CompTia Security+ Acronyms

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/288

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:18 PM on 4/1/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

289 Terms

1
New cards

AAA

Authentication, Authorization, Accounting (AAA) are the steps in user validation for a system

2
New cards

ACL

Access Control List (ACL) defines permissions for users or systems based on criteria such as IP address or user identity

Ex: a firewall ACL blocking traffic from suspicious IPs

3
New cards

AES

Advanced Encryption Standard (AES) uses symmetric keys to protect data by transforming it into an unreadable format

4
New cards

AH

Authentication Header (AH) provides data integrity for IP packets by ensuring the data hasn’t been altered by verifying the sender’s identity. Does NOT encrypt the content

Ex: AH is used in secure VPN connections to validate packet authenticity

5
New cards

AI

Artificial Intelligence (AI) is the simulation of human intelligence in machines

6
New cards

AIS

Automated Indicator Sharing (AIS) is a system that enables the automated exchange of cyber threat indicators, IP addresses, file hashes, etc, between organizations and government entities

7
New cards

ALE

Annualized Loss Expectancy (ALE) is a risk management metric used to calculate the financial loss an organization could face due to a risk over a given year. Formula is Annual Rate of Occurrence (ARO) * Single Loss Expectancy (SLE)

8
New cards

AP

Access Point (AP) is a device allowing wireless devices to connect to a wired network using Wi-Fi.

9
New cards

API

Application Programming Interface (API) is a set of rules and protocols that allow different software applications to communicate with each other

10
New cards

APT

Advanced Persistent Threat (APT) refers to a prolonged cyberattack where the attacker gains access to the network and remains undetected for an extended period of time

11
New cards

ARO

Annualized Rate of Occurrence (ARO) is a risk management metric that estimates how often a specific risk or threat is expected to occur in a year which helps calculate ALE
Ex: If a network outage is expected to happen 3 times per year, the ARO would be 3

12
New cards

ARP

Address Resolution Protocol (ARP) is a network protocol used to map a device’s IP address to its physical MAC address on a local network.

13
New cards

ASLR

Address Space Layout Randomization (ASLR) is a security technique used to randomize the memory addresses used by system and application processes to protect against buffer overflow attacks.

14
New cards

ATT&CK

Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) is a comprehensive knowledge base used by cybersecurity professionals to describe the actions and behaviors of cyber adversaries.

15
New cards

AUP

Acceptable Use Policy (AUP) is a set of rules and guidelines created by an organization to define acceptable and unacceptable behavior when using its network, devices, or online services

16
New cards

AV

Antivirus (AV) is software designed to counteract the effects of malware

17
New cards

BASH

Bourne Again Shell (BASH) a command-line interface and scripting language for Unix-based operating systems such as Linux and mac.

18
New cards

BCP

Business Continuity Planning (BCP) is a strategy and set of procedures designed to ensure that an organization can continue operating during and after a security incident

19
New cards

BIA

Business Impact Analysis (BIA) is a process used to identify and evaluate the potential effects of disruptions to an organization’s critical operations

20
New cards

BIOS

Basic Input/Output System (BIOS) is firmware embedded in a computer’s motherboard that initializes hardware components during the boot-up process and provides an interface between the operating system and the hardware.

21
New cards

BPA

Business Partners Agreement (BPA) is a formal contract between two or more organizations that outlines the terms and conditions of their business relationship

22
New cards

BPDU

Bridge Protocol Data Unit (BPDU) is used by the Spanning Tree Protocol to help network switches communicate and decide the best paths for data to travel, preventing network loops by determining the root bridge and other important topology details

23
New cards

CA

Certificate Authority (CA) is an organization or entity that issues digital certificates to verify the ownership of public keys

24
New cards

CAPTCHA

Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA). (its in the name bro)

25
New cards

CAR

Corrective Action Report (CAR) is a document used to identify and resolve issues within a process, system, or product

26
New cards

CASB

Cloud Access Security Broker (CASB) is a security solution that sits between users and cloud service providers to monitor and enforce security policies

27
New cards

CBC

Cipher Block Chaining (CBC) encrypts data in fixed-size blocks, where each block is XORed with the ciphertext of the previous block before being encrypted.

