIS Automated Indicator Sharing The automated exchange of cyber threat indicators and defensive measures among organizations.
AP Access Point A device that allows wireless devices to connect to a wired network.
API Application Programming Interface A set of rules and tools for building software applications.
APT Advanced Persistent Threat A sophisticated and prolonged cyber attack in which an intruder gains unauthorized access to a network and remains undetected for an extended period.
ARP Address Resolution Protocol A protocol used to map IP addresses to MAC addresses in a local network.
BPDU Bridge Protocol Data Unit A data unit used in the IEEE 802.1D bridging standard to identify and manage network bridges.
BYOD Bring Your Own Device A policy that allows employees to use their personal devices for work purposes.
CA Certificate Authority An entity that issues digital certificates to validate the identity of individuals or organizations.
CCMP Counter-Mode/CBC-MAC Protocol A cryptographic protocol combining Counter Mode encryption and Cipher Block Chaining Message Authentication Code (CBC-MAC) for secure communication.
COPE Corporate-owned Personally Enabled A device ownership model where the organization owns the device, but employees are allowed personal use.
CRL Certificate Revocation List A list of digital certificates that have been revoked by the issuing Certificate Authority before their scheduled expiration date.
CSP Cloud Service Provider A company that offers cloud computing services, including infrastructure, platforms, or software over the internet.
CSR Certificate Signing Request A request sent to a Certificate Authority to apply for a digital certificate, typically containing the public key and other identification information.
CTM Counter-Mode A block cipher mode of operation used for encryption, providing parallelizable encryption and decryption.
CVE Common Vulnerabilities and Exposures A standardized list of common identifiers for publicly known cybersecurity vulnerabilities and exposures.
CVSS Common Vulnerability Scoring System A framework for scoring the severity of software vulnerabilities, providing a standardized measure of the impact and exploitability.
CYOD Choose Your Own Device An approach that allows employees to choose their preferred devices for work purposes.
DAC Discretionary Access Control An access control model where owners have control over access to their resources and can grant or revoke permissions.
DER Distinguished Encoding Rules A set of rules for encoding data structures that are independent of machine-specific encoding.
DHCP Dynamic Host Configuration Protocol
DLP Data Loss Prevention
DNS Domain Name System
EAP Extensible Authentication Protocol
EDR Endpoint Detection and Response
ESP Encapsulating Security Payload
FDE Full Disk Encryption
FPGA Field Programmable Gate Array
FTP File Transfer Protocol
HA High Availability
HIDS Host-based Intrusion Detection System
HIPS Host-based Intrusion Prevention System
HOTP HMAC-based One-time Password
HTTP Hypertext Transfer Protocol
HVAC Heating, Ventilation, Air Conditioning
IaaS Infrastructure as a Service
IdP Identity Provider
IDS Intrusion Detection System
IoT Internet of Things
IP Internet Protocol
IPS Intrusion Prevention System
IV Initialization Vector
L2TP Layer 2 Tunneling Protocol
LAN Local Area Network
LDAP Lightweight Directory Access Protocol
MAC Media Access Control
MAM Mobile Application Management
MDM Mobile Device Management
MFA Multifactor Authentication
MFP Multifunction Printer
MSP Managed Service Provider
MSSP Managed Security Service Provider
NAC Network Access Control
NAS Network-attached Storage
NAT Network Address Translation
NGFW Next-generation Firewall
NG-SWG Next-generation Secure Web Gateway
NIC Network Interface Card
NIDS Network-based Intrusion Detection System
NIPS Network-based Intrusion Prevention System
OCSP Online Certificate Status Protocol
OS Operating System
OSINT Open-source Intelligence
OT Operational Technology
OTA Over-The-Air
OTG On-The-Go
OWASP Open Web Application Security Project
PaaS Platform as a Service
PAP Password Authentication Protocol
PDU Power Distribution Unit
PEM Privacy Enhanced Mail
PKI Public Key Infrastructure
POP Post Office Protocol
PUP Potentially Unwanted Program
QA Quality Assurance
QoS Quality of Service
RA Registration Authority
RADIUS Remote Authentication Dial-in User Service
RCS Rich Communication Services
RFC Request for Comments
RTOS Real-time Operating System
