Home
Browse
Create
Search
Log in
Sign up
Upgrade to remove ads
Only $2.99/month
CompTIA CASP Acronyms
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
From: CompTIA Advanced Security Practitioner Certification Exam Objectives (CAS-001)
Terms in this set (249)
3DES
Triple Digital Encryption Standard
AAA
Authentication, Authorization, and Accounting
ACL
Access Control List
AD
Active Directory
AES
Advanced Encryption Standard
AES256
Advanced Encryption Standard 256bit
AH
Authentication Header
AJAX
Asynchronous JAVA and XML
ALE
Annualized Loss Expectancy
AP
Access Point
APT
Advanced Persistent Threat
ARO
Annualized Rate of Occurrence
ARP
Address Resolution Protocol
AUP
Acceptable Use Policy
BCP
Business Continuity Planning
BIOS
Basic Input / Output System
BOTS
Network Robots
BPA
Business Partnership Agreement
CA
Certificate Authority
CAC
Common Access Card
CAN
Controller Area Network
CCMP
Counter-Mode/CBC-Mac Protocol
CCTV
Closed-Circuit Television
CERT
Computer Emergency Response Team
CHAP
Challenge Handshake Authentication Protocol
CIA
Confidentiality, Integrity, and Availability
CIA
Cryptographic Information Application
CIFS
Common Internet File System
CIRT
Computer Incident Response Team
CISO
Chief Information Security Officer
CMDB
Configuration Management Database
COOP
Continuity Of Operations
COTS
Commercial Off-The-Shelf
CRC
Cyclical Redundancy Check
CredSSP
Credential Security Support Provider
CRL
Certificate Revocation List
CRM
Customer Relationship Management
CSRF
Cross-Site Request Forgery
DAC
Discretionary Access Control
DDOS
Distributed Denial of Service
DEP
Data Execution Prevention
DES
Digital Encryption Standard
DHCP
Dynamic Host Configuration Protocol
DLL
Dynamic Link Library
DLP
Data Loss Prevention
DMZ
Demilitarized Zone
DNS
Domain Name Service (Server)
DOM
Document Object Model
DOS
Denial of Service
DRP
Disaster Recovery Plan
DSA
Digital Signature Algorithm
EAP
Extensible Authentication Protocol
ECC
Elliptic Curve Cryptography
EFS
Encrypted File System
eGRC
Electronic Governance Regulatory and Compliance
ELA
Enterprise License Agreement
EMI
Electromