Security+ All Acronyms

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/328

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

329 Terms

1
New cards

IEEE

Institute of Electrical and Electronics Engineers: Professional association for electronic engineering

2
New cards

RACE

Research and Development in Advanced Communications Technologies in Europe: European initiative for communications research

3
New cards

321

321

4
New cards

456

456

5
New cards

AI

Artificial Intelligence: Computer systems performing tasks requiring human intelligence

6
New cards

IM

Instant Messaging: Real-time text transmission over networks

7
New cards

ML

Machine Learning: AI technique enabling systems to learn from data

8
New cards

MMS

Multimedia Message Service: Standard for sending messages with multimedia content

9
New cards

SMS

Short Message Service: Text messaging service component

10
New cards

MSP

Managed Service Provider: Company managing IT services for other organizations

11
New cards

MSSP

Managed Security Service Provider: Company providing outsourced security monitoring

12
New cards

WO

Work Order: Formal request for work to be completed

13
New cards

123

123

14
New cards

CIO

Chief Information Officer: Executive responsible for information technology strategy

15
New cards

CSO

Chief Security Officer: Executive responsible for security of personnel, data, and assets

16
New cards

CTO

Chief Technology Officer: Executive responsible for technological needs and R&D

17
New cards

DBA

Database Administrator: Person responsible for database management

18
New cards

DPO

Data Privacy Officer: Person responsible for data protection compliance

19
New cards

ISSO

Information Systems Security Officer: Person responsible for information systems security

20
New cards

CSRF

Cross-site Request Forgery: Attack tricking users into executing unwanted actions

21
New cards

HTML

Hypertext Markup Language: Standard markup language for web pages

22
New cards

SHTTP

Secure Hypertext Transfer Protocol: Alternative to HTTP for secure communications

23
New cards

SOAP

Simple Object Access Protocol: Protocol for exchanging structured information

24
New cards

SQLi

SQL Injection: Code injection technique targeting databases

25
New cards

SWG

Secure Web Gateway: Security solution filtering web traffic

26
New cards

URI

Uniform Resource Identifier: String identifying a resource

27
New cards

URL

Universal Resource Locator: Reference to a web resource

28
New cards

WAF

Web Application Firewall: Appliance monitoring and filtering HTTP traffic

29
New cards

XML

Extensible Markup Language: Markup language defining rules for document encoding

30
New cards

XSS

Cross-site Scripting: Security vulnerability allowing injection of client-side scripts

31
New cards

CCMP

Counter Mode/CBC-MAC Protocol: Encryption protocol for wireless networks

32
New cards

TKIP

Temporal Key Integrity Protocol: Security protocol for wireless LANs

33
New cards

WAP

Wireless Access Point: Networking hardware device for connecting wireless devices

34
New cards

WEP

Wired Equivalent Privacy: Deprecated security algorithm for wireless networks

35
New cards

WIDS

Wireless Intrusion Detection System: System detecting unauthorized wireless access

36
New cards

WIPS

Wireless Intrusion Prevention System: System preventing unauthorized wireless access

37
New cards

WPA

Wi-Fi Protected Access: Security certification program for wireless networks

38
New cards

WPS

Wi-Fi Protected Setup: Network security standard for simplified connections

39
New cards

WTLS

Wireless TLS: Security layer for WAP applications

40
New cards

DKIM

DomainKeys Identified Mail: Email authentication method

41
New cards

DMARC

Domain Message Authentication Reporting and Conformance: Email authentication protocol

42
New cards

PHI

Personal Health Information: Health data that can identify individuals

43
New cards

SPF

Sender Policy Framework: Email validation system

44
New cards

SPIM

Spam over Internet Messaging: Unsolicited messages sent through messaging platforms

45
New cards

BIOS

Basic Input/Output System: Firmware initializing hardware during booting

46
New cards

CCTV

Closed-circuit Television: Video system for surveillance

47
New cards

FPGA

Field Programmable Gate Array: Integrated circuit designed to be configured after manufacturing

48
New cards

GPS

Global Positioning System: Satellite-based navigation system

49
New cards

GPU

Graphics Processing Unit: Specialized processor for graphics rendering

50
New cards

HDD

Hard Disk Drive: Data storage device using magnetic storage

51
New cards

HVAC

Heating, Ventilation Air Conditioning: System controlling indoor environment conditions

