Security+ (SY0-701)
AAA
Authentication, Authorization, and Accounting.
ACL
Access Control List.
AES
Advanced Encryption Standard.
AES-256
Advanced Encryption Standards, 256-bit.
AH
Authentication Header.
AI
Artificial Intelligence.
AIS
Automated Indicator Sharing.
ALE
Annualized Loss Expectancy.
AP
Access Point.
API
Application Programming Interface.
APT
Advanced Persistent Threat.
ARO
Annualized Rate of Occurrence.
ARP
Address Resolution Protocol.
ASLR
Address Space Layout Randomization.
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge.
AUP
Acceptable Use Policy.
AV
Antivirus.
BASH
Bourne Again Shell.
BCP
Business Continuity Planning.
BGP
Border Gateway Protocol.
BIA
Business Impact Analysis.
BIOS
Basic Input/Output System.
BPA
Business Partners Agreement.
BPDU
Bridge Protocol Data Unit.
BYOD
Bring Your Own Device.
CA
Certificate Authority.
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart.
CAR
Corrective Action Report.
CASB
Cloud Access Security Broker.
CBC
Cipher Block Chaining.
CCMP
Counter Mode/CBC-MAC Protocol.
CCTV
Closed-Circuit Television.
CERT
Computer Emergency Response Team.
CFB
Cipher Feedback.
CHAP
Challenge Handshake Authentication Protocol.
CIA
Confidentiality, Integrity, Availability.
CIO
Chief Information Officer.
CIRT
Computer Incident Response Team.
CMS
Content Management System.
COOP
Continuity of Operations Planning.
COPE
Corporate Owned, Personally Enabled.
CP
Contingency Planning.
CRC
Cyclical Redundancy Check.
CRL
Certificate Revocation List.
CSO
Chief Security Officer.
CSP
Cloud Service Provider.
CSR
Certificate Signing Request.
CSRF
Cross-Site Request Forgery.
CSU
Channel Service Unit.
CTM
Counter Mode.
CTO
Chief Technology Officer.
CVE
Common Vulnerability Enumeration.
CVSS
Common Vulnerability Scoring System.
CYOD
Choose Your Own Device.
DAC
Discretionary Access Control.
DBA
Database Administrator.
DDoS
Distributed Denial of Service.
DEP
Data Execution Prevention.
DES
Digital Encryption Standard.
DHCP
Dynamic Host Configuration Protocol.
DHE
Diffie-Hellman Ephemeral.
DKIM
Domain Keys Identified Mail.
DLL
Dynamic Link Library.
DLP
Data Loss Prevention.
DMARC
Domain Message Authentication Reporting and Conformance.
DNAT
Destination Network Address Translation.
DNS
Domain Name System.
DoS
Denial of Service.
DPO
Data Privacy Officer.
DRP
Disaster Recovery Plan.
DSA
Digital Signature Algorithm.
DSL
Digital Subscriber Line.
EAP
Extensible Authentication Protocol.
ECB
Electronic Code Book.
ECC
Elliptic Curve Cryptography.
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral.
ECDSA
Elliptic Curve Digital Signature Algorithm.
EDR
Endpoint Detection and Response.
EFS
Encrypted File System.
ERP
Enterprise Resource Planning.
ESN
Electronic Serial Number.
ESP
Encapsulated Security Protocol.
FACL
File System Access Control List.
FDE
Full Disk Encryption.
FIM
File Integrity Management.
FPGA
Field Programmable Gate Array.
FRR
False Rejection Rate.
FTP
File Transfer Protocol.
FTPS
Secured File Transfer Protocol.
GCM
Galois Counter Mode.
GDPR
General Data Protection Regulation.
GPG
Gnu Privacy Guard.
GPO
Group Policy Object.
GPS
Global Positioning System.
GPU
Graphics Processing Unit.
GRE
Generic Routing Encapsulation.
HA
High Availability.
HDD
Hard Disk Drive.
HIDS
Host-based Intrusion Detection System.
HIPS
Host-based Intrusion Prevention System.