Sec+ Acronyms + Definitions
A
AAA (Authentication, Authorization, and Accounting) β A security framework that controls access to resources, verifies identity, and logs activity.
ACL (Access Control List) β A list of rules that define permissions for accessing network resources.
AES (Advanced Encryption Standard) β A symmetric encryption algorithm widely used for secure data encryption.
AH (Authentication Header) β A component of IPSec that ensures integrity and authenticity of packets.
APT (Advanced Persistent Threat) β A prolonged cyberattack where an attacker gains undetected access to a network.
ARP (Address Resolution Protocol) β A protocol that maps IP addresses to MAC addresses.
ASLR (Address Space Layout Randomization) β A security technique that randomizes memory addresses to prevent exploitation.
B
BCP (Business Continuity Planning) β A strategy for maintaining operations during disruptions.
BIA (Business Impact Analysis) β Identifies critical business functions and potential impacts of disruptions.
BIOS (Basic Input/Output System) β Firmware that initializes hardware before the OS loads.
BYOD (Bring Your Own Device) β A policy allowing employees to use personal devices at work.
C
CAC (Common Access Card) β A smart card used for authentication in government networks.
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) β A test to differentiate humans from bots.
CBC (Cipher Block Chaining) β A mode of encryption that uses the previous ciphertext block for encryption.
CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) β A security protocol used in WPA2 for wireless encryption.
CCTV (Closed-Circuit Television) β A video surveillance system used for security monitoring.
CHAP (Challenge Handshake Authentication Protocol) β A protocol that verifies user identity through challenge-response authentication.
CIA (Confidentiality, Integrity, Availability) β The core principles of cybersecurity.
CIRT (Computer Incident Response Team) β A team that responds to security incidents.
CISO (Chief Information Security Officer) β An executive responsible for an organizationβs security strategy.
CSRF (Cross-Site Request Forgery) β A web attack where an attacker tricks a user into making unauthorized requests.
CSP (Cloud Service Provider) β A company that offers cloud-based services like storage, computing, and networking.
CSR (Certificate Signing Request) β A request sent to a certificate authority to obtain a digital certificate.
CTF (Capture The Flag) β A cybersecurity competition that challenges participants to solve security-related tasks.
CVSS (Common Vulnerability Scoring System) β A standardized system for assessing the severity of security vulnerabilities.
D
DAC (Discretionary Access Control) β A security model where owners set access permissions.
DDoS (Distributed Denial of Service) β An attack that overwhelms a system with traffic.
DEP (Data Execution Prevention) β A security feature that prevents code execution in certain memory areas.
DES (Data Encryption Standard) β An outdated encryption algorithm replaced by AES.
DHCP (Dynamic Host Configuration Protocol) β Assigns IP addresses to devices on a network.
DLP (Data Loss Prevention) β A strategy to prevent unauthorized data transfers.
DMZ (Demilitarized Zone) β A network segment that isolates public-facing services from an internal network.
DNS (Domain Name System) β Translates domain names into IP addresses.
DoS (Denial of Service) β An attack that disrupts system availability.
DRP (Disaster Recovery Plan) β A plan to restore IT systems after a disaster.
DSA (Digital Signature Algorithm) β A cryptographic algorithm used for digital signatures.
DSS (Digital Signature Standard) β A federal standard for digital signatures.
This is just the first partβlet me know if you want me to continue with the rest or format it differently! π₯
4o
You said:
keep going
ChatGPT said:
Gotcha! Here's the rest of the definitions:
E
EAP (Extensible Authentication Protocol) β A framework that supports various authentication methods like passwords, biometrics, and certificates.
EDR (Endpoint Detection and Response) β A security solution focused on detecting and responding to threats on devices like computers and smartphones.
EFS (Encrypting File System) β A Windows feature for encrypting files on a computer.
EMS (Enterprise Mobility Suite) β A suite of tools for managing mobile devices, apps, and data in an enterprise environment.
ERP (Enterprise Resource Planning) β Software used to manage and automate core business processes.
F
FAR (False Acceptance Rate) β The rate at which unauthorized users are incorrectly granted access in biometric systems.
FDE (Full Disk Encryption) β The process of encrypting an entire disk to protect data at rest.
FIM (File Integrity Monitoring) β A security process that checks for unauthorized changes to files.
FTP (File Transfer Protocol) β A protocol for transferring files over a network.
G
GPO (Group Policy Object) β A feature in Windows that defines user and computer configurations.
GPS (Global Positioning System) β A satellite-based navigation system.
GRC (Governance, Risk, and Compliance) β A framework for managing governance, risk, and compliance requirements in an organization.
H
HIDS (Host-Based Intrusion Detection System) β A security system that monitors and analyzes the activity of a single host to detect suspicious behavior.
HMAC (Hash-Based Message Authentication Code) β A mechanism for ensuring the integrity and authenticity of a message using a cryptographic hash function.
HOTP (HMAC-based One-Time Password) β A one-time password algorithm based on HMAC.
HTTPS (Hypertext Transfer Protocol Secure) β A secure version of HTTP that uses encryption (SSL/TLS) to protect data exchanged between a web server and client.
I
IAM (Identity and Access Management) β A framework for managing digital identities and controlling access to resources.
ICMP (Internet Control Message Protocol) β A protocol used for sending control messages, such as error reports and diagnostics, over an IP network.
IDS (Intrusion Detection System) β A system that monitors network traffic for signs of malicious activity.
IEC (International Electrotechnical Commission) β An international organization that develops standards for electrical, electronic, and related technologies.
IKE (Internet Key Exchange) β A protocol used to set up a security association (SA) in the IPSec protocol suite.
IoT (Internet of Things) β A network of physical devices that communicate and exchange data with each other over the internet.
IPSec (Internet Protocol Security) β A suite of protocols used to secure network traffic through encryption and authentication.
IPv4 (Internet Protocol version 4) β The fourth version of IP, widely used for assigning IP addresses.
IPv6 (Internet Protocol version 6) β The latest version of IP that uses a larger address space than IPv4.
J
JIT (Just In Time) β A software development and manufacturing approach that minimizes inventory and delays by producing items only when they are needed.
JWT (JSON Web Token) β A compact, URL-safe token used to securely transmit information between parties as a JSON object.
K
KDC (Key Distribution Center) β A server that manages keys for secure communication in Kerberos authentication.
KPI (Key Performance Indicator) β A measurable value used to assess the success of an organization or project.
L
LAN (Local Area Network) β A network that connects devices within a limited area, such as a home or office.
LDAP (Lightweight Directory Access Protocol) β A protocol used to access and manage directory services, such as contact information in an organization.
LFI (Local File Inclusion) β A vulnerability that allows attackers to include files from the local server on a website, leading to potential code execution.
LKM (Loadable Kernel Module) β A piece of code that can be loaded into the kernel to add functionality to an operating system.
LOLBINs (Living Off the Land Binaries) β Legitimate tools or software used maliciously for an attack.
M
MAC (Media Access Control / Mandatory Access Control) β
Media Access Control: A unique identifier for network interfaces.
Mandatory Access Control: A security model that restricts access to resources based on predefined policies.
MD5 (Message Digest 5) β A widely used cryptographic hash function, though considered insecure due to vulnerability to collisions.
MITM (Man In The Middle) β An attack where an attacker intercepts and potentially alters communications between two parties.
MSSP (Managed Security Services Provider) β A company that provides outsourced monitoring and management of security systems.
MFA (Multi-Factor Authentication) β A security process where users provide two or more verification factors to gain access to a resource.
MPLS (Multi-Protocol Label Switching) β A method for routing data in high-performance networks using labels instead of traditional IP routing.
N
NAC (Network Access Control) β A security approach that regulates access to a network based on predefined policies.
NAT (Network Address Translation) β A method used to modify IP address information in packet headers for routing purposes.
NIDS (Network Intrusion Detection System) β A system that monitors network traffic for signs of malicious activity.
NIST (National Institute of Standards and Technology) β A federal agency that develops standards and guidelines for cybersecurity.
NTFS (New Technology File System) β A file system used by Windows operating systems to manage files on a disk.
Thatβs all the way through "N." You want me to keep going from "O" forward, or is this good for now?
4o mini
You said:
go to z
ChatGPT said:
Alright, hereβs the rest of the list, all the way to Z:
O
OAuth (Open Authorization) β An open standard for access delegation that allows users to grant third-party applications access to their resources without sharing passwords.
OCSP (Online Certificate Status Protocol) β A protocol used to check the revocation status of an X.509 digital certificate in real-time.
OSINT (Open Source Intelligence) β Intelligence gathered from publicly available sources, such as websites, social media, and public records.
OTP (One-Time Password) β A password that is valid for only one login session or transaction, used for secure authentication.
P
P2P (Peer-to-Peer) β A decentralized network model where each participant (peer) acts as both a client and server.
PBKDF2 (Password-Based Key Derivation Function 2) β A cryptographic algorithm used to derive secure keys from a password, commonly used for password hashing.
PCI-DSS (Payment Card Industry Data Security Standard) β A set of security standards designed to ensure that organizations handling card payments protect cardholder data.
PEAP (Protected Extensible Authentication Protocol) β A secure method of authenticating wireless clients that encapsulates EAP within a TLS tunnel.
PKI (Public Key Infrastructure) β A framework for managing digital keys and certificates for secure communications.
PIV (Personal Identity Verification) β A federal government ID card used for identity verification and access control.
PoLP (Principle of Least Privilege) β A security concept that ensures users and systems are only granted the minimum permissions necessary for their tasks.
PT (Penetration Testing) β The practice of testing a system's security by simulating attacks to identify vulnerabilities.
PSA (Public Service Announcement) β A message issued to inform the public about important matters.
PTA (Privacy Threshold Assessment) β A process used to determine whether a system or project collects or uses personal data that requires protection.
Q
QoS (Quality of Service) β A set of techniques used to manage network resources and prioritize traffic to ensure high-quality service.
R
RADIUS (Remote Authentication Dial-In User Service) β A protocol for authentication, authorization, and accounting for remote network access.
RAID (Redundant Array of Independent Disks) β A technology used to combine multiple disk drives into a single unit for redundancy, performance, or both.
RBAC (Role-Based Access Control) β A model for restricting access to resources based on users' roles within an organization.
RFID (Radio Frequency Identification) β A technology used to automatically identify and track objects using radio waves.
RPO (Recovery Point Objective) β The maximum acceptable amount of data loss measured in time.
RTO (Recovery Time Objective) β The maximum acceptable amount of downtime for a system or application after a disaster.
S
SAML (Security Assertion Markup Language) β An XML-based standard used for exchanging authentication and authorization data between parties.
SCADA (Supervisory Control and Data Acquisition) β A system used to monitor and control industrial processes, such as manufacturing and power generation.
SHA (Secure Hash Algorithm) β A family of cryptographic hash functions designed by NIST to provide secure data hashing.
SIEM (Security Information and Event Management) β A system that collects and analyzes security-related data from various sources to detect and respond to incidents.
SIM (Subscriber Identity Module) β A small card used in mobile devices that stores the subscriber's identity and authentication data.
SLA (Service Level Agreement) β A contract that defines the level of service a provider will deliver to a customer.
SOW (Statement of Work) β A document that outlines the scope, deliverables, and timeline for a project.
MOU (Memorandum of Understanding) β A document that outlines the terms and conditions of an agreement between parties.
MOA (Memorandum of Agreement) β A formal document that outlines an agreement between two or more parties.
BPA (Business Partnership Agreement) β A contract that governs the terms of a business relationship between two or more parties.
NDA (Non-Disclosure Agreement) β A legal agreement that prevents parties from disclosing confidential information.
T
TACACS+ (Terminal Access Controller Access-Control System Plus) β A protocol used for centralized authentication, authorization, and accounting in network access systems.
TOTP (Time-Based One-Time Password) β A one-time password that is valid only for a short period, typically used in two-factor authentication.
TLS (Transport Layer Security) β A cryptographic protocol used to secure communication over a computer network.
TPM (Trusted Platform Module) β A hardware-based security feature that provides encryption and secure storage of cryptographic keys.
TTPs (Tactics, Techniques, and Procedures) β A framework used to describe the behavior and methods of attackers in cybersecurity.
U
UEBA (User and Entity Behavior Analytics) β A security technology that uses machine learning to detect unusual behavior patterns in users and entities.
UDP (User Datagram Protocol) β A connectionless protocol used for transmitting data in real-time applications, such as video streaming and VoIP.
UPS (Uninterruptible Power Supply) β A device that provides backup power to critical systems during power outages.
URL (Uniform Resource Locator) β The address used to access resources on the internet.
V
VLAN (Virtual Local Area Network) β A logical network created within a physical network to segment traffic for security or performance reasons.
VPN (Virtual Private Network) β A secure network connection that allows remote access to an internal network over the internet.
VPC (Virtual Private Cloud) β A private network within a public cloud, allowing users to isolate and secure resources.
VRRP (Virtual Router Redundancy Protocol) β A protocol that provides high availability for routers by assigning a virtual IP address to a group of routers.
W
WAF (Web Application Firewall) β A security system that monitors and filters HTTP traffic to and from a web application.
WAN (Wide Area Network) β A network that covers a large geographic area, often used to connect multiple local networks.
WEP (Wired Equivalent Privacy) β An outdated wireless security protocol for Wi-Fi networks, vulnerable to attacks.
WPA (Wi-Fi Protected Access) β A security protocol designed to secure wireless networks, more secure than WEP.
X
XSS (Cross-Site Scripting) β A vulnerability that allows attackers to inject malicious scripts into web pages viewed by users.
XML (Extensible Markup Language) β A flexible text-based format used to store and transport data in a structured manner.
Z
ZTA (Zero Trust Architecture) β A security model that assumes no device or user can be trusted by default, requiring strict verification for access to any network resource