click below
click below
Normal Size Small Size show me how
Acronym List
Security+ (SY0-601) Acronym List
| Acrynim | Term | Definition |
|---|---|---|
| AV | Antivirus | Software designed to detect, prevent, and remove malicious software (malware) from computer systems. |
| IoC | Indicators of Compromise | Observable artifacts or behaviors that suggest a security incident or potential breach |
| PCAP | Packet Capture | The process of intercepting and logging data traffic on a network for analysis and monitoring |
| PFS | Perfect Forward Secrecy | A cryptographic technique that ensures that a session key derived from long-term keys cannot be compromised if one of the keys is compromised in the future. |
| RAT | Remote Access Trojan | A type of malicious software that allows unauthorized access to a victims system over a network |
| SAN | Storage Area Network | A high-speed network that provides access to block-level data storage |
| SDV | Software-defined Visibility | The use of software to dynamically control and optimized the visibility and monitoring of network traffic |
| XSS | Cross-site Scripting | A security vulnerability that allows attackers to inject malicious scripts into webpages viewed by other users |
| ABAC | Attribute-based Access Control | Access control model that uses attribites to define and enforce access policies |
| ACL | Access Control List | A list of rules that specifies which users or system processes are granted access to objects, as well as what operations are allowed. |
| AH | Authentication Header | A protocol used to authenticate the sender and verify the integrity of the transmitted data in IPsec. |
| AI | Artificial Intelligence | The simulation of human intelligence in machines that are programmed to think and learn |
| AIS | Automated Indicator Sharing | The automated exchange of cyber threat indicators and defensive measures among organizations. |
| AP | Access Point | A device that allows wireless devices to connect to a wired network. |
| API | Application Programming Interface | A set of rules and tools for building software applications. |
| APT | Advanced Persistent Threat | A sophisticated and prolonged cyber attack in which an intruder gains unauthorized access to a network and remains undetected for an extended period. |
| ARP | Address Resolution Protocol | A protocol used to map IP addresses to MAC addresses in a local network. |
| BPDU | Bridge Protocol Data Unit | A data unit used in the IEEE 802.1D bridging standard to identify and manage network bridges. |
| BYOD | Bring Your Own Device | A policy that allows employees to use their personal devices for work purposes. |
| CA | Certificate Authority | An entity that issues digital certificates to validate the identity of individuals or organizations. |
| CCMP | Counter-Mode/CBC-MAC Protocol | A cryptographic protocol combining Counter Mode encryption and Cipher Block Chaining Message Authentication Code (CBC-MAC) for secure communication. |
| COPE | Corporate-owned Personally Enabled | A device ownership model where the organization owns the device, but employees are allowed personal use. |
| CRL | Certificate Revocation List | A list of digital certificates that have been revoked by the issuing Certificate Authority before their scheduled expiration date. |
| CSP | Cloud Service Provider | A company that offers cloud computing services, including infrastructure, platforms, or software over the internet. |
| CSR | Certificate Signing Request | A request sent to a Certificate Authority to apply for a digital certificate, typically containing the public key and other identification information. |
| CTM | Counter-Mode | A block cipher mode of operation used for encryption, providing parallelizable encryption and decryption. |
| CVE | Common Vulnerabilities and Exposures | A standardized list of common identifiers for publicly known cybersecurity vulnerabilities and exposures. |
| CVSS | Common Vulnerability Scoring System | A framework for scoring the severity of software vulnerabilities, providing a standardized measure of the impact and exploitability. |
| CYOD | Choose Your Own Device | An approach that allows employees to choose their preferred devices for work purposes. |
| DAC | Discretionary Access Control | An access control model where owners have control over access to their resources and can grant or revoke permissions. |
| DER | Distinguished Encoding Rules | A set of rules for encoding data structures that are independent of machine-specific encoding. |