28
New cards

CCMP

Counter Mode/CBC-MAC Protocol (CCMP) is the mandatory encryption mechanism for WPA2 wireless security. It is based on the AES algorithm

29
New cards

CCTV

Closed-circuit Television (CCTV) is a video surveillance system using cameras to transmit video signals to a specific set of monitors or recording devices

30
New cards

CERT

Computer Emergency Response Team (CERT) is a group of experts responsible for handling and responding to cybersecurity incidents specific to a broad group

31
New cards

CIA

Confidentiality Integrity Availability

32
New cards

CIO

Chief Information Officer (CIO) is an executive responsible for overseeing and managing an organization’s information technology (IT) strategy and operations

33
New cards

CIRT

Computer Incident Response Team (CIRT) is a group of experts responsible for handling and responding to security incidents specific to a select group

34
New cards

CMS

Content Management System (CMS) is a software application that allows users to create, manage, and modify digital content on a website without requiring specialized technical knowledge. Wix is an example

35
New cards

COOP

Continuity of Operation Planning (COOP) is a strategy that ensures an organization can continue its critical functions during and after a disaster or disruption.

36
New cards

COPE

Corporate Owned, Personally Enabled (COPE) is a mobile device management policy where an organization provides employees with company-owned devices that they are allowed to use for both business and personal purposes

37
New cards

CP

Contingency Planning (CP) is the process of developing strategies and procedures to ensure that an organization can continue operating during and after specific, unexpected disruptions

38
New cards

CRC

Cyclical Redundancy Check (CRC) is an error-detecting code used to ensure the integrity of data during transmission or storage

39
New cards

CRL

Certificate Revocation List (CRL) is a list of digital certificates that have been revoked by the CA before their expiration date.

40
New cards

CSO

Chief Security Officer (CSO) is an executive responsible for overseeing and managing an organization’s security policies

41
New cards

CSP

Cloud Service Provider is a company or organization that offers cloud computing services

42
New cards

CSR

Certificate Signing Request (CSR) is a block of encoded text sent to a CA when applying for an SSL/TLS certificate

43
New cards

CSRF

Cross-site Request Forgery (CSRF) is a type of attack where a malicious actor tricks a user into making an unwanted request to a web application that the user is authenticated on.

44
New cards

CSU

Channel Service Unit (CSU) is a device used in telecommunication networks to connect a customer’s equipment to a digital circuit, typically a leased line or a digital subscriber line

45
New cards

CTM

Counter Mode (CTM) is a mode of operation for block ciphers in cryptography that turns a block cipher into a stream cipher

Ex: when using AES in CTM mode, a counter is incremented for each block of data, and the encrypted counter value is XORed with the plaintext to produce the ciphertext.

46
New cards

CTO

Chief Technology Officer (CTO) is an executive responsible for overseeing the technology strategy and operations within an organization

47
New cards

CVE

Common Vulnerability Enumeration (CVE) is a system that provides a standardized way of identifying and naming publicly known cybersecurity vulnerabilities and exposures

48
New cards

CVSS

Common Vulnerability Scoring System (CVSS) is a standardized framework used to assess the severity of security vulnerabilities in software or systems

49
New cards

CYOD

Choose Your Own Device (CYOD) is a policy where employees are allowed to select their own devices from a pre-approved list provided by the organization

50
New cards

DAC

Discretionary Access Control (DAC) is a type of access control policy where the owner of a resource has the discretion to decide who can access it and what actions they can perform. DAC can allow users to grant or revoke permissions to other groups, typically based on identity or role.

51
New cards

DBA

Database Administrator (DBA) is a professional responsible for managing, maintaining, and securing databases within an organization

52
New cards

DDOS

Distributed Denial of Service (DDOS) is a cyberattack in which multiple compromised systems are used to flood a target with massive amounts of traffic, overwhelming its resources

53
New cards

DEP

Data Execution Prevention (DEP) is a security feature that prevents code from being executed in certain regions of memory that are not designated for executable code.

54
New cards

DES

Digital Encryption Standard (DES) is a symmetric-key encryption algorithm that was widely used for securing data. It is deemed weak now due to advances in computational power for brute-force attacks

55
New cards

DHCP

Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to automatically assign IP addresses and other network configuration settings to devices on a network

56
New cards

DHE

Diffie-Hellman Ephemeral (DHE) is a key exchange algorithm used in cryptography to securely exchange cryptographic keys over a public channel by ensuring the generated keys are temporary and only used for a single session (as in the session ID)

57
New cards

DKIM

Domain Keys Identified Mail (DKIM) is an email authentication method that allows the sender to attach a cryptographic signature to an email message, which recipients can use to verify that the email came from the claimed domain and has not been tampered with during transmission

58
New cards

DLL

Dynamic Link Library (DLL) is a type of file that contains code and data that can be used by multiple programs simultaineously

59
New cards

DLP

Data Loss Prevention (DLP) is a set of technologies, policies, and practices designed to prevent sensitive data from being accessed, leaked, or misused by unauthorized users or systems.