S/MIME Secure/Multipurpose Internet Mail Extensions
S/MIME Secure/Multipurpose Internet Mail Extensions
SaaS Software as a Service
SAE Simultaneous Authentication of Equals
SAML Security Assertions Markup Language
SDK Software Development Kit
SFTP SSH File Transfer Protocol
SIEM Security Information and Event Management
SIM Subscriber Identity Module
SMS Short Message Service
SNMP Simple Network Management Protocol
SoC System on Chip
SQL Structured Query Language
SSL Secure Sockets Layer
SSO Single Sign-on
STIX Structured Threat Information eXpression
SWG Secure Web Gateway
TACACS+ Terminal Access Controller Access Control System
TLS Transport Layer Security
TPM Trusted Platform Module
TTP Tactics, Techniques, and Procedures
UEFI Unified Extensible Firmware Interface
UEM Unified Endpoint Management
UPS Uninterruptible Power Supply
URL Universal Resource Locator
USB Universal Serial Bus
UTM Unified Threat Management
VBA Visual Basic for Applications
VDI Virtual Desktop Infrastructure
VLAN Virtual Local Area Network
VM Virtual Machine
VoIP Voice over IP
VPC Virtual Private Cloud
WAF Web Application Firewall
WAP Wireless Access Point
WPA WiFi Protected Access
WPS WiFi Protected Setup
XaaS Anything as a Service
XML Extensible Markup Language
3DES Triple Data Encryption Standard
AAA Authentication, Authorization, and Accounting
AD Active Directory
AES Advanced Encryption Standard
AES256 Advanced Encryption Standards 256bit
ALE Annualized Loss Expectancy
ARO Annualized Rate of Occurrence
ASLR Address Space Layout Randomization
ASP Active Server Pages
ATT&CK Adversarial Tactics, Techniques, and Common Knowledge
AUP Acceptable Use Policy
BASH Bourne Again Shell
BCP Business Continuity Planning
BGP Border Gateway Protocol
BIA Business Impact Analysis
BIOS Basic Input/Output System
BPA Business Partnership Agreement
BSSID Basic Service Set Identifier
CAPTCHA Completely Automated Public Turing Test to Tell Computers and Humans Apart
CAR Corrective Action Report
CASB Cloud Access Security Broker
CBC Cipher Block Chaining
CBT Computer-based Training
CCTV Closed-Circuit Television
CERT Computer Emergency Response Team
CFB Cipher Feedback
CHAP Challenge-Handshake Authentication Protocol
CI/CD Continuous Integration/Continuous Delivery
CIO Chief Information Officer
CIRT Computer Incident Response Team
CIS Center for Internet Security
CMDB Configuration Management Database
CMS Content Management System
CN Common Name
COOP Continuity of Operations Planning
CP Contingency Planning
CPU Central Processing Unit
CRC Cyclic Redundancy Check
CSA Cloud Security Alliance
CSIRT Computer Security Incident Response Team
CSO Chief Security Officer
CSRF Cross-Site Request Forgery
CSU Channel Service Unit
CTO Chief Technology Officer
DBA Database Administrator
DDoS Distributed Denial-of-Service
DEP Data Execution Prevention
DES Data Encryption Standard
DHE Diffie-Hellman Ephemeral
DKIM Domain Keys Identified Mail
DLL Dynamic-link Library
DMARC Domain Message Authentication
DNAT Destination Network Address Translation
DNSSEC Domain Name System Security Extensions
DoS Denial-of-Service
DPO Data Protection Officer
DRP Disaster Recovery Plan
DSA Digital Signature Algorithm
DSL Digital Subscriber Line
ECB Electronic Code Book
ECC Elliptic-curve Cryptography
ECDHE Elliptic-curve Diffie-Hellman Ephemeral
ECDSA Elliptic-curve Digital Signature Algorithm
EFS Encrypted File System
EIP Extended Instruction Pointer
EOL End of Life
EOS End of Service
ERP Enterprise Resource Planning
ESN Electronic Serial Number
ESSID Extended Service Set Identifier
FACL File System Access Control List
FIM File Integrity Monitoring
FRR FALSE Rejection Rate
FTPS Secured File Transfer Protocol
GCM Galois/Counter Mode
GDPR General Data Protection Regulation
GPG GNU Privacy Guard
GPO Group Policy Object
GPS Global Positioning System
GPU Graphics Processing Unit
GRE Generic Routing Encapsulation
HDD Hard Disk Drive
HMAC Hash-based Message Authentication Code
HSM Hardware Security Module
HSMaaS Hardware Security Module as a Service
HTML Hypertext Markup Language
HTTPS Hypertext Transfer Protocol Secure
IAM Identity and Access Management
ICMP Internet Control Message Protocol
ICS Industrial Control Systems
IDEA International Data Encryption Algorithm
IDF Intermediate Distribution Frame
IEEE Institute of Electrical and Electronics Engineers
IKE Internet Key Exchange
IM Instant Messaging
IMAP4 Internet Message Access Protocol v4
IPSec Internet Protocol Security
