ACRONYMS Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Question | Answer |
PAT | Port Address Translation An extension to NAT that permits multiple devices on a LAN to be mapped to a single public IP address. |
ISP | Internet Service Provider |
LAN | Local Area Network |
ACL | Access Control Lists |
NIPS | Network-based intrusion prevention system |
HIPS | Host-based intrusion prevention system |
HIDS | Host-based intrusion detection system |
IDS | Intrusion detection system |
IDPS | Intrusion detection and prevention systems |
CISO | Chief Information Security Officer |
DMZ | Demilitarized Zone |
CTO | Chief Technical Officer |
PSK | Pre-Shared Key |
ACK | Acknowledge |
SYN | Synchronize |
URI | Unifiorm Resource Identifier |
FDE | Full Disk Encryption |
FQDN | Fully Qualified Domain Name |
UTM | Unified Threat Management |
NGFW | Next Generation Firewall |
WAF | Web Application Firewall |
XSS | Cross-site scripting |
SEH | Structured Exception Handler |
UDP | User Datagram Protocol |
SSH | Secure Shell |
TFTP | Trivial File Transfer Protocol |
VLAN | Virtual local area network |
FTP | File Transfer Protocol |
VDI | Virtualization Desktop Infrastructure |
RADIUS | Remote Access Dial-In User Service |
CA | Certificate Authority |
PNAC | Port-based Network Access Control |
EAP | Extensible Authentication Protocol |
TACACS + | Terminal Access Controller Access-Control System Plus |
NAC | Network Access Control |
WEP | Wired Equivalent Privacy |
MaaS | Monitoring-as-a-Service |
SaaS | Software as a Service |
IaaS | Infrastructure as a Service |
PaaS | Platform as a Service |
XaaS | Anything-as-a-Service |
SFTP | Secure File Transfer Protocol |
SHTTP | Secure Hypertext Transfer Protocol |
SCP | Secure Copy |
SAN | Storage Area Network |
AUP | Acceptable use policies |
CSO | Chief Security Officer |
AV | Asset Value |
EF | Exposure Factor |
GPS | Global Positioning System |
TPM | Trusted Platform Module |
RPO | Recovery point objective |
MTTR | Mean Time To Recover |
MTBF | Mean time between failures |
MOU | Memorandum of Understanding |
ISA | Interconnection Security Agreement |
SLA | Service Level Agreement |
BPA | Business Partner Agreement |
EFS | Encrypting File System |
CEO | Chief Executive Officer |
DLP | Data Loss Prevention |
EMI | Electromagnetic Interference |
HSM | Hardware Security Module |
CRL | Certification Revocation List |
TPM | Trusted Platform Module |
OOV | Order of Volatility |
NTP | Network Time Protocol |
DDoS | Distributed Denial of Service |
CERT | Computer Emergency Response Team |
NIST | National Institute of Standards and Technology |
NSRL | National Software Reference Library |
RAM | Random Access Memory |
RAID | Redundant Array of Inexpensive Disks |
MD5 | Message Digest 5 |
PII | Personally Identifiable Information |
VTY | Virtual Terminal lines |
P2P | Peer-to-peer |
RTO | Recovery Time Objective |
RA | Recovery Agent |
RFID | Radio Frequency Identification |
ALE | Annualized Loss Expectancy |
SLE | Single Loss Expectancy |
ARO | Annualized Rate of Occurrence |
AV | Asset Value |
EF | Exposure Factor |
BIA | Business Impact Analysis |
DAC | Discretionary Access Control |
ROI | Return of/on Investment |
RPO | Recovery Point Objective |
HA | High Availability |
SHA | Secure Hash Algorithm |
HMAC | Hash-based Message Authentication Code |
ISSO | Information Systems Security Officer |
MD | Message Digest Algorithm |
PKI | Public Key Infrastructure |
RA | Registration Authority |
AP | Access Point |
API | Application Programming Interface |
ASP | Application Service Provider |
ARP | Address Resolution Protocol |
BAC | Business Availability Center |
BCP | Business Continuity Planning |
BIOS | Basic Input / Output System |
BYOD | Bring Your Own Device |
CAC | Common Access Card |
CAN | Controller Area Network |
CAPTCHA | Completely Automated Public Turing Test to Tell Computers and Humans Apart |
CAR | Corrective Action Report |
CCMP | Counter-Mode/CBC-Mac Protocol |
CCTV | Closed-Circuit Television |
CHAP | Challenge Handshake Authentication Protocol |
CIO | Chief Information Officer |
CIRT | Computer Incident Response Team |
COOP | Continuity of Operation Planning |
CP | Contingency Planning |
CRC | Cyclical Redundancy Check |
CSR | Control Status Register |
CSU | Channel service Unit |
DBA | Database Administrator |
DEP | Data Execution Prevention |
DES | Digital Encryption Standard |
DHCP | Dynamic Host Configuration Protocol |
DHE | Data Handling Electronics |
DHE | Diffie-Hellman Ephemeral |
DLL | Dynamic Link Library |
DNAT | Destination Network Address Transaction |