60
New cards

DMARC

Domain Message Authentication Reporting and Conformance (DMARC) is an email authentication protocol that helps protect against email spoofing and phishing

61
New cards

DNAT

Destination Network Address Translation (DNAT) is a type of network address translation used to modify the destination IP address of packets as they pass through a router or firewall

62
New cards

DNS

Domain Name System (DNS) is a system that translates human-readable domain names into machine readable IP addresses that computers use to identify each other on a network

63
New cards

DOS

Denial of Service (DOS) is a type of cyberattack aimed at disrupting the availability of a system

64
New cards

DPO

Data Privacy Officer (DPO) is a role within an organization responsible for ensuring compliance with data protection laws and regulations, particularly with safeguarding personal data

65
New cards

DRP

Disaster Recovery Plan (DRP) is a set of procedures and policies designed to ensure that an organization can quickly recover an compromised systems in the event of a security incident

66
New cards

DSA

Digital Signature Algorithm (DSA) is a cryptographic algorithm used to generate digital signatures for the verification of digital documents, messages, or transactions

67
New cards

DSL

Digital Subscriber Line (DSL) is a high-speed internet connection technology that transmits data over traditional copper telephone lines

68
New cards

EAP

Extensible Authentication Protocol (EAP) is an authentication framework used in computer networks, allowing for multiple types of authentication methods such as with 802.1X authentication. It is commonly used in wireless networks.

69
New cards

ECB

Electronic Code Book (ECB) is a mode of operation for block ciphers in cryptography. In ECB mode, the data is divided into fixed-size blocks, and each block is encrypted independently using the same key which is fast but also opens many more security vulnerabilities

70
New cards

ECC

Elliptic Curve Cryptography (ECC) is a symmetric type of public key cryptography based on the algebraic structure of elliptic curves over finite fields. Works best in environments with limited resources.

71
New cards

ECDHE

Elliptic Curve Diffie-Hellman Ephemeral (ECDHE) is an encryption algorithm used for secure key exchange in cryptographic protocols, such as TLS and allows two parties to establish a shared secret over an insecure channel without actually sending the secret itself

72
New cards

ECDSA

Elliptic Curve Digital Signature Algorithm (ECDSA) is a public key encryption algorithm used for digital signatures, based on elliptic curve cryptography, providing a way to verify the authenticity and integrity of a message or document

73
New cards

EFS

Encrypted File System (EFS) is a feature in Microsoft Windows that provides file-level encryption to protect sensitive data stored on a computer

74
New cards

ESN

Electronic Serial Number (ESN) is a unique identifier assigned to mobile devices by the manufacturer

75
New cards

ESP

Encapsulated Security Payload (ESP) is a protocol used in IPsec to provide confidentiality, authentication, and integrity for data transmitted over a network

76
New cards

FACL

File Access Control List (FACL) is a security feature that defines permission for files or directories specifying who can access the resources and what kind of actions they can perform

77
New cards

FDE

Full Disk Encryption (FDE) is a security method that encrypts all the data on a hard drive or storage device, ensuring that the entire disk is protected

Ex: BitLocker (Windows) and FileVault (macOs)

78
New cards

FPGA

Field Programmable Gate Array (FPGA) is a type of integrated circuit (IC) that can be programmed or configure after manufacturing to perform specific tasks

79
New cards

FRR

False Rejection Rate (FRR) is a metric used in biometric systems to measure the percentage of legitimate users who are incorrectly rejected by the system

80
New cards

FTPS

File Transfer Protocol Secure (FTPS) is an extension of the standard FTP protocol that adds support for encryption and secure connections by using SSL/TLS to encrypt data during transfer which ensures that both the control and data channels are secured

81
New cards

GCM

Galois Counter Mode (GCM) is a mode of operation for symmetric key cryptographic block ciphers that combines the counter mode (CTR) for encryption with a Galois mode, providing both data confidentiality and data integrity

82
New cards

GDPR

General Data Protection Regulation (GDPR) is a comprehensive data privacy and protection law enacted by the EU to strengthen and unify data protection for all individuals within the EU

83
New cards

GPG

Gnu Privacy Guard (GPG) is an open-source encryption tool used for securing communications, data, and files.

