Looking for CYSA+ acronyms? https://certification.tips/2020/02/18/comptia-cysa-acronyms
2FA Two-Factor Authentication
3DES Triple Digital Encryption Standard
AAA Authentication, Authorization and Accounting
AAR After Action Report
ACL Access Control List
AD Active Directory
AES Advanced Encryption Standard
AH Authentication Header
AJAX Asynchronous JavaScript and XML
ALE Annualized Loss Expectancy
AP Access Point
API Application Programming Interface
APT Advanced Persistent Threat
ARO Annualized Rate of Occurrence
ARP Address Resolution Protocol
ASLR Address Space Layout Randomization
AUP Acceptable Use Policy
AV Antivirus
B2B Business-to-Business
BCP Business Continuity Planning
BGP Border Gateway Protocol
BIA Business Impact Analysis
BIOS Basic Input/Output System
BPA Business Partnership Agreement
BPM Business Process Management
BYOD Bring Your Own Device
CA Certificate Authority
CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart
CASB Cloud Access Security Broker
CBC Cipher Block Chaining
CCMP Counter-Mode/CBC-Mac Protocol
CCTV Closed-Circuit Television
CERT Computer Emergency Response Team
CFB Cipher Feedback
CHAP Challenge Handshake Authentication Protocol
CIA Confidentiality, Integrity and Availability
CIFS Common Internet File System
CIRT Computer Incident Response Team
CISO Chief Information Security Officer
CLI Command Line Interface
CMDB Configuration Management Database
CMS Content Management System
COOP Continuity of Operations
COPE Corporate Owned, Personally Enabled
COTS Commercial Off-the-Shelf
CRC Cyclical Redundancy Check
CredSSP Credential Security Support Provider
CRL Certification Revocation List
CRM Customer Resource Management
CSP Cloud Service Provider
CSP Cryptographic Service Provider
CSRF Cross-Site Request Forgery
CTR Counter Mode
CVE Collaborative Virtual Environment
CYOD Choose Your Own Device
DAC Discretionary Access Control
DAM Database Activity Monitoring
DAR Data at Rest
DDoS Distributed Denial of Service
DEP Data Execution Prevention
DES Digital Encryption Standard
DHCP Dynamic Host Configuration Protocol
DKIM Domain Keys Identified Mail
DLL Dynamic Link Library
DLP Data Loss Prevention
DMZ Demilitarized Zone
DNS Domain Name Service
DOM Document Object Model
DoS Denial of Service
DRP Disaster Recovery Plan
DSA Digital Signature Algorithm
EAP Extensible Authentication Protocol
ECB Event Control Block
ECC Elliptic Curve Cryptography
EDR Endpoint Detection Response
EFS Encrypted File System
EMI Electromagnetic Interference
ERP Enterprise Resource Planning
ESA Enterprise Security Architecture
ESB Enterprise Service Bus
ESP Encapsulated Security Payload
EV Extended Validation (Certificate)
FDE Full Disk Encryption
FIM File Integrity Monitoring
FTP File Transfer Protocol
GPG GNU Privacy Guard
GPO Group Policy Object
GPU Graphic Processing Unit
GRC Governance, Risk and Compliance
GRE Generic Routing Encapsulation
GUI Graphical User Interface
HDD Hard Disk Drive
HIDS Host-based Intrusion Detection System
HIPS Host-based Intrusion Prevention System
HMAC Hashed Message Authentication Code
HOTP HMAC-based One-Time Password HSM Hardware Security Module
HSTS HTTP Strict Transport Security
HVAC Heating, Ventilation and Air Conditioning
IaaS Infrastructure as a Service
ICMP Internet Control Message Protocol
ICS Industrial Control System
IDE Integrated Development Environment
IdM Identity Management
IdP Identity Provider
IDS Intrusion Detection System
IETF Internet Engineering Task Force
IKE Internet Key Exchange
IM Instant Messaging
IMAP Internet Message Access Protocol
INE Inline Network Encryptor
IOC Indicator of Compromise
IoT Internet of Things
IP Internet Protocol
IPMI Internet Protocol Multicast Initiative
IPS Intrusion Prevention Systems
IPSec Internet Protocol Security
IR Incident Response
IRC Internet Relay Chat
IS-IS Intermediate System to Intermediate System
ISA Interconnection Security Agreement
ISAC Information Sharing Analysis Center
ISMS Information Security Management System
ISP Internet Service Provider
IV Initialization Vector
JSON JavaScript Object Notation
KDC Key Distribution Center
KPI Key Performance Indicator
KRI Key Risk Indicator
KVM Keyboard, Video, Mouse
LAN Local Area Network
L2TP Layer 2 Tunneling Protocol
LDAP Lightweight Directory Access Protocol
LEAP Lightweight Extensible Authentication Protocol
LTE Long-Term Evolution
LUN Logical Unit Number
MAC Mandatory Access Control
MAC Media Access Control
MAC Message Authentication Code
MAM Mobile Application Management
MAN Metropolitan Area Network
MBR Master Boot Record
MD5 Message Digest 5
MDM Mobile Device Management
MEAP Mobile Enterprise Application Platform
MFA Multifactor Authentication
MFD Multifunction Device
MITM Man in the Middle
MOA Memorandum of Agreement
MOU Memorandum of Understanding
MPLS Multiprotocol Label Switching
MSA Master Service Agreement
MSCHAP Microsoft Challenge Handshake Authentication Protocol
MSS Managed Security Service
MSSP Managed Security Service Provider
MTA Message Transfer Agent
MTBF Mean Time Between Failure
MTD Maximum Tolerable Downtime
MTP Media Transfer Protocol
MTTR Mean Time to Recovery
MTU Maximum Transmission Unit
NAC Network Access Control
NAS Network Attached Storage
