Back
Flashcards: CompTIA Acronyms
CIA
Confidentiality, Integrity, Availability
ACVs
Access Control Vestibules
FISMA
Federal Information Security Management Act
SIEM
Security Information Event Management
SEM
Security Event Management
SIM
Security Information Management
UBA
User Behavior Analysis
WORM
Write Once Read Many
KBA
Knowledge-Based Authentication
PKI
Public Key Infrastructure
HMAC
Hash-Based Message Authentication Code
HOTP
HMAC-Based One-Time Password
TOTP
Time-Based One-Time Password
FAR
False Acceptance Rate
FRR
False Rejection Rate
CER
Crossover Error Rate
PAM
Privileged Access Management
SSO
Single Sign-On
KDC
Key Distribution Center
TGT
Ticket-Granting Tickets
SAML
Security Assertion Markup Language
XML
Extensible Markup Language
OAuth
Open Standard For Authorization
OpenID
Open Standard For Authentication
OIDC
Openid Connection
JSON
Javascript Object Notation
JWT
Json Web Token
DAC
Discretionary Access Control
MAC
Mandatory Access Control
ABAC
Attribute-Based Access Control
role-BAC
Role-Based Access Control
SIDs
Security Identifiers
DACL
Discretionary Access Control List
ACE
Access Control Entries
MAC
Media Access Control, Mandatory Access Control & Message Authentication Code.
ABAC
Attribute-Based Access Control.
SDN
Software-Defined Networks
TCP
Transmission Control Protocol
UDP
User Datagram Protocol
IP
Internet Protocol
ICMP
Internet Control Message Protocol
ARP
Address Resolution Protocol
RTP
Real-Time Transport Protocol
SRTP
Secure Real-Time Transport Protocol
SIP
Session Initiation Protocol
FTP
File Transfer Protocol.
TFTP
Trivial File Transfer Protocol.
SSH
Secure Shell
SSL
Secure Sockets Layer
TLS
Transport Layer Security
IPsec
Internet Protocol Security
SFTP
Secure File Transfer Protocol
FTPS
File Transfer Protocol Secure
POODLE
Padding Oracle On Downgraded Legacy Encryption
AH
Authentication Header
ESP
Encapsulating Security Payload
IKE
Internet Key Exchange
SMTP
Simple Mail Transfer Protocol
POP3
Post Office Protocol v3
IMAP4
Internet Message Access Protocol v4
HTTP
Hypertext Transfer Protocol
HTTPS
Http Over SSL/TLS
AD DS
Microsoft Active Directory Domain Services
LDAP
Lightweight Directory Access Protocol
LDAPS
LDAP Secure
RDP
Remote Desktop Protocol
NTP
Network Time Protocol
SNTP
Simple NTP
DHCP
Dynamic Host Configuration Protocol
DNS
Domain Name System
BIND
Berkeley Internet Name Domain
SOA
Start Of Authority
CNAME
Canonical Name
PTR
Pointer Record For Reverse Queries
STP
Spanning Tree Protocol
RSTP
Rapid STP
BPDU
Bridge Protocol Data Unit
ACLs
Access Control Lists
NICs
Network Interface Cards
WAF
Web Application Firewall
NGFW
Next-Generation Firewall
NAT
Network Address Translation
PAT
Port Address Translation
VLANs
Virtual Local Area Networks
UTM
Unified Threat Management
SNMPv3
Simple Network Management Protocol Version 3
IDSs
Intrusion Detection Systems
HIDS
Host-Based Intrusion Detection System
NIDS
Network-Based Intrusion Detection System
IPSs
Intrusion Prevention System
SSID
Service Set Identifier
AP
Access Point
WAN
Wide Area Network
WEP
Wired Equivalent Privacy
WPA
Wifi Protected Access
WPA2
Wi-Fi Protected Access 2
WPA3
Wi-Fi Protected Access 3
AES
Advanced Encryption Standard
CCMP
Counter-Mode/Cbc-Mac Protocol
PSK
Pre-Shared Key
SAE
Simultaneous Authentication Of Equals
EAP
Extensible Authentication Protocol
PMK
Pairwise Master Key
PEAP
Protected EAP
EAP-FAST
EAP-Flexible Authentication Via Secure Tunneling
EAP-TLS
EAP-Transport Layer Security
EAP-TTLS
EAP-Tunneled TLS
IV
Initialization Vector
VPN
Virtual Private Network
L2TP
Layer 2 Tunneling Protocol
NAC
Network Access Control
PAP
Password Authentication Protocol
CHAP
Challenge Handshake Authentication Protocol
RADIUS
Remote Authentication Dial-In User Service
TACACS+
Terminal Access Controller Access-Control System Plus
AAA
Authentication, Authorization, And Accounting
VMs
Virtual Machines
ROI
Return On Investment
EDR
Endpoint Detection And Response
ETDR
Endpoint Threat Detection And Response
MDM
Mobile Device Management
API
Application Programming Interface
FDE
Full Disk Encryption
SEDs
Self-Encrypting Drives
UEFI
Unified Extensible Firmware Interface
TPM
Trusted Platform Module
RSA
Rivest, Shamir, Adleman
HSM
Hardware Security Module
DLP
Data Loss Prevention
DRM
Digital Rights Management
SaaS
Software as a Service
PaaS
Platform as a Service
Iaas
Infrastructure as a Service
Xaas
Anything as a Service
MSP
Managed Service Provider
CSP
Cloud Service Provider
VPC
Virtual Private Cloud
CASB
Cloud Access Security Broker
PII
Personally Identifiable Information
SWG
Secure Web Gateway
OSI
Open Systems Interconnection
SDN
Software-Defined Networking
SDV
Software-Defined Visibility
CSA
Cloud Security Alliance
CCSK
Certificate of Cloud Security Knowledge
CCM
CSA Cloud Controls Matrix
COPE
Corporate-Owned, Personally Enabled
BYOD
Bring Your Own Device
CYOD
Choose Your Own Device
NFC
Near Field Communication
RFID
Radio Frequency Identification
USB
Universal Serial Bus
UEM
Unified Endpoint Management
SMS
Short Message Service
MMS
Multimedia Message Service
RCS
Rich Communication Services
SEAndroid
Security-Enhanced Android
SELinux
Security-Enhanced Linux
FPGA
Field Programmable Gate Array
SCADA
Supervisory Control And Data Acquisition
ICS
Industrial Control System
UAVs
Unmanned Aerial Vehicles
SoC
System On A Chip
RTOS
Real-Time Operating System
APT
Advanced Persistent Threat
PUPs
Potentially Unwanted Programs
OSINT
Open Source Intelligence
TAXII
Trusted Automated Exchange Of Indicator Information
STIX
Structured Threat Information Expression
AIS
Automated Indicator Sharing
RFC
Request For Comments
TTPs
Tactics, Techniques, And Procedures
C2
Command And Control
RAT
Remote Access Trojan
MITRE ATT&CK
Adversarial Tactics, Techniques & Common Knowledge
DoS
Denial-Of-Service
DDoS
Distributed Denial-Of-Service
OT
Operational Technology
OWASP
Open Web Application Security Project
SDKs
Software Development Kits
SQL
Structured Query Language
SOAR
Secure Orchestration, Automation, and Response
VBA
Visual Basic for Applications
SSH
Secure Shell
DLL
Dynamic Link Library
LDAP
Lightweight Directory Access Protocol
XML
Extensible Markup Language
XSS
Cross-Site Scripting
XSRF
Cross-Site Request Forgery
SSRF
Server-Side Request Forgeries
CSRF
Client-Side Request Forgeries
AI
Artificial Intelligence
ML
Machine Learning
IP
Intellectual Property
SLE
Single Loss Expectancy
ARO
Annual Rate Of Occurrence
ALE
Annual Loss Expectancy
CVE
Common Vulnerabilities and Exposures
CVSS
Common Vulnerability Scoring System
SCAP
Security Content Automation Protocol
NVD
National Vulnerability Database
IPFIX
IP Flow Information Export
PCI DSS
Payment Card Industry Data Security Standard
SOC
System and Organization Controls
BeEF
Browser Exploitation Framework
w3af
Web Application Attack and Audit Framework
EMI
Electromagnetic Interference
RAID
Redundant Array of Independent Disks
NAS
Network-Attached Storage
SAN
Storage Area Network
BIA
Business Impact Analysis
BCP
Business Continuity Plan
MTBF
Mean Time Between Failures
MTTR
Mean Time To Repair
COOP
Continuity Of Operations Planning
DRP
Disaster Recovery Plan
MD5
Message Digest 5
SHA
Secure Hash Algorithms
NSA
National Security Agency
HMAC
Hash-Based Message Authentication Code
PBKDF2
Password-Based Key Derivation Function 2
AES
Advanced Encryption Standard
DES
Data Encryption Standard
NIST
National Institute of Standards and Technology
QKD
Quantum Key Distribution
DSA
Digital Signature Algorithm
CMS
Cryptographic Message Syntax
CA
Certificate Authority
ECC
Elliptic Curve Cryptography
OCSP
Online Certificate Status Protocol
CRL
Certificate Revocation List
CSR
Certificate Signing Request
SAN
Subject Alternative Name
EV
Extended Validation
CER
Canonical Encoding Rules
NDA
Non-Disclosure Agreement
AUPs
Acceptable Use Policies
SLA
Service Level Agreement
MOU
Memorandum Of Understanding
BPA
Business Partners Agreement
MSA
Measurement Systems Analysis
CIRT
Computer Incident Response Team
GDPR
General Data Protection Regulation
SSN
Social Security Number
HIPAA
Health Insurance Portability and Accountability Act
GLBA
Gramm-Leach Bliley Act
SOX
Sarbanes-Oxley Act
CTF
Capture The Flag
DER
Distinguished Encoding Rules