Shared Flashcard Set

Details

Acronyms
Acronyms
203
Computer Science
Professional
01/31/2015

Additional Computer Science Flashcards

 


 

Cards

Term
802.1x
Definition
A port-based authentication protocol. Wireless can use 802.1x. For example, WPA2-Enterprise mode uses an 802.1x server (implemented as a radius server) to add authentication.
Term
3DES
Definition
Triple Digital Encryption Standard
Term
AAA
Definition
Authentication, Authorization, and Accounting
Term
ACE
Definition
Access Control Entry
Term
ACL
Definition
Access Control List
Term
AES
Definition
Advanced Encryption Standard
Term
AES256
Definition
Advanced Encryption Standard 256 bit
Term
AH
Definition
Authentication Header
Term
ALE
Definition
Annualized Loss Expectancy. Used to measure risk with annualized rate of occurrence (ARO) and single loss expectancy (SLE). The ALE identifies the total amount of loss expected for a given risk. The calculation is SLExARO=ALE
Term
AP
Definition
Access point, short for wireless access point (WAP)
Term
ARO
Definition
Annualized Rate of Occurrence. Used to measure risk with ALE and SLE. The ARO identifies how many times a loss is expected to occur in a year. The calculation is SLExARO=ALE
Term
ARP
Definition
Address Resolution Protocol
Term
AUP
Definition
Acceptable Use Policy
Term
BCP
Definition
Business Continuity Plan
Term
BIA
Definition
Business Impact Analysis
Term
BIOS
Definition
Basic Input/output System
Term
BOTS
Definition
Network robots
Term
CA
Definition
Certificate Authority
Term
CAC
Definition
Common Access Card
Term
CAN
Definition
Controller Area Network
Term
CCMP
Definition
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
Term
CCTV
Definition
Closed-circuit Television
Term
CERT
Definition
Computer Emergency Response Team
Term
CHAP
Definition
Challenge Handshake Authentication Protocol
Term
CIA
Definition
Confidentiality, Integrity, Availability
Term
CIRT
Definition
Computer Incidence Response Team
Term
COOP
Definition
Continuity of Operations Plan
Term
CRC
Definition
Cyclical Redundancy Check
Term
CRL
Definition
Certification Revocation List
Term
DAC
Definition
Discretionary Access Control
Term
DACL
Definition
Discretionary Access Control List
Term
DEP
Definition
Data Execution Prevention
Term
DES
Definition
Digital Encryption Standard
Term
DHCP
Definition
Dynamic Host Configuration Protocol
Term
DLL
Definition
Dynamic Link Library
Term
DLP
Definition
Data Loss Protection
Term
DMZ
Definition
Demilitarized zone
Term
DNS
Definition
Domain Name System
Term
DoS
Definition
Denial-of-service
Term
DRP
Definition
Disaster Recovery Plan
Term
DSA
Definition
Digital Signature Algorithm
Term
DDoS
Definition
Distributed denial-of-service
Term
EAP
Definition
Extensible Authentication Protocol
Term
ECC
Definition
Elliptic Curve Cryptography
Term
EFS
Definition
Encrypting File System
Term
EMI
Definition
Electromagnetic Interference
Term
ESP
Definition
Encapsulating Security Protocol
Term
FTP
Definition
File Transfer Protocol
Term
FTPS
Definition
File Transfer Protocol Secure
Term
GPG
Definition
GNU Privacy Guard
Term
GPO
Definition
Group Policy Object
Term
GPS
Definition
Global Positioning System
Term
GRE
Definition
Generic Routing Encapsulation
Term
GUI
Definition
Graphical User Interface
Term
HDD
Definition
Hard Disk Drive
Term
HIDS
Definition
Host-based intrusion detection system
Term
HIPS
Definition
Host-based intrusion prevention system
Term
HMAC
Definition
Hash-based message Authentication Code
Term
HSM
Definition
Hardware Security Module
Term
HTML
Definition
Hypertext Markup Language
Term
HTTP
Definition
Hypertext Transfer Protocol
Term
HTTPS
Definition
Hypertext transfer protocol secure
Term
HVAC
Definition
Heating, ventilation and air conditioning.
Term
IaaS
Definition
Infrastructure as a service
Term
ICMP
Definition
Internet Control Message Protocol
Term
ID
Definition
Identification
Term
IDS
Definition
Intrusion Detection System
Term
IEEE
Definition
Institute of Electrical and Electronic Engineers
Term
IGMP
Definition
Internet Group Management Protocol
Term
IIS
Definition
Internet Information Services
Term
IKE
Definition
Internet Key Exchange
Term
IM
Definition
Instant Messaging
Term
IMAP4
Definition
Internet Message Access Protocol v4
Term
IPS
Definition
Intrusion Prevention Systrm
Term
IPsec
Definition
Internet Protocol Security
Term
IPv4
Definition
Internet Protocol version 4
Term
IPv6
Definition
Internet Protocol version 6
Term
IRC
Definition
Internet Replay Chat
Term
IRT
Definition
Incident Response Team
Term
ISP
Definition
Internet Service Provider
Term
IV
Definition
Initialization vector
Term
KDC
Definition
Key Distribution Center
Term
L2TP
Definition
Layer 2 Tunneling Protocol
Term
LAN
Definition
Local Area Network
Term
LANMAN
Definition
Local Area Network Manager
Term
LDAP
Definition
Lightweight Directory Access Protocol
Term
LEAP
Definition
Lightweight Extensible Authentication Protocol
Term
MAC
Definition
Mandatory Access Control
Media Access Control
Message Authentication Code
Term
MAN
Definition
Metropolitan Area Network
Term
MBR
Definition
Mater Boot Record
Term
MD5
Definition
Message Digest 5
Term
MITM
Definition
Man in the middle
Term
MS-CHAP
Definition
Microsoft Challenge Handshake Authentication Protocol
Term
MTU
Definition
Maximum Transmission Unit
Term
NAC
Definition
Network Access Control
Term
NIDS
Definition
Network-based Intrusion Detection System
Term
NIPS
Definition
Network-based Intrusion Prevention System
Term
NIST
Definition
National Institute of Standards and Technology
Term
NOOP/NOP
Definition
No operation
Term
NOS
Definition
Network Operating System
Term
NTFS
Definition
New Technology File System
Term
NAT
Definition
Network Address Translation
Term
NTLM
Definition
New Technology LANMAN
Term
NTP
Definition
Network Time Protocol
Term
OS
Definition
Operating System
Term
OVAL
Definition
Open Vulnerability Assessment Language
Term
P2P
Definition
Peer-to-Peer
Term
PaaS
Definition
Platform as a service
Term
PAP
Definition
Password Authentication Protocol
Term
PAT
Definition
Port Address Translation
Term
PBX
Definition
Private Branch Exchange
Term
PEAP
Definition
Protected Extensible Authentication Protocol
Term
PED
Definition
Personal Electronic Device
Term
PGP
Definition
Pretty Good Privacy
Term
PII
Definition
Personally Identifiable Information
Term
PIN
Definition
Personal Identification Number
Term
PIV
Definition
Personal Identity Verification Card
Term
PKI
Definition
Public Key Infrastructure
Term
POP3
Definition
Post Office Protocol version 3
Term
POTS
Definition
Plain old telephone service
Term
PPP
Definition
Point-to-point protocol
Term
PPTP
Definition
Point-to-point Tunneling Protocol
Term
PSK
Definition
Pre-shared Key
Term
PTZ
Definition
Pan Tilt Zoom
Term
RA
Definition
Recovery Agent
Term
RADIUS
Definition
Remote Authentication Dial-In User Service
Term
RAID
Definition
Redundant Array of Inexpensive (or Independent) Disks
Term
RAID-0
Definition
Disk Striping. Raid-0 improves performances but does not provide fault tolerance.
Term
RAID-1
Definition
Disk mirroring. RAID-1 uses two disks and provides fault tolerance.
Term
RAID-5
Definition
Disk striping with parity. RAID-5 uses three or more disks and provides fault tolerance.
Term
RAM
Definition
Random Access Memory
Term
RAS
Definition
Remote Access Service
Term
RBAC
Definition
Role-based Access Control
Rule-based Access Control
Term
RC
Definition
Ron's code, or Rivest's Cipher. Symmetric Encryption algorithm.
Term
RFI
Definition
Radio Frequency Interface
Term
RIPEMD
Definition
RACE Integrity Primitives Evaluation Message Digest.
Term
RPO
Definition
Recovery Point Objective
Term
RSA
Definition
An Asymmetric algorithm used to encrypt data and digitally sign transmissions. It is named after it's creates, Rivest, Shamir and Adleman, and RSA is also the name of the company they founded together. RSA relies on the mathematical properties of prime numbers when creating public and private keys.
Term
RSTP
Definition
Rapid Spanning Tree Protocol
Term
RTO
Definition
Recovery Time Objective
Term
RTP
Definition
Real-time Transport Protocol
Term
S/MIME
Definition
Secure/Multipurpose Internet Mail Extensions
Term
Saas
Definition
Software as a Service
Term
SCAP
Definition
Security Content Automation Protocol
Term
SCP
Definition
Secure Copy
Term
SCSI
Definition
Small Computer System Interface
Term
SDLC
Definition
Software Development Life Cycle
Term
SDLM
Definition
Software Development Life Cycle Methodology
Term
SELinux
Definition
Security-Enhanced Linux
Term
SFTP
Definition
Secure FTP
Term
SHA
Definition
Secure Hash Algorithm
Term
SHTTP
Definition
Secure Hypertext Transfer Protocol
Term
SID
Definition
Security Identifier
Term
SIM
Definition
Subscriber Identity Module
Term
SIRT
Definition
Security Incident Response Team
Term
SLA
Definition
Service Level Agreement
Term
SLE
Definition
Single Loss Expectancy
Term
SMTP
Definition
Simple Mail Transfer Protocol
Term
SNMP
Definition
Simple Network Management Protocol
Term
SONET
Definition
Synchronous Optical Network Technologies
Term
SPIM
Definition
Spam Over Internet Messaging
Term
SPOF
Definition
Single Point of failure
Term
SQL
Definition
Structured query language
Term
SSH
Definition
Secure Shell
Term
SSID
Definition
Service Set Identifier
Term
SSL
Definition
Secure Sockets Layer
Term
SSO
Definition
Single Sign On
Term
SSTP
Definition
Secure Socket Tunneling Protocol
Term
STP
Definition
Spanning Tree Protocol
Shielded Twisted Pai
Term
SYN
Definition
Synchronize
Term
TACACS
Definition
Terminal Access Controller Access-Control System
Term
TACACS+
Definition
Terminal Access Controller Access-Control System+
Term
TCO
Definition
total cost of Ownership
Term
TCP
Definition
Transmission Control Protocol
Term
TCP/IP
Definition
Transmission Control Protocol/Internet Protocol
Term
TFTP
Definition
Trivial File Transfer Protocol
Term
TKIP
Definition
Temporal Key Integrity Protocol
Term
TLS
Definition
Transport Layer Security
Term
TPM
Definition
Trusted Platform Module
Term
UAT
Definition
User Acceptance Testing
Term
UDP
Definition
User Datagram Protocol
Term
UPS
Definition
Uninterruptible Power Supply
Term
URL
Definition
Universal Resource Locator
Term
USB
Definition
Universal Serial Bus
Term
UTP
Definition
Unshielded Twisted Pair
Term
VLAN
Definition
Virtual Local Area Network
Term
VM
Definition
Virtual Machine
Term
VoIP
Definition
Voice over IP
Term
VPN
Definition
Virtual Private Network
Term
VTC
Definition
Video Teleconferencing
Term
WAF
Definition
Web Application Firewall
Term
WAP
Definition
Wireless Access Point
Term
WEP
Definition
Wired Equivalent Privacy
Term
WIDS
Definition
Wireless Intrusion Detection System
Term
WIPS
Definition
Wireless Intrusion Prevention System
Term
WLAN
Definition
Wireless Local Area Network
Term
WPA
Definition
Wi-Fi Protected Access
Term
WPA2
Definition
Wi-Fi Protected Access version 2
Term
WTLS
Definition
Wireless Transport Layer Security
Term
XML
Definition
Extensible Markup Language
Term
XTACACS
Definition
Extended Terminal Access Controller Access-Control System
Term
XSRF
Definition
Cross-site Request Forgery
Term
XSS
Definition
Cross-site Scripting
Supporting users have an ad free experience!