1/67
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
ACL
Access Control List
ARP
Address Resolution Protocol
BYOD
Bring Your Own Device
CIS
Center for Internet Security
CoBiT
Control Objectives for Information and Related Technology
CCTV
Closed-Circuit Television
CRM
Customer Relations Management
DDoS
Distributed Denial of Service
DNS
Domain Name Service
EMET
Enhanced Mitigation Experience Toolkit
FISMA
Federal Information Security Management Act
FTK
Forensic Tool Kit
FTP
File Transfer Protocol
HBSS
Host Based Security System
HIDS
Host Intrusion Detection System
HIPS
Host Intrusion Prevention System
HR
Human Resources
ICS
Industrial Control Systems
IDS
Intrusion Detection System
IMAP
Internet Message Access Protocol
IOC
Indicator of Compromise
IPS
Intrusion Prevention System
ISO
International Organization for Standardization
ITIL
Information Technology Infrastructure Library
LDAP
Lightweight Directory Access Protocol
MAC
Mandatory Access Control
MD5
Message Digest 5
MOA
Memorandum Of Agreement
MOU
Memorandum Of Understanding
MRTG
Multi Router Traffic Grapher
NAC
Network Access Control
NAXSI
Nginx Anti XSS & SQL Injection
NIC
Network Interface Card
NIDS
Network Intrusion Detection System
NIST
National Institute of Standards & Technology
OEM
Original Equipment Manufacturer
OSSIM
Open Source Security Information Management
OWASP
Open Web Application Security Project
PAM
Pluggable Authentication Module
PCA
Prinicpal Component Analysis
PCI
Payment Card Industry
PHI
Protected Health Information
PII
Personally Identifiable Information
RACI
Responsible, Accountable, Consulted and Informed
RADIUS
Remote Authentication Dial-In User Service
SABSA
Sherwood Applied Business Security Architecture
SANS
System Administration, Networking, and Security Institute
SCADA
Supervisory Control and Data Acquisition
SCAP
Security Content Automation Protocol
SDLC
Software Development Life Cycle
SEO
Search Engine Optimization
SHA
Secure Hash Algorithm
SIEM
Security Incident and Event Manager
SLA
Service Level Agreement
SOC
Security Operations Center
SPF
Sender Policy Framework
SSH
Secure Shell
SSL
Secure Sockets Layer
TACACS+
Terminal Access Controller Access Control System Plus
TFTP
Trivial File Transfer Protocol
TLS
Transport Layer Security
TOGAF
The Open Group Architecture Framework
USB
Universal Serial Bus
VAS
Vulnerability Assessment System
VDI
Virtual Desktop Infrastructure
VLAN
Virtual Local Area Network
VPN
Virtual Private Network
WAF
Web Application Firewall