DNS | Domain Name Service (Server) |
DOS | Denial of Service |
DRP | Disaster Recovery Plan |
DSA | Digital Signature Algorithm |
DSL | Digital Subscriber Line |
DSU | Data Service Unit |
ECC | Elliptic Curve Cryptography |
ECDHE | Elliptic Curve Diffie-Hellman Ephemeral |
ESN | Electronic Serial Number |
ESP | Encapsulated Security Payload |
FACL | File System Access Control List |
FTPS | Secured File Transfer Protocol |
GPG | Gnu Privacy Guard |
GPO | Group Policy Object |
GPU | Graphic Processing Unit |
GRE | Generic Routing Encapsulation |
HDD | Hard Disk Drive |
HOTP | HMAC based One Time Password |
HTML | HyperText Markup Language |
HTTP | HyperText Transfer Protocol |
HTTPS | HyperText Transfer Protocol over SSL |
HVAC | Heating, Ventilation Air Conditioning |
ICMP | Internet Control Message Protocol |
ID | Identification |
IKE | Internet Key Exchange |
IM | Instant Messaging |
IMAP4 | Internet message Access Protocol v4 |
IP | Internet Protocol |
IPSEC | Internet Protocol Security |
IR | Incident Response |
IRC | Internet Relay Chat |
IRP | Incident Response Procedure |
ITCP | IT Contingency Plan |
IV | Intitialization Vector |
JBOD | Just a Bunch of Disks |
KDC | Key Distribution Center |
L2TP | Layer 2 Tunneling Protocol |
LDAP | Lightweight Directory Access Protocol |
LEAP | Lightweight Extensible Authentication Protocol |
MAC | Mandatory Access Control/ Media Access Control |
MAC | Message Authentication Code |
MAN | Metropolitan Area Network |
MBR | Master Boot Record |
MOU | Memorandum of Understanding |
MPLS | Multi-Protocol Layer Switch |
MSCHAP | Microsoft challenge Handshake Authentication Protocol |
MTBF | Mean Time Between Failures |
MTTF | Mean Time to Failure |
MTU | Maximum Transmission Unit |
NDA | Non-Disclosure Agreement |
NFC | Near Field Communication |
NIDS | Network Based Intrusion Detection System |
NOS | Network Operating System |
NTFS | New Technology File System |
NTLM | New Technology LANMAN |
NTP | Network Time Protocol |
OCSP | Online Certificate Status Protocol |
OLA | Open License Agreement |
OS | Operating System |
OVAL | Open vulnerability Assessment Language |
PAC | Proxy Auto Configuration |
PAM | Pluggable Authentication Modules |
PAP | Password Authentication Protocol |
PBKDF2 | Password Based Key Derivation Function 2 |
PBX | Private Branch Exchange |
PCAP | Packet capture |
PEAP | Protected Extensible Authentication Protocol |
PED | Personal Electronic Device |
PGP | Pretty Good Privacy |
PIV | Personal Identity verification |
POTS | Plain Old Telephone Service |
PPP | Point to Point Protocol |
PPTP | Point to Point Tunneling Protocol |
PTZ | Pan-Tilt-Zoom |
RAD | Rapid Application Development |
RAS | Remote Access Server |
RBAC | Role Based Access Control |
RC4 | RSA Variable Key Size Encryption Algorithm |
RIPEMD | RACE Integrity Primitives Evaluation Message digest |
RSA | Rivest, Shamir, & Aldeman |
RTP | Real-Time Transport Protocol |
S/MIME | Secure/Multipurpose Internet Mail Extensions |
SAML | Security Assertions Markup Language |
SMS | Short Message Service |
SMTP | Simple Mail Transfer Protocol |
SNMP | Simple Network Management Protocol |
SOAP | Simple Object Access Protocol |
SONET | Synchronized Optical Network Technologies |
SPIM | Spam over Internet messaging |
SQL | Structured Query Language |
SSD | Solid State Drive |
SSL | Secure sockets Layer |
SSO | Single Sign On |
STP | Shielded Twisted Pair |
TCP/IP | Transmission control Protocol/ Internet Protocol |
TGT | Ticket Granting System |
TKIP | Temporal Key Integrity Protocol |
TLS | Transport Layer Security |
TOTP | Time-Based one-Time Password |
TSIG | Transaction Signature |
UAT | User Acceptance Testing |
UEFI | Unified Extensible Firmware Interface |
UPS | Uninterruptable Power Supply |
URL | Universal Resource Locator |
USB | Universal Serial Bus |
UTM | Unified Threat Management |
UTP | Unshielded Twisted Pair |
VoIP | Voice over IP |
VPN | Virtual Private Network |
VTC | Video Teleconferencing |
WAP | Wireless Access Point |
WIDS | Wireless Intrusion Detection System |
WIPS | Wireless Intrusion Prevention System |
WPA | Wireless Protected Access |
WPA2 | WiFi Protected Setup |
WTLS | Wireless TLS |
XML | Extensible Markup Language |
XSRF | Cross-Site Request Forgery |
XSS | Cross-Site Scripting |
3DES | Triple Digital Encryption Standard |
AAA | Authentication, Authorization, Accounting |
AES | Advanced Encryption Standard |
AES256 | Advanced Encryption Standards 256 bit |
AH | Authentication Header |
AP | Access Point |
Created by:
fir.keep.secure
Popular Computers sets