52
New cards

ICS

Industrial Control Systems: Systems controlling industrial processes

53
New cards

IoT

Internet of Things: Network of physical objects embedded with sensors and software

54
New cards

MBR

Master Boot Record: Special boot sector at the beginning of a drive

55
New cards

MFD

Multifunction Device: Hardware performing multiple functions

56
New cards

MFP

Multifunction Printer: Printer combining multiple functionalities

57
New cards

OT

Operational Technology: Hardware/software controlling physical devices

58
New cards

PDU

Power Distribution Unit: Device distributing electric power

59
New cards

PTZ

Pan-tilt-zoom: Camera movement capabilities

60
New cards

RAID

Redundant Array of Inexpensive Disks: Data storage technology combining multiple disks

61
New cards

RFID

Radio Frequency Identifier: Technology using radio waves for identification

62
New cards

SCADA

Supervisory Control and Data Acquisition: System for remote monitoring and control

63
New cards

SoC

System on Chip: Integrated circuit incorporating system components

64
New cards

SSD

Solid State Drive: Storage device using integrated circuits

65
New cards

UAV

Unmanned Aerial Vehicle: Aircraft without human pilot aboard

66
New cards

UEFI

Unified Extensible Firmware Interface: Specification for software interface between OS and firmware

67
New cards

UPS

Uninterruptable Power Supply: Electrical apparatus providing emergency power

68
New cards

USB

Universal Serial Bus: Industry standard for cables, connectors, and protocols

69
New cards

CIA

Confidentiality, Integrity, Availability: Fundamental security model

70
New cards

ISO

International Standards Organization: Organization developing and publishing standards

71
New cards

789

789

72
New cards

987

987

73
New cards

API

Application Programming Interface: Interface allowing applications to communicate

74
New cards

ASLR

Address Space Layout Randomization: Security technique to prevent exploitation of memory corruption

75
New cards

BASH

Bourne Again Shell: Unix shell and command language

76
New cards

CMS

Content Management System: Software managing digital content creation and modification

77
New cards

DEP

Data Execution Prevention: Security feature preventing code execution from non-executable memory

78
New cards

DLL

Dynamic Link Library: Microsoft's implementation of shared library concept

79
New cards

ERP

Enterprise Resource Planning: Business process management software

80
New cards

NTFS

New Technology File System: Microsoft Windows file system

81
New cards

OS

Operating System: Software managing computer hardware and software resources

82
New cards

RAD

Rapid Application Development: Adaptive software development approach

83
New cards

RTOS

Real-time Operating System: Operating system guaranteeing processing within time constraints

84
New cards

SDK

Software Development Kit: Development tools for creating applications

85
New cards

SDLC

Software Development Lifecycle: Process for planning, creating, testing, and deploying software

86
New cards

SDLM

Software Development Lifecycle Methodology: Framework defining development process

87
New cards

SE Linux

Security-enhanced Linux: Linux kernel security module providing access control

88
New cards

SEH

Structured Exception Handler: Windows mechanism for exception handling

89
New cards

SQL

Structured Query Language: Domain-specific language for database management

90
New cards

TOC

Time-of-check: Vulnerability in time window between verification and use

91
New cards

UAT

User Acceptance Testing: Testing phase where actual users test the system

92
New cards

VBA

Visual Basic: Programming language from Microsoft

93
New cards

AP

Access Point: Device enabling wireless devices to connect to wired networks

94
New cards

CSU

Channel Service Unit: Digital interface device connecting terminal equipment

95
New cards

DSL

Digital Subscriber Line: Technology for transmitting digital data over telephone lines

96
New cards

IDF

Intermediate Distribution Frame: Framework housing telecommunications equipment

97
New cards

ISP

Internet Service Provider: Organization providing internet access

98
New cards

LAN

Local Area Network: Network spanning a small geographic area

99
New cards

MAN

Metropolitan Area Network: Network spanning a city or large campus

100
New cards

MDF

Main Distribution Frame: Primary connecting point for telecommunications wiring