NAT Network Address Translation
NDA Non-Disclosure Agreement
NFC Near Field Communication
NFS Network File System
NGFW Next Generation Firewall
NIDS Network Intrusion Detection System
NIPS Network Intrusion Prevention System
NIST National Institute of Standards and Technology
NLA Network-Level Authentication
NOS Network Operating System
NSP Network Service Provider
NTFS New Technology File System
NTLM New Technology LAN Manager
NTP Network Time Protocol
OCSP Online Certificate Status Protocol
OLA Operating-Level Agreement
OOB Out-of-Band
OS Operating System
OSI Open Systems Interconnection
OSPF Open Shortest Path First
OTP One-Time Password
OVAL Open Vulnerability Assessment Language
OWASP Open Web Application Security Project
P2P Peer-to-Peer
PaaS Platform as a Service
PAP Password Authentication Protocol
PAT Port Address Translation
PBKDF2 Password-Based Key Derivation Function 2
PBX Private Branch Exchange
PCI-DSS Payment Card Industry Data Security Standard
PDP Policy Distribution Point
PEAP Protected Extensible Authentication Protocol
PEP Policy Enforcement Point
PFS Perfect Forward Secrecy
PGP Pretty Good Privacy
PII Personal Identifiable Information
PIP Policy Information Point
PIR Post Incident Report
PKI Public Key Infrastructure
PLC Programmable Logic Controller
POC Proof of Concept
POTS Plain Old Telephone Service
PPP Point-to-Point Protocol
PPTP Point-to-Point Tunneling Protocol
PSK Pre-Shared Key QA Quality Assurance
QoS Quality of Service
R&D Research and Development
RA Recovery Agent
RA Registration Authority
RADIUS Remote Authentication Dial-in User Server
RAID Redundant Array of Inexpensive/Independent Disks
RAS Remote Access Server
RBAC Role-Based Access Control
RBAC Rule-Based Access Control
RDP Remote Desktop Protocol
REST Representational State Transfer
RFC Request for Comments
RFI Request for Information
RFID Radio Frequency Identification
RFP Request for Proposal
RFQ Request for Quote
ROI Return on Investment
RPO Recovery Point Objective
RSA Rivest, Shamir and Adleman
RTBH Remotely Triggered Black Hole
RTO Recovery Time Objective
RTP Real-time Transport Protocol
S/MIME Secure/Multipurpose Internet Mail Extensions
SaaS Software as a Service
SAML Security Assertions Markup Language
SAN Subject Alternative Name
SAN Storage Area Network
SAS Statement on Auditing Standards
SATCOM Satellite Communications
SCADA Supervisory Control and Data Acquisition
SCAP Security Content Automation Protocol
SCEP Simple Certificate Enrollment Protocol
SCP Secure Copy SCSI Small Computer System Interface
SDL Security Development Life Cycle
SDLC Software Development Life Cycle
SED Self-Encrypting Drive
SELinux Security Enhanced Linux
SFTP Secure File Transfer Protocol
SHA Secure Hashing Algorithm
SIEM Security Information Event Management
SIM Subscriber Identity Module
SIP Session Initiation Protocol
SLA Service-Level Agreement
SLE Single Loss Expectancy
SMB Server Message Block
SMS Short Message Service
SMTP Simple Mail Transfer Protocol
SNAT Source Network Address Translation
SNMP Simple Network Management Protocol
SOA Service-Oriented Architecture
SOA Start of Authority
SOA Statement of Applicability
SOAP Simple Object Access Protocol
SOC Security Operations Center
SOC Service Organization Controls
SOE Standard Operating Environment
SOP Standard Operating Procedure
SOW Statement of Work
SOX Sarbanes-Oxley Act of 2002
SP Service Provider
SPIM Spam over Internet Messaging
SPML Service Provisioning Markup Language
SRTM Security Requirements Traceability Matrix
SRTP Secure Real-Time Protocol
SRV Service Records
SSD Solid State Drive
SSDLC Security System Development Life Cycle
SSH Secure Shell
SSID Service Set Identifier
SSL Secure Sockets Layer
SSO Single Sign-On
SSP Storage Service Provider
TACACS Terminal Access Controller Access Control System
TCO Total Cost of Ownership
TCP/IP Transmission Control Protocol/Internet Protocol
TKIP Temporal Key Integrity Protocol
TLS Transport Layer Security
TOC/TOU Time of Check/Time of Use
TOS Type of Service
TOTP Time-based One-Time Password
TPM Trusted Platform Module
TSIG Transaction Signature Interoperability Group
TTR Time to Restore
UAC User Access Control
UAT User Acceptance Testing
UDP User Datagram Protocol
UEFI Unified Extensible Firmware Interface
UPS Uninterruptable Power Supply
URL Universal Resource Locator
USB Universal Serial Bus
UTM Unified Threat Management
VDI Virtual Desktop Infrastructure
VLAN Virtual Local Area Network
VM Virtual Machine
VMFS VMware File System
VNC Virtual Network Connection
VoIP Voice over IP
VPN Virtual Private Network
VRRP Virtual Router Redundancy Protocol
vSAN Virtual Storage Area Network
VTC Video Teleconferencing
vTPM Virtual Trusted Platform Module
WAF Web Application Firewall
WAP Wireless Access Point
WAYF Where Are You From
WEP Wired Equivalent Privacy
WIDS Wireless Intrusion Detection System
WIPS Wireless Intrusion Prevention System
WMI Windows Management Interface
WPA Wireless Protected Access
WRT Work Recovery Time
WSDL Web Services Description Language
XACML eXtensible Access Control Markup Language
XHR XMLHttpRequest
XMPP eXtensible Messaging and Presence Protocol
XSS Cross-Site Scripting
Looking for online I.T. training? Visit itmasterkey.com