click below
click below
Normal Size Small Size show me how
ACRONYMS
SEC+
Question | Answer |
---|---|
PAT | Port Address Translation An extension to NAT that permits multiple devices on a LAN to be mapped to a single public IP address. |
ISP | Internet Service Provider |
LAN | Local Area Network |
ACL | Access Control Lists |
NIPS | Network-based intrusion prevention system |
HIPS | Host-based intrusion prevention system |
HIDS | Host-based intrusion detection system |
IDS | Intrusion detection system |
IDPS | Intrusion detection and prevention systems |
CISO | Chief Information Security Officer |
DMZ | Demilitarized Zone |
CTO | Chief Technical Officer |
PSK | Pre-Shared Key |
ACK | Acknowledge |
SYN | Synchronize |
URI | Unifiorm Resource Identifier |
FDE | Full Disk Encryption |
FQDN | Fully Qualified Domain Name |
UTM | Unified Threat Management |
NGFW | Next Generation Firewall |
WAF | Web Application Firewall |
XSS | Cross-site scripting |
SEH | Structured Exception Handler |
UDP | User Datagram Protocol |
SSH | Secure Shell |
TFTP | Trivial File Transfer Protocol |
VLAN | Virtual local area network |
FTP | File Transfer Protocol |
VDI | Virtualization Desktop Infrastructure |
RADIUS | Remote Access Dial-In User Service |
CA | Certificate Authority |
PNAC | Port-based Network Access Control |
EAP | Extensible Authentication Protocol |
TACACS + | Terminal Access Controller Access-Control System Plus |
NAC | Network Access Control |
WEP | Wired Equivalent Privacy |
MaaS | Monitoring-as-a-Service |
SaaS | Software as a Service |
IaaS | Infrastructure as a Service |
PaaS | Platform as a Service |
XaaS | Anything-as-a-Service |
SFTP | Secure File Transfer Protocol |
SHTTP | Secure Hypertext Transfer Protocol |
SCP | Secure Copy |
SAN | Storage Area Network |
AUP | Acceptable use policies |
CSO | Chief Security Officer |
AV | Asset Value |
EF | Exposure Factor |
GPS | Global Positioning System |
TPM | Trusted Platform Module |
RPO | Recovery point objective |
MTTR | Mean Time To Recover |
MTBF | Mean time between failures |
MOU | Memorandum of Understanding |
ISA | Interconnection Security Agreement |
SLA | Service Level Agreement |
BPA | Business Partner Agreement |
EFS | Encrypting File System |
CEO | Chief Executive Officer |
DLP | Data Loss Prevention |
EMI | Electromagnetic Interference |
HSM | Hardware Security Module |
CRL | Certification Revocation List |
TPM | Trusted Platform Module |
OOV | Order of Volatility |
NTP | Network Time Protocol |
DDoS | Distributed Denial of Service |
CERT | Computer Emergency Response Team |
NIST | National Institute of Standards and Technology |
NSRL | National Software Reference Library |
RAM | Random Access Memory |
RAID | Redundant Array of Inexpensive Disks |
MD5 | Message Digest 5 |
PII | Personally Identifiable Information |
VTY | Virtual Terminal lines |
P2P | Peer-to-peer |
RTO | Recovery Time Objective |
RA | Recovery Agent |
RFID | Radio Frequency Identification |
ALE | Annualized Loss Expectancy |
SLE | Single Loss Expectancy |
ARO | Annualized Rate of Occurrence |
AV | Asset Value |
EF | Exposure Factor |
BIA | Business Impact Analysis |
DAC | Discretionary Access Control |
ROI | Return of/on Investment |
RPO | Recovery Point Objective |
HA | High Availability |
SHA | Secure Hash Algorithm |
HMAC | Hash-based Message Authentication Code |
ISSO | Information Systems Security Officer |
MD | Message Digest Algorithm |
PKI | Public Key Infrastructure |
RA | Registration Authority |
AP | Access Point |
API | Application Programming Interface |
ASP | Application Service Provider |
ARP | Address Resolution Protocol |
BAC | Business Availability Center |
BCP | Business Continuity Planning |
BIOS | Basic Input / Output System |
BYOD | Bring Your Own Device |
CAC | Common Access Card |
CAN | Controller Area Network |
CAPTCHA | Completely Automated Public Turing Test to Tell Computers and Humans Apart |
CAR | Corrective Action Report |
CCMP | Counter-Mode/CBC-Mac Protocol |
CCTV | Closed-Circuit Television |
CHAP | Challenge Handshake Authentication Protocol |
CIO | Chief Information Officer |
CIRT | Computer Incident Response Team |
COOP | Continuity of Operation Planning |
CP | Contingency Planning |
CRC | Cyclical Redundancy Check |
CSR | Control Status Register |
CSU | Channel service Unit |
DBA | Database Administrator |
DEP | Data Execution Prevention |
DES | Digital Encryption Standard |
DHCP | Dynamic Host Configuration Protocol |
DHE | Data Handling Electronics |
DHE | Diffie-Hellman Ephemeral |
DLL | Dynamic Link Library |
DNAT | Destination Network Address Transaction |
DNS | Domain Name Service (Server) |
DOS | Denial of Service |
DRP | Disaster Recovery Plan |
DSA | Digital Signature Algorithm |
DSL | Digital Subscriber Line |
DSU | Data Service Unit |
ECC | Elliptic Curve Cryptography |
ECDHE | Elliptic Curve Diffie-Hellman Ephemeral |
ESN | Electronic Serial Number |
ESP | Encapsulated Security Payload |
FACL | File System Access Control List |
FTPS | Secured File Transfer Protocol |
GPG | Gnu Privacy Guard |
GPO | Group Policy Object |
GPU | Graphic Processing Unit |
GRE | Generic Routing Encapsulation |
HDD | Hard Disk Drive |
HOTP | HMAC based One Time Password |
HTML | HyperText Markup Language |
HTTP | HyperText Transfer Protocol |
HTTPS | HyperText Transfer Protocol over SSL |
HVAC | Heating, Ventilation Air Conditioning |
ICMP | Internet Control Message Protocol |
ID | Identification |
IKE | Internet Key Exchange |
IM | Instant Messaging |
IMAP4 | Internet message Access Protocol v4 |
IP | Internet Protocol |
IPSEC | Internet Protocol Security |
IR | Incident Response |
IRC | Internet Relay Chat |
IRP | Incident Response Procedure |
ITCP | IT Contingency Plan |
IV | Intitialization Vector |
JBOD | Just a Bunch of Disks |
KDC | Key Distribution Center |
L2TP | Layer 2 Tunneling Protocol |
LDAP | Lightweight Directory Access Protocol |
LEAP | Lightweight Extensible Authentication Protocol |
MAC | Mandatory Access Control/ Media Access Control |
MAC | Message Authentication Code |
MAN | Metropolitan Area Network |
MBR | Master Boot Record |
MOU | Memorandum of Understanding |
MPLS | Multi-Protocol Layer Switch |
MSCHAP | Microsoft challenge Handshake Authentication Protocol |
MTBF | Mean Time Between Failures |
MTTF | Mean Time to Failure |
MTU | Maximum Transmission Unit |
NDA | Non-Disclosure Agreement |
NFC | Near Field Communication |
NIDS | Network Based Intrusion Detection System |
NOS | Network Operating System |
NTFS | New Technology File System |
NTLM | New Technology LANMAN |
NTP | Network Time Protocol |
OCSP | Online Certificate Status Protocol |
OLA | Open License Agreement |
OS | Operating System |
OVAL | Open vulnerability Assessment Language |
PAC | Proxy Auto Configuration |
PAM | Pluggable Authentication Modules |
PAP | Password Authentication Protocol |
PBKDF2 | Password Based Key Derivation Function 2 |
PBX | Private Branch Exchange |
PCAP | Packet capture |
PEAP | Protected Extensible Authentication Protocol |
PED | Personal Electronic Device |
PGP | Pretty Good Privacy |
PIV | Personal Identity verification |
POTS | Plain Old Telephone Service |
PPP | Point to Point Protocol |
PPTP | Point to Point Tunneling Protocol |
PTZ | Pan-Tilt-Zoom |
RAD | Rapid Application Development |
RAS | Remote Access Server |
RBAC | Role Based Access Control |
RC4 | RSA Variable Key Size Encryption Algorithm |
RIPEMD | RACE Integrity Primitives Evaluation Message digest |
RSA | Rivest, Shamir, & Aldeman |
RTP | Real-Time Transport Protocol |
S/MIME | Secure/Multipurpose Internet Mail Extensions |
SAML | Security Assertions Markup Language |
SMS | Short Message Service |
SMTP | Simple Mail Transfer Protocol |
SNMP | Simple Network Management Protocol |
SOAP | Simple Object Access Protocol |
SONET | Synchronized Optical Network Technologies |
SPIM | Spam over Internet messaging |
SQL | Structured Query Language |
SSD | Solid State Drive |
SSL | Secure sockets Layer |
SSO | Single Sign On |
STP | Shielded Twisted Pair |
TCP/IP | Transmission control Protocol/ Internet Protocol |
TGT | Ticket Granting System |
TKIP | Temporal Key Integrity Protocol |
TLS | Transport Layer Security |
TOTP | Time-Based one-Time Password |
TSIG | Transaction Signature |
UAT | User Acceptance Testing |
UEFI | Unified Extensible Firmware Interface |
UPS | Uninterruptable Power Supply |
URL | Universal Resource Locator |
USB | Universal Serial Bus |
UTM | Unified Threat Management |
UTP | Unshielded Twisted Pair |
VoIP | Voice over IP |
VPN | Virtual Private Network |
VTC | Video Teleconferencing |
WAP | Wireless Access Point |
WIDS | Wireless Intrusion Detection System |
WIPS | Wireless Intrusion Prevention System |
WPA | Wireless Protected Access |
WPA2 | WiFi Protected Setup |
WTLS | Wireless TLS |
XML | Extensible Markup Language |
XSRF | Cross-Site Request Forgery |
XSS | Cross-Site Scripting |
3DES | Triple Digital Encryption Standard |
AAA | Authentication, Authorization, Accounting |
AES | Advanced Encryption Standard |
AES256 | Advanced Encryption Standards 256 bit |
AH | Authentication Header |
AP | Access Point |