401 Security+ Acronyms-Definition

humilaxo's version from 2015-10-30 21:05


0= Section
Question Answer
3DESTriple Digital Encryption Standard
AAAAuthentication, Authorization, and Accounting
ACLAccess Control List
AESAdvanced Encryption Standard
AES256Advanced Encryption Standards 256bit
AHAuthentication Header
ALEAnnualized Loss Expectancy
APAccess Point
APIApplication Programming Interface
ASPApplication Service Provider
AROAnnualized Rate of Occurrence
ARPAddress Resolution Protocol
AUPAcceptable Use Policy
BACBusiness Availability Center
BCPBusiness Continuity Planning
BIABusiness Impact Analysis
BIOSBasic Input / Output System
BPABusiness Partners Agreement
BPDUBridge Protocol Data Unit
BYODBring Your Own Device
CACertificate Authority
CACCommon Access Card
CANController Area Network
CAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart
CARCorrective Action Report
CCMPCounter - Mode/CBC-Mac Protocol
CCTVClosed-circuit television
CERTComputer Emergency Response Team
CFBCipher Feedback
CHAPChallenge Handshake Authentication Protocol
CIOChief Information Officer
CIRTComputer Incident Response Team
CMSContent Management System
COOPContinuity of Operation Planning
CPContingency Planning
CRCCyclical Redundancy Check
CRLCertificate Signing Request
CSPCloud Service Provider
CSRControl Status Register
CSRFCross-Site Request Forgery
CSUChannel Service Unit
CTOChief Technology Officer
DACDiscretionary Access Control
DBADatabase Administrator
DDOSDistributed Denial of Service
DEPData Execution Prevention
DESDigital Encryption Standard
DHCPDynamic Host Configuration Protocol
DHEData-Handling Electronics
DHEDiffie-Hellman Ephemeral
DLLDynamic Link Library
DLPData Loss Prevention
DMZDemilitarized Zone
DNATDestination Network Address Transaction
DNSDomain Name Service (Server)
DOSDenial of Service
DRPDisaster Recovery Plan
DSADigital Signature Algorithm
DSLDigital Subscriber line
DSUData Service Unit
EAPExtensible Authentication Protocol
ECCElliptic Curve Cryptography
ECDHEElliptic Curve Diffie-HellmanExchange
ECDSA :Elliptic Curve Digital Signature Algorithm
Question Answer
EFSEncrypted File System
EMIElectromagnetic Interference
ESNElectronic Serial Number
ESPEncapsulated Security Payload
FACLFile System Access Control List
FDE :Full Disk Encryption
Question Answer
FTPFile Transfer Protocol
FTPSSecured File Transfer Protocol
GCMGalois Counter Mode
GPGGnu Privacy Guard
GPOGroup Policy Object
GPSGlobal Positioning System
GPUGraphic Processing Unit
GREGeneric Routing Encapsulation
HDDHard Disk Drive
HIDSHost Based Intrusion Detection System
HIPSHost Based Intrusion Prevention System
HMACHashed Message Authentication Code
HOTPHMAC based One Time Password
HSMHardware Security Module
HTMLHyperText Markup Language
HTTPHypertext Transfer Protocol
HTTPSHypertext Transfer Protocol over SSL
HVACHeating, Ventilation Air Conditioning
IaaSInfrastructure as a Service
ICMPInternet Control Message Protocol
ICSIndustrial Control Systems
IDFIntermeidate Distribution Frame
IdPIdentity Provider
IDSIntrusion Detection System
IKEInternet Key Exchange
IMInstant messaging
IMAP4Internet Message Access Protocol v4
IPInternet Protocol
IPSECInternet Protocol Security
IRIncident Response
IRCInternet Relay Chat
IRPIncident Response Procedure
ISAInterconnection Security Agreement
ISPInternet Service Provider
ISSOInformation Systems Security Officer
ITCPIT Contingency Plan
IVInitialization Vector
JBODJust a Bunch of Disks
KDC :Key Distribution Center
Question Answer
KEKKey Encryption Key
L2TP: Layer 2 Tunneling Protocol
Question Answer
LANLocal Area Network
LDAPLightweight Directory Access Protocol
LEAPLightweight Extensible Authentication Protocol
MaaSMonitoring as a Service
MACMandatory Access Control / Media Access Control
MACMessage Authentication Code
MANMetropolitan Area Network
MBRMaster Boot Record
MD5Message Digest 5
MDFMain Distribution Frame
MOUMemorandum of Understanding
MPLSMulti-Protocol Layer Switch
MSCHAPMicrosoft Challenge Handshake Authentication Protocol
MTBFMean Time Between Failures
MTTRMean Time to Recover
MTTFMean Time to Failure
MTUMaximum Transmission Unit
NACNetwork Access Control
NATNetwork Address Translation
NDANon-Disclosure Agreement
NFCNear Field Communication
NIDSNetwork Based Intrusion Detection System
NIPSNetwork Based Intrusion Prevention System
NISTNational Institute of Standards & Technology
NOSNetwork Operating System
NTFSNew Technology File System
NTLMNew Technology LANMAN
NTPNetwork Time Protocol
OAUTHOpen Authorization
OCSPOnline Certificate Status Protocol
OLAOpen License Agreement
OSOperating System
OVALOpen Vulnerability Assessment Language
P2PPeer to Peer
PACProxy Auto Configuration
PAMPluggable Authentication Modules
PAPPassword Authentication Protocol
PATPort Address Translation
PBKDF2Password Based Key Derivation Function 2
PBXPrivate Branch Exchange
PCAPPacket Capture
PEAPProtected Extensible Authentication Protocol
PEDPersonal Electronic Device
PFSPerfect Forward Secrecy
PGPPretty Good Privacy
PIIPersonally Identifiable Information
PIVPersonal Identity Verification
PKIPublic Key Infrastructure
POTSPlain Old Telephone Service
PPPPoint-to-point Protocol
PPTPPoint to Point Tunneling Protocol
PSKPre-Shared Key
RARecovery Agent
RARegistration Authrity
RADRapid application development
RADIUSRemote Authentication Dial-in User Server
RAIDRedundant Array of Inexpensive Disks
RASRemote Access Server
RBACRole Based Access Control
RBACRule Based Access Control
RC4RSA Variable Key Size Encryption Algorithm
RIPEMDRACE Integrity Primitives Evaluation Message Digest
ROIReturn of Investment
RPORecovery Point Objective
RSARivest, Shamir, & Adleman
RTORecovery Time Objective
RTPReal-Time Transport Protocol
S/MIMESecure/ Multipurpose Internet Mail Extensions
SAMLSecurity Assertions Markup Language
SaaSSoftware as a Service
SANStorage Area Network
SCADASystem Control and Data Acquisition
SCAPSecurity Content Automation Protocol
SCEPSimple Certificate Enrollment Protocol
SCSISmall Computer System Interface
SDLCSoftware Development Life Cycle
SDLMSoftware Development Life Cycle Methodology
SEHStructured Exception Handler
SHASecure Hashing Algorithm
SFTPSecured File Transfer Protocol
SHTTPSecure Hypertext Transfer Protocol
SIEMSecurity Information and Event Management
SIMSubscriber Identity Module
SLAService Level Agreement
SLESingle Loss Expectancy
SMSShort Message Service
SMTPSimple Mail Transfer Protocol
SMTPSSimple Mail Transfer Protocol Secure
SNMPSimple Network Management Protocol
SOAPSimple Object Access Protocol
SONETSynchronous Optical Network Technologies
SPIMSpam over Internet Messaging
SQLStructured Query Language
SSDSolid State Drive
SSHSecure Shell
SSLSecure Sockets Layer
SSOSingle Sign On
STPShielded Twisted Pair
TACACS+Terminal Access Controller Access Control System
TCP/IPTransmission Control Protocol / Internet Protocol
TGTTicket Granting Ticket
TKIPTemporal Key Integrity Protocol
TLSTransport Layer Security
TOTPTime-Based One-Time Password
TPMTrusted Platform Module
TSIGTransaction Signature
UATUser Acceptance Testing
UEFIUnified Extensible Firmware Interface
UDPUser Datagram Protocol
UPSUninterruptable Power Supply
URIUniform Resource Identifier
URLUniversal Resource Locator
USBUniversal Serial Bus
UTMUnified Threat Management
UTPUnshielded Twisted Pair
VDIVirtualization Desktop Infrastructure
VLANVirtual Local Area Network
VLSMVariable Length Subnet Masking
VoIPVoice over IP
VPNVirtual Private Network
VTCVideo Teleconferencing
WAFWeb Application Firewall
WAPWireless Access Point
WEPWired Equivalent Privacy
WIDSWireless Intrusion Detection System
WIPSWireless Intrusion Prevention System
WPAWireless Protected Access
WPA2WiFi Protected Access 2
WPSWiFi Protected Setup
WTLSWireless TLS
XMLExtensible Markup Language
XSRFCross-Site Request Forgery
XSSCross-Site Scripting

Recent badges