84
New cards

GPO

Group Policy Object (GPO) is a feature of Microsoft Windows operating systems used to manage and configure settings for users and computers in an Active Directory environment

85
New cards

GPS

Global Positioning System (GPS) is a satellite based navigation system that provides location and time information anywhere on Earth.

86
New cards

GPU

Graphics Processing Unit (bro you know this)

87
New cards

GRE

Generic Routing Encapsulation (GRE) is a tunneling protocol that allows for the transportation of data packets from one network over another network by creating a “virtual tunnel” between two endpoints

88
New cards

HA

High Availability (bro you know this)

89
New cards

HDD

Hard Disk Drive (bro you know this)

90
New cards

HIDS

Host-based Intrusion Detection System (HIDS) monitors a single device for suspicious activities or policy violations by analyzing logs, file changes, and system behavior

91
New cards

HIPS

Host-based Intrusion Prevention System is a security solution installed on individual devices that not only detects suspicious activities like a HIDS but also actively prevents potential threats by blocking malicious actions in real time

92
New cards

HOTP

HOTP (HMAC-based One-time Password) is a one-time password algorithm that generates unique, time-independent passwords based on a counter and a shared secret key. Each password is valid until it is used.

93
New cards

HSM

Hardware Security Module (HSM) is a physical device designed to manage, store, and protect cryptographic keys and perform encryption and decryption operations on large servers rather than an individual device

94
New cards

HTML

Hypertext Markup Language (bro you know this)

95
New cards

HTTP

Hypertext Transfer Protocol (HTTP) is a protocol used for transferring data between a web browser and a web server. Sends requests and receives responses in plaintext. Secure version using SSL/TLS is HTTPS (Hypertext Transfer Protocol Secure)

96
New cards

HVAC

Heating, Ventilation Air Conditioning (bro you know this)

97
New cards

Iaas

Infrastructure as a Service (IaaS) is a cloud computing model that provides virtualized computing resources over the internet without the need for on-premises hardware

98
New cards

IaC

Infrastructure as Code (IaC) is a practice in cloud computing where infrastructure is managed and provisioned using code, rather than manual processes

99
New cards

IAM

Identity and Access Management (IAM) is a framework that manages the identities of users and devices within an organization and controls their access to resources, ensuring that only authorized entities can access specific data or systems

100
New cards

ICMP

Internet Control Message Protocol (ICMP) is a network protocol used to send error messages and operational information about network communication.

Explore top notes

note
historical globalization figures
Updated 1082d ago
0.0(0)
note
~The Phagocytic System~
Updated 536d ago
0.0(0)
note
4.8-4.10 Presentation
Updated 113d ago
0.0(0)
note
States of matter
Updated 1246d ago
0.0(0)
note
Chapter 6: Learning
Updated 1090d ago
0.0(0)
note
GEC1-LESSON 3
Updated 569d ago
0.0(0)
note
historical globalization figures
Updated 1082d ago
0.0(0)
note
~The Phagocytic System~
Updated 536d ago
0.0(0)
note
4.8-4.10 Presentation
Updated 113d ago
0.0(0)
note
States of matter
Updated 1246d ago
0.0(0)
note
Chapter 6: Learning
Updated 1090d ago
0.0(0)
note
GEC1-LESSON 3
Updated 569d ago
0.0(0)

Explore top flashcards

flashcards
Wat een taal zeg
91
Updated 1221d ago
0.0(0)
flashcards
Sp4 Un1A (23-24) | El arte
30
Updated 952d ago
0.0(0)
flashcards
Linear Algebra Final Review
47
Updated 471d ago
0.0(0)
flashcards
Odyssey Terms
35
Updated 1240d ago
0.0(0)
flashcards
is 117 final quiz review
44
Updated 1204d ago
0.0(0)
flashcards
Passe Compose
54
Updated 1147d ago
0.0(0)
flashcards
Wat een taal zeg
91
Updated 1221d ago
0.0(0)
flashcards
Sp4 Un1A (23-24) | El arte
30
Updated 952d ago
0.0(0)
flashcards
Linear Algebra Final Review
47
Updated 471d ago
0.0(0)
flashcards
Odyssey Terms
35
Updated 1240d ago
0.0(0)
flashcards
is 117 final quiz review
44
Updated 1204d ago
0.0(0)
flashcards
Passe Compose
54
Updated 1147d ago
0.0(0)