CompTIA CYSA+ Acronyms

Looking for security+ acronyms?

https://certification.tips/2020/01/26/comptia-security-acronyms/(opens in a new tab)

ACL Access Control List

ARP Address Resolution Protocol

BYOD Bring Your Own Device

CIS Center for Internet Security

CoBiT Control Objectives for Information and Related Technology

CCTV Closed-Circuit Television

CRM Customer Relations Management

DDoS Distributed Denial of Service

DNS Domain Name Service

EMET Enhanced Mitigation Experience Toolkit

FISMA Federal Information Security Management Act

FTK Forensic Tool Kit

FTP File Transfer Protocol

HBSS Host Based Security System

HIDS Host Intrusion Detection System

HIPS Host Intrusion Prevention System

HR Human Resources

ICS Industrial Control Systems

IDS Intrusion Detection System

IMAP Internet Message Access Protocol

IOC Indicator of Compromise

IPS Intrusion Prevention System

ISO International Organization for Standardization

ITIL Information Technology Infrastructure Library

LDAP Lightweight Directory Access Protocol

MAC Mandatory Access Control

MD5 Message Digest 5

MOA Memorandum Of Agreement

MOU Memorandum Of Understanding

MRTG Multi Router Traffic Grapher

NAC Network Access Control

NAXSI Nginx Anti XSS & SQL Injection

NIC Network Interface Card

NIDS Network Intrusion Detection System

NIST National Institute of Standards & Technology

OEM Original Equipment Manufacturer

OSSIM Open Source Security Information Management

OWASP Open Web Application Security Project

PAM Pluggable Authentication Module

PCA Prinicpal Component Analysis

PCI Payment Card Industry

PHI Protected Health Information

PII Personally Identifiable Information

RACI Responsible, Accountable, Consulted and Informed

RADIUS Remote Authentication Dial-In User Service

SABSA Sherwood Applied Business Security Architecture

SANS System Administration, Networking, and Security Institute

SCADA Supervisory Control and Data Acquisition

SCAP Security Content Automation Protocol

SDLC Software Development Life Cycle

SEO Search Engine Optimization

SHA Secure Hash Algorithm

SIEM Security Incident and Event Manager

SLA Service Level Agreement

SOC Security Operations Center

SPF Sender Policy Framework

SSH Secure Shell

SSL Secure Sockets Layer

TACACS+ Terminal Access Controller Access Control System Plus

TFTP Trivial File Transfer Protocol

TLS Transport Layer Security

TOGAF The Open Group Architecture Framework

USB Universal Serial Bus

VAS Vulnerability Assessment System

VDI Virtual Desktop Infrastructure

VLAN Virtual Local Area Network

VPN Virtual Private Network

WAF Web Application Firewall

Looking for online I.T. training? Visit itmasterkey.com