| DHCP | Dynamic Host Configuration Protocol | |
| DLP | Data Loss Prevention | |
| DNS | Domain Name System | |
| EAP | Extensible Authentication Protocol | |
| EDR | Endpoint Detection and Response | |
| ESP | Encapsulating Security Payload | |
| FDE | Full Disk Encryption | |
| FPGA | Field Programmable Gate Array | |
| FTP | File Transfer Protocol | |
| HA | High Availability | |
| HIDS | Host-based Intrusion Detection System | |
| HIPS | Host-based Intrusion Prevention System | |
| HOTP | HMAC-based One-time Password | |
| HTTP | Hypertext Transfer Protocol | |
| HVAC | Heating, Ventilation, Air Conditioning | |
| IaaS | Infrastructure as a Service | |
| IdP | Identity Provider | |
| IDS | Intrusion Detection System | |
| IoT | Internet of Things | |
| IP | Internet Protocol | |
| IPS | Intrusion Prevention System | |
| IV | Initialization Vector | |
| L2TP | Layer 2 Tunneling Protocol | |
| LAN | Local Area Network | |
| LDAP | Lightweight Directory Access Protocol | |
| MAC | Media Access Control | |
| MAM | Mobile Application Management | |
| MDM | Mobile Device Management | |
| MFA | Multifactor Authentication | |
| MFP | Multifunction Printer | |
| MSP | Managed Service Provider | |
| MSSP | Managed Security Service Provider | |
| NAC | Network Access Control | |
| NAS | Network-attached Storage | |
| NAT | Network Address Translation | |
| NGFW | Next-generation Firewall | |
| NG-SWG | Next-generation Secure Web Gateway | |
| NIC | Network Interface Card | |
| NIDS | Network-based Intrusion Detection System | |
| NIPS | Network-based Intrusion Prevention System | |
| OCSP | Online Certificate Status Protocol | |
| OS | Operating System | |
| OSINT | Open-source Intelligence | |
| OT | Operational Technology | |
| OTA | Over-The-Air | |
| OTG | On-The-Go | |
| OWASP | Open Web Application Security Project | |
| PaaS | Platform as a Service | |
| PAP | Password Authentication Protocol | |
| PDU | Power Distribution Unit | |
| PEM | Privacy Enhanced Mail | |
| PKI | Public Key Infrastructure | |
| POP | Post Office Protocol | |
| PUP | Potentially Unwanted Program | |
| QA | Quality Assurance | |
| QoS | Quality of Service | |
| RA | Registration Authority | |
| RADIUS | Remote Authentication Dial-in User Service | |
| RCS | Rich Communication Services | |
| RFC | Request for Comments | |
| RTOS | Real-time Operating System | |
| S/MIME | Secure/Multipurpose Internet Mail Extensions | |
| S/MIME | Secure/Multipurpose Internet Mail Extensions | |
| SaaS | Software as a Service | |
| SAE | Simultaneous Authentication of Equals | |
| SAML | Security Assertions Markup Language | |
| SDK | Software Development Kit | |
| SFTP | SSH File Transfer Protocol | |
| SIEM | Security Information and Event Management | |
| SIM | Subscriber Identity Module | |
| SMS | Short Message Service | |
| SNMP | Simple Network Management Protocol | |
| SoC | System on Chip | |
| SQL | Structured Query Language | |
| SSL | Secure Sockets Layer | |
| SSO | Single Sign-on | |
| STIX | Structured Threat Information eXpression | |
| SWG | Secure Web Gateway | |
| TACACS+ | Terminal Access Controller Access Control System | |
| TLS | Transport Layer Security | |
| TPM | Trusted Platform Module | |
| TTP | Tactics, Techniques, and Procedures | |
| UEFI | Unified Extensible Firmware Interface | |
| UEM | Unified Endpoint Management | |
| UPS | Uninterruptible Power Supply | |
| URL | Universal Resource Locator | |
| USB | Universal Serial Bus | |
| UTM | Unified Threat Management | |
| VBA | Visual Basic for Applications | |
| VDI | Virtual Desktop Infrastructure | |
| VLAN | Virtual Local Area Network | |
| VM | Virtual Machine | |
| VoIP | Voice over IP | |
| VPC | Virtual Private Cloud | |
| WAF | Web Application Firewall | |
| WAP | Wireless Access Point | |
| WPA | WiFi Protected Access | |
| WPS | WiFi Protected Setup | |
| XaaS | Anything as a Service | |
| XML | Extensible Markup Language | |
| 3DES | Triple Data Encryption Standard | |
| AAA | Authentication, Authorization, and Accounting | |
| AD | Active Directory | |
| AES | Advanced Encryption Standard | |
| AES256 | Advanced Encryption Standards 256bit | |
| ALE | Annualized Loss Expectancy | |
| ARO | Annualized Rate of Occurrence | |
| ASLR | Address Space Layout Randomization | |
| ASP | Active Server Pages | |
| ATT&CK | Adversarial Tactics, Techniques, and Common Knowledge | |
| AUP | Acceptable Use Policy | |
| BASH | Bourne Again Shell | |
| BCP | Business Continuity Planning | |
| BGP | Border Gateway Protocol | |
| BIA | Business Impact Analysis | |
| BIOS | Basic Input/Output System | |
| BPA | Business Partnership Agreement | |
| BSSID | Basic Service Set Identifier | |
| CAPTCHA | Completely Automated Public Turing Test to Tell Computers and Humans Apart | |
| CAR | Corrective Action Report | |
| CASB | Cloud Access Security Broker | |
| CBC | Cipher Block Chaining | |
| CBT | Computer-based Training | |
| CCTV | Closed-Circuit Television | |
| CERT | Computer Emergency Response Team | |
| CFB | Cipher Feedback | |
| CHAP | Challenge-Handshake Authentication Protocol | |
| CI/CD | Continuous Integration/Continuous Delivery | |
| CIO | Chief Information Officer | |
| CIRT | Computer Incident Response Team | |
| CIS | Center for Internet Security | |
| CMDB | Configuration Management Database | |
| CMS | Content Management System | |
| CN | Common Name | |
| COOP | Continuity of Operations Planning | |
| CP | Contingency Planning | |
| CPU | Central Processing Unit | |
| CRC | Cyclic Redundancy Check | |
| CSA | Cloud Security Alliance | |
| CSIRT | Computer Security Incident Response Team | |
| CSO | Chief Security Officer | |
| CSRF | Cross-Site Request Forgery | |
| CSU | Channel Service Unit | |
| CTO | Chief Technology Officer | |
| DBA | Database Administrator | |
| DDoS | Distributed Denial-of-Service | |
| DEP | Data Execution Prevention | |
| DES | Data Encryption Standard | |
| DHE | Diffie-Hellman Ephemeral | |
| DKIM | Domain Keys Identified Mail | |
| DLL | Dynamic-link Library | |
| DMARC | Domain Message Authentication | |
| DNAT | Destination Network Address Translation | |
| DNSSEC | Domain Name System Security Extensions | |
| DoS | Denial-of-Service | |
| DPO | Data Protection Officer | |
| DRP | Disaster Recovery Plan | |
| DSA | Digital Signature Algorithm | |
| DSL | Digital Subscriber Line | |
| ECB | Electronic Code Book | |
| ECC | Elliptic-curve Cryptography | |
| ECDHE | Elliptic-curve Diffie-Hellman Ephemeral | |
| ECDSA | Elliptic-curve Digital Signature Algorithm | |
| EFS | Encrypted File System | |
| EIP | Extended Instruction Pointer | |
| EOL | End of Life | |
| EOS | End of Service | |
| ERP | Enterprise Resource Planning | |
| ESN | Electronic Serial Number | |
| ESSID | Extended Service Set Identifier | |
| FACL | File System Access Control List | |
| FIM | File Integrity Monitoring | |
| FRR | FALSE Rejection Rate | |
| FTPS | Secured File Transfer Protocol | |
| GCM | Galois/Counter Mode | |
| GDPR | General Data Protection Regulation | |
| GPG | GNU Privacy Guard | |
| GPO | Group Policy Object | |
| GPS | Global Positioning System | |
| GPU | Graphics Processing Unit | |
| GRE | Generic Routing Encapsulation | |
| HDD | Hard Disk Drive | |
| HMAC | Hash-based Message Authentication Code | |
| HSM | Hardware Security Module | |
| HSMaaS | Hardware Security Module as a Service | |
| HTML | Hypertext Markup Language | |
| HTTPS | Hypertext Transfer Protocol Secure | |
| IAM | Identity and Access Management | |
| ICMP | Internet Control Message Protocol | |
| ICS | Industrial Control Systems | |
| IDEA | International Data Encryption Algorithm | |
| IDF | Intermediate Distribution Frame | |
| IEEE | Institute of Electrical and Electronics Engineers | |
| IKE | Internet Key Exchange | |
| IM | Instant Messaging | |
| IMAP4 | Internet Message Access Protocol v4 | |
| IPSec | Internet Protocol Security | |
| IR | Incident Response | |
| IRC | Internet Relay Chat | |
| IRP | Incident Response Plan | |
| ISA | Interconnection Security Agreement | |
| ISFW | Internal Segmentation Firewall | |
| ISO | International Organization for Standardization | |
| ISP | Internet Service Provider | |
| ISSO | Information Systems Security Officer | |
| ITCP | IT Contingency Plan | |
| JSON | JavaScript Object Notation | |
| KDC | Key Distribution Center | |
| KEK | Key Encryption Key | |
| LEAP | Lightweight Extensible Authentication Protocol | |
| MaaS | Monitoring as a Service | |
| MAN | Metropolitan Area Network | |
| MBR | Master Boot Record | |
| MD5 | Message Digest 5 | |
| MDF | Main Distribution Frame | |
| MFD | Multifunction Device | |
| ML | Machine Learning | |
| MMS | Multimedia Message Service | |
| MOA | Memorandum of Agreement | |
| MOU | Memorandum of Understanding | |
| MPLS | Multiprotocol Label Switching | |
| MSA | Measurement Systems Analysis | |
| MS-CHAP | Microsoft Challenge-Handshake Authentication Protocol | |
| MTBF | Mean Time Between Failures | |
| MTTF | Mean Time to Failure | |
| MTTR | Mean Time to Repair | |
| MTU | Maximum Transmission Unit | |
| NDA | Non-disclosure Agreement | |
| NFC | Near-field Communication | |
| NFV | Network Function Virtualization | |
| NIST | National Institute of Standards & Technology | |
| NOC | Network Operations Center | |
| NTFS | New Technology File System | |
| NTLM | New Technology LAN Manager | |
| NTP | Network Time Protocol | |
| NTPSec | Network Time Protocol Secure | |
| OID | Object Identifier | |
| OSI | Open Systems Interconnection | |
| OSPF | Open Shortest Path First | |
| OVAL | Open Vulnerability and Assessment Language | |
| P12 | PKCS #12 | |
| P2P | Peer-to-Peer | |
| PAC | Proxy Auto Configuration | |
| PAM | Pluggable Authentication Modules | |
| PAM | Privileged Access Management | |
| PAT | Port Address Translation | |
| PBKDF2 | Password-based Key Derivation Function 2 | |
| PBX | Private Branch Exchange | |
| PCI | DSS Payment Card Industry Data Security Standard | |
| PE | Portable Executable | |
| PEAP | Protected Extensible Authentication Protocol | |
| PED | Portable Electronic Device | |
| PGP | Pretty Good Privacy | |
| PHI | Personal Health Information | |
| PII | Personally Identifiable Information | |
| PIN | Personal Identification Number | |
| PIV | Personal Identity Verification | |
| PKCS | Public Key Cryptography Standards | |
| PoC | Proof of Concept | |
| POTS | Plain Old Telephone Service | |
| PPP | Point-to-Point Protocol | |
| PPTP | Point-to-Point Tunneling Protocol | |
| PSK | Preshared Key | |
| PTZ | Pan-Tilt-Zoom | |
| RAD | Rapid Application Development | |
| RAID | Redundant Array of Independent (or Inexpensive) Disks | |
| RAM | Random Access Memory | |
| RAS | Remote Access Server | |
| RC4 | Rivest Cipher version 4 | |
| RDP | Remote Desktop Protocol | |
| Reporting | and Conformance | |
| RFI | Remote File Inclusion | |
| RFID | Radio Frequency Identification | |
| RIPEMD | RACE Integrity Primitives Evaluation Message Digest | |
| ROI | Return on Investment | |
| RPO | Recovery Point Objective | |
| RSA | Rivest, Shamir, & Adleman | |
| RTBH | Remotely Triggered Black Hole | |
| RTO | Recovery Time Objective | |
| RTP | Real-time Transport Protocol | |
| SCADA | Supervisory Control and Data Acquisition | |
| SCAP | Security Content Automation Protocol | |
| SCEP | Simple Certificate Enrollment Protocol | |
| SDLC | Software Development Life Cycle | |
| SDLM | Software Development Life-cycle Methodology | |
| SDN | Software-defined Networking | |
| SDP | Service Delivery Platform | |
| SED | Self-Encrypting Drives | |
| SEH | Structured Exception Handling | |
| SHA | Secure Hashing Algorithm | |
| SIP | Session Initiation Protocol | |
| SLA | Service-level Agreement | |
| SLE | Single Loss Expectancy | |
| SMB | Server Message Block | |
| SMTP | Simple Mail Transfer Protocol | |
| SMTPS | Simple Mail Transfer Protocol Secure | |
| SOAP | Simple Object Access Protocol | |
| SOAR | Security Orchestration, Automation, Response | |
| SOC | Security Operations Center | |
| SOX | Sarbanes Oxley Act | |
| SPF | Sender Policy Framework | |
| SPIM | Spam over Instant Messaging | |
| SQLi | SQL Injection | |
| SRTP | Secure Real-time Transport Protocol | |
| SSD | Solid State Drive | |
| SSH | Secure Shell | |
| SSID | Service Set Identifier | |
| SSRF | Server-side Request Forgery | |
| STP | Shielded Twisted Pair | |
| TAXII | Trusted Automated eXchange of Intelligence Information | |
| TCP | Transmission Control Protocol | |
| TCP/IP | Transmission Control Protocol/Internet Protocol | |
| TGT | Ticket Granting Ticket | |
| TKIP | Temporal Key Integrity Protocol | |
| TOTP | Time-based One Time Password | |
| TSIG | Transaction Signature | |
| UAT | User Acceptance Testing | |
| UDP | User Datagram Protocol | |
| UEBA | User and Entity Behavior Analytics | |
| URI | Uniform Resource Identifier | |
| USB | OTG USB On-The-Go | |
| UTP | Unshielded Twisted Pair | |
| VDE | Virtual Desktop Environment | |
| VLSM | Variable-length Subnet Masking | |
| VPN | Virtual Private Network | |
| VTC | Video Teleconferencing | |
| WEP | Wired Equivalent Privacy | |
| WIDS | Wireless Intrusion Detection System | |
| WIPS | Wireless Intrusion Prevention System | |
| WLAN | Wireless Local Area Network | |
| WORM | Write Once Read Many | |
| XOR | Exclusive OR | |
| XSRF | Cross-site Request Forgery |