IR Incident Response
IRC Internet Relay Chat
IRP Incident Response Plan
ISA Interconnection Security Agreement
ISFW Internal Segmentation Firewall
ISO International Organization for Standardization
ISP Internet Service Provider
ISSO Information Systems Security Officer
ITCP IT Contingency Plan
JSON JavaScript Object Notation
KDC Key Distribution Center
KEK Key Encryption Key
LEAP Lightweight Extensible Authentication Protocol
MaaS Monitoring as a Service
MAN Metropolitan Area Network
MBR Master Boot Record
MD5 Message Digest 5
MDF Main Distribution Frame
MFD Multifunction Device
ML Machine Learning
MMS Multimedia Message Service
MOA Memorandum of Agreement
MOU Memorandum of Understanding
MPLS Multiprotocol Label Switching
MSA Measurement Systems Analysis
MS-CHAP Microsoft Challenge-Handshake Authentication Protocol
MTBF Mean Time Between Failures
MTTF Mean Time to Failure
MTTR Mean Time to Repair
MTU Maximum Transmission Unit
NDA Non-disclosure Agreement
NFC Near-field Communication
NFV Network Function Virtualization
NIST National Institute of Standards & Technology
NOC Network Operations Center
NTFS New Technology File System
NTLM New Technology LAN Manager
NTP Network Time Protocol
NTPSec Network Time Protocol Secure
OID Object Identifier
OSI Open Systems Interconnection
OSPF Open Shortest Path First
OVAL Open Vulnerability and Assessment Language
P12 PKCS #12
P2P Peer-to-Peer
PAC Proxy Auto Configuration
PAM Pluggable Authentication Modules
PAM Privileged Access Management
PAT Port Address Translation
PBKDF2 Password-based Key Derivation Function 2
PBX Private Branch Exchange
PCI DSS Payment Card Industry Data Security Standard
PE Portable Executable
PEAP Protected Extensible Authentication Protocol
PED Portable Electronic Device
PGP Pretty Good Privacy
PHI Personal Health Information
PII Personally Identifiable Information
PIN Personal Identification Number
PIV Personal Identity Verification
PKCS Public Key Cryptography Standards
PoC Proof of Concept
POTS Plain Old Telephone Service
PPP Point-to-Point Protocol
PPTP Point-to-Point Tunneling Protocol
PSK Preshared Key
PTZ Pan-Tilt-Zoom
RAD Rapid Application Development
RAID Redundant Array of Independent (or Inexpensive) Disks
RAM Random Access Memory
RAS Remote Access Server
RC4 Rivest Cipher version 4
RDP Remote Desktop Protocol
Reporting and Conformance
RFI Remote File Inclusion
RFID Radio Frequency Identification
RIPEMD RACE Integrity Primitives Evaluation Message Digest
ROI Return on Investment
RPO Recovery Point Objective
RSA Rivest, Shamir, & Adleman
RTBH Remotely Triggered Black Hole
RTO Recovery Time Objective
RTP Real-time Transport Protocol
SCADA Supervisory Control and Data Acquisition
SCAP Security Content Automation Protocol
SCEP Simple Certificate Enrollment Protocol
SDLC Software Development Life Cycle
SDLM Software Development Life-cycle Methodology
SDN Software-defined Networking
SDP Service Delivery Platform
SED Self-Encrypting Drives
SEH Structured Exception Handling
SHA Secure Hashing Algorithm
SIP Session Initiation Protocol
SLA Service-level Agreement
SLE Single Loss Expectancy
SMB Server Message Block
SMTP Simple Mail Transfer Protocol
SMTPS Simple Mail Transfer Protocol Secure
SOAP Simple Object Access Protocol
SOAR Security Orchestration, Automation, Response
SOC Security Operations Center
SOX Sarbanes Oxley Act
SPF Sender Policy Framework
SPIM Spam over Instant Messaging
SQLi SQL Injection
SRTP Secure Real-time Transport Protocol
SSD Solid State Drive
SSH Secure Shell
SSID Service Set Identifier
SSRF Server-side Request Forgery
STP Shielded Twisted Pair
TAXII Trusted Automated eXchange of Intelligence Information
TCP Transmission Control Protocol
TCP/IP Transmission Control Protocol/Internet Protocol
TGT Ticket Granting Ticket
TKIP Temporal Key Integrity Protocol
TOTP Time-based One Time Password
TSIG Transaction Signature
UAT User Acceptance Testing
UDP User Datagram Protocol
UEBA User and Entity Behavior Analytics
URI Uniform Resource Identifier
USB OTG USB On-The-Go
UTP Unshielded Twisted Pair
VDE Virtual Desktop Environment
VLSM Variable-length Subnet Masking
VPN Virtual Private Network
VTC Video Teleconferencing
WEP Wired Equivalent Privacy
WIDS Wireless Intrusion Detection System
WIPS Wireless Intrusion Prevention System
WLAN Wireless Local Area Network
WORM Write Once Read Many
XOR Exclusive OR
XSRF Cross-site Request Forgery
Created by: missviris
Popular Science sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards