click below
click below
Normal Size Small Size show me how
ACRONYMS
SEC+
| Question | Answer |
|---|---|
| PAT | Port Address Translation An extension to NAT that permits multiple devices on a LAN to be mapped to a single public IP address. |
| ISP | Internet Service Provider |
| LAN | Local Area Network |
| ACL | Access Control Lists |
| NIPS | Network-based intrusion prevention system |
| HIPS | Host-based intrusion prevention system |
| HIDS | Host-based intrusion detection system |
| IDS | Intrusion detection system |
| IDPS | Intrusion detection and prevention systems |
| CISO | Chief Information Security Officer |
| DMZ | Demilitarized Zone |
| CTO | Chief Technical Officer |
| PSK | Pre-Shared Key |
| ACK | Acknowledge |
| SYN | Synchronize |
| URI | Unifiorm Resource Identifier |
| FDE | Full Disk Encryption |
| FQDN | Fully Qualified Domain Name |
| UTM | Unified Threat Management |
| NGFW | Next Generation Firewall |
| WAF | Web Application Firewall |
| XSS | Cross-site scripting |
| SEH | Structured Exception Handler |
| UDP | User Datagram Protocol |
| SSH | Secure Shell |
| TFTP | Trivial File Transfer Protocol |
| VLAN | Virtual local area network |
| FTP | File Transfer Protocol |
| VDI | Virtualization Desktop Infrastructure |
| RADIUS | Remote Access Dial-In User Service |
| CA | Certificate Authority |
| PNAC | Port-based Network Access Control |
| EAP | Extensible Authentication Protocol |
| TACACS + | Terminal Access Controller Access-Control System Plus |
| NAC | Network Access Control |
| WEP | Wired Equivalent Privacy |
| MaaS | Monitoring-as-a-Service |
| SaaS | Software as a Service |
| IaaS | Infrastructure as a Service |
| PaaS | Platform as a Service |
| XaaS | Anything-as-a-Service |
| SFTP | Secure File Transfer Protocol |
| SHTTP | Secure Hypertext Transfer Protocol |
| SCP | Secure Copy |
| SAN | Storage Area Network |
| AUP | Acceptable use policies |
| CSO | Chief Security Officer |
| AV | Asset Value |
| EF | Exposure Factor |
| GPS | Global Positioning System |
| TPM | Trusted Platform Module |
| RPO | Recovery point objective |
| MTTR | Mean Time To Recover |
| MTBF | Mean time between failures |
| MOU | Memorandum of Understanding |
| ISA | Interconnection Security Agreement |
| SLA | Service Level Agreement |
| BPA | Business Partner Agreement |
| EFS | Encrypting File System |
| CEO | Chief Executive Officer |
| DLP | Data Loss Prevention |
| EMI | Electromagnetic Interference |
| HSM | Hardware Security Module |
| CRL | Certification Revocation List |
| TPM | Trusted Platform Module |
| OOV | Order of Volatility |
| NTP | Network Time Protocol |
| DDoS | Distributed Denial of Service |
| CERT | Computer Emergency Response Team |
| NIST | National Institute of Standards and Technology |
| NSRL | National Software Reference Library |
| RAM | Random Access Memory |
| RAID | Redundant Array of Inexpensive Disks |
| MD5 | Message Digest 5 |
| PII | Personally Identifiable Information |
| VTY | Virtual Terminal lines |
| P2P | Peer-to-peer |
| RTO | Recovery Time Objective |
| RA | Recovery Agent |
| RFID | Radio Frequency Identification |
| ALE | Annualized Loss Expectancy |
| SLE | Single Loss Expectancy |
| ARO | Annualized Rate of Occurrence |
| AV | Asset Value |
| EF | Exposure Factor |
| BIA | Business Impact Analysis |
| DAC | Discretionary Access Control |
| ROI | Return of/on Investment |
| RPO | Recovery Point Objective |
| HA | High Availability |
| SHA | Secure Hash Algorithm |
| HMAC | Hash-based Message Authentication Code |
| ISSO | Information Systems Security Officer |
| MD | Message Digest Algorithm |
| PKI | Public Key Infrastructure |
| RA | Registration Authority |
| AP | Access Point |
| API | Application Programming Interface |
| ASP | Application Service Provider |
| ARP | Address Resolution Protocol |
| BAC | Business Availability Center |
| BCP | Business Continuity Planning |
| BIOS | Basic Input / Output System |
| BYOD | Bring Your Own Device |
| CAC | Common Access Card |
| CAN | Controller Area Network |
| CAPTCHA | Completely Automated Public Turing Test to Tell Computers and Humans Apart |
| CAR | Corrective Action Report |
| CCMP | Counter-Mode/CBC-Mac Protocol |
| CCTV | Closed-Circuit Television |
| CHAP | Challenge Handshake Authentication Protocol |
| CIO | Chief Information Officer |
| CIRT | Computer Incident Response Team |
| COOP | Continuity of Operation Planning |
| CP | Contingency Planning |
| CRC | Cyclical Redundancy Check |
| CSR | Control Status Register |
| CSU | Channel service Unit |
| DBA | Database Administrator |
| DEP | Data Execution Prevention |
| DES | Digital Encryption Standard |
| DHCP | Dynamic Host Configuration Protocol |
| DHE | Data Handling Electronics |
| DHE | Diffie-Hellman Ephemeral |
| DLL | Dynamic Link Library |
| DNAT | Destination Network Address Transaction |
| DNS | Domain Name Service (Server) |
| DOS | Denial of Service |
| DRP | Disaster Recovery Plan |
| DSA | Digital Signature Algorithm |
| DSL | Digital Subscriber Line |
| DSU | Data Service Unit |
| ECC | Elliptic Curve Cryptography |
| ECDHE | Elliptic Curve Diffie-Hellman Ephemeral |
| ESN | Electronic Serial Number |
| ESP | Encapsulated Security Payload |
| FACL | File System Access Control List |
| FTPS | Secured File Transfer Protocol |
| GPG | Gnu Privacy Guard |
| GPO | Group Policy Object |
| GPU | Graphic Processing Unit |
| GRE | Generic Routing Encapsulation |
| HDD | Hard Disk Drive |
| HOTP | HMAC based One Time Password |
| HTML | HyperText Markup Language |
| HTTP | HyperText Transfer Protocol |
| HTTPS | HyperText Transfer Protocol over SSL |
| HVAC | Heating, Ventilation Air Conditioning |
| ICMP | Internet Control Message Protocol |
| ID | Identification |
| IKE | Internet Key Exchange |
| IM | Instant Messaging |
| IMAP4 | Internet message Access Protocol v4 |
| IP | Internet Protocol |
| IPSEC | Internet Protocol Security |
| IR | Incident Response |
| IRC | Internet Relay Chat |
| IRP | Incident Response Procedure |
| ITCP | IT Contingency Plan |
| IV | Intitialization Vector |
| JBOD | Just a Bunch of Disks |
| KDC | Key Distribution Center |
| L2TP | Layer 2 Tunneling Protocol |
| LDAP | Lightweight Directory Access Protocol |
| LEAP | Lightweight Extensible Authentication Protocol |
| MAC | Mandatory Access Control/ Media Access Control |
| MAC | Message Authentication Code |
| MAN | Metropolitan Area Network |
| MBR | Master Boot Record |
| MOU | Memorandum of Understanding |
| MPLS | Multi-Protocol Layer Switch |
| MSCHAP | Microsoft challenge Handshake Authentication Protocol |
| MTBF | Mean Time Between Failures |
| MTTF | Mean Time to Failure |
| MTU | Maximum Transmission Unit |
| NDA | Non-Disclosure Agreement |
| NFC | Near Field Communication |
| NIDS | Network Based Intrusion Detection System |
| NOS | Network Operating System |
| NTFS | New Technology File System |
| NTLM | New Technology LANMAN |
| NTP | Network Time Protocol |
| OCSP | Online Certificate Status Protocol |
| OLA | Open License Agreement |
| OS | Operating System |
| OVAL | Open vulnerability Assessment Language |
| PAC | Proxy Auto Configuration |
| PAM | Pluggable Authentication Modules |
| PAP | Password Authentication Protocol |
| PBKDF2 | Password Based Key Derivation Function 2 |
| PBX | Private Branch Exchange |
| PCAP | Packet capture |
| PEAP | Protected Extensible Authentication Protocol |
| PED | Personal Electronic Device |
| PGP | Pretty Good Privacy |
| PIV | Personal Identity verification |
| POTS | Plain Old Telephone Service |
| PPP | Point to Point Protocol |
| PPTP | Point to Point Tunneling Protocol |
| PTZ | Pan-Tilt-Zoom |
| RAD | Rapid Application Development |
| RAS | Remote Access Server |
| RBAC | Role Based Access Control |
| RC4 | RSA Variable Key Size Encryption Algorithm |
| RIPEMD | RACE Integrity Primitives Evaluation Message digest |
| RSA | Rivest, Shamir, & Aldeman |
| RTP | Real-Time Transport Protocol |
| S/MIME | Secure/Multipurpose Internet Mail Extensions |
| SAML | Security Assertions Markup Language |
| SMS | Short Message Service |
| SMTP | Simple Mail Transfer Protocol |
| SNMP | Simple Network Management Protocol |
| SOAP | Simple Object Access Protocol |
| SONET | Synchronized Optical Network Technologies |
| SPIM | Spam over Internet messaging |
| SQL | Structured Query Language |
| SSD | Solid State Drive |
| SSL | Secure sockets Layer |
| SSO | Single Sign On |
| STP | Shielded Twisted Pair |
| TCP/IP | Transmission control Protocol/ Internet Protocol |
| TGT | Ticket Granting System |
| TKIP | Temporal Key Integrity Protocol |
| TLS | Transport Layer Security |
| TOTP | Time-Based one-Time Password |
| TSIG | Transaction Signature |
| UAT | User Acceptance Testing |
| UEFI | Unified Extensible Firmware Interface |
| UPS | Uninterruptable Power Supply |
| URL | Universal Resource Locator |
| USB | Universal Serial Bus |
| UTM | Unified Threat Management |
| UTP | Unshielded Twisted Pair |
| VoIP | Voice over IP |
| VPN | Virtual Private Network |
| VTC | Video Teleconferencing |
| WAP | Wireless Access Point |
| WIDS | Wireless Intrusion Detection System |
| WIPS | Wireless Intrusion Prevention System |
| WPA | Wireless Protected Access |
| WPA2 | WiFi Protected Setup |
| WTLS | Wireless TLS |
| XML | Extensible Markup Language |
| XSRF | Cross-Site Request Forgery |
| XSS | Cross-Site Scripting |
| 3DES | Triple Digital Encryption Standard |
| AAA | Authentication, Authorization, Accounting |
| AES | Advanced Encryption Standard |
| AES256 | Advanced Encryption Standards 256 bit |
| AH | Authentication Header |
| AP | Access Point |