1/125
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
ACL
Access Control List
API
Application Programming Interface
APT
Advanced Persistent Threat
ARP
Address Resolution Protocol
AV
Antivirus
BC
Business Continuity
BCP
Business Continuity Plan
BGP
Border Gateway Protocol
BIA
Business Impact Analysis
C2
Command and Control
CA
Certificate Authority
CASB
Cloud Access Security Broker
CDN
Content Delivery Network
CERT
Computer Emergency Response Team
CHD
Cardholder Data
CI/CD
Continuous Integration and Continuous Delivery
CIS
Center for Internet Security
COBIT
Control Objectives for Information and Related Technologies
CSIRT
Cybersecurity Incident Response Team
CSRF
Cross-site Request Forgery
CVE
Common Vulnerabilities and Exposures
CVSS
Common Vulnerability Scoring System
DDoS
Distributed Denial of Service
DoS
Denial of Service
DKIM
Domain Keys Identified Mail
DLP
Data Loss Prevention
DMARC
Domain-based Message Authentication, Reporting, and Conformance
DNS
Domain Name Service
DR
Disaster Recovery
EDR
Endpoint Detection and Response
FIM
File Integrity Monitoring
FTP
File Transfer Protocol
GDB
GNU Debugger
GPO
Group Policy Objects
HIDS
Host-Based Intrusion Detection System
HIPS
Host-Based Intrusion Prevention System
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol Secure
IaaS
Infrastructure as a Service
ICMP
Intenet Control Message Protocol
ICS
Industrial Control Systems
IoC
Indicators of Compromise
IP
Internet Protocol
IPS
Intrusion Prevention System
IR
Incident Response
ISO
International Organization for Standardization
IT
Information Technology
ITIL
Information Technology Infrastructure Library
JSON
JavaScript Object Notation
KPI
Key Performance indicator
LAN
Local Area Network
LDAPS
Lightweight Directory Access Protocol
LFI
Local File Inclusion
LOI
Letter of Intent
MAC
Media Access Control
MFA
Multifactor Authentication
MOU
Memorandum of Understanding
MSF
Metasploit Framework
MSP
Managed Service Provider
MSSP
Managed Security Service Provider
MTTD
Mean Time to Detect
MTTR
Mean Time to Reapair
NAC
Network Access Control
NDA
Non-Disclosure Agreement
NIDS
Network-based Intrusion Detection System
NTP
Network Time Protocol
OpenVAS
Open Vulnerability Assessment Scanner
OS
Operating System
OSSTMM
Open Source Security Testing Methodology Manual
OT
Operational Technology
OWASP
Open Web Application Security Project
PAM
Privileged Access Management
PCI DSS
Payment Card Industry Data Security Standard
PHP
Hypertext Preprocessor
PID
Process Identifier
PII
Personally Identifiable Information
PKI
Public Key Infrastructure
PLC
Programmable Logic Controller
POC
Proof of Concept
RCE
Remote Code Execution
RDP
Remote Desktop Protocol
REST
Representational State Transfer
RFI
Remote File Inclusion
RXSS
Reflected Cross-site Scripting
SaaS
Software as a Service
SAML
Security Assertion Markup Language
SASE
Secure Access Secure Edge
SCADA
Supervisory Control and Data Acquisition
SDLC
Software Development Life Cycle
SDN
Software-defined Networking
SFTP
Secure File Transfer Protocol
SIEM
Security Information and Event Management
SLA
Service-level Agreement
SLO
Service-level Objective
SOAR
Security Orchestration, Automation, and Response
SMB
Server Message Block
SMTP
Simple Mail Transfer Protocol
SNMP
Simple Network Management Protocol
SOC
Security Operations Center
SPF
Sender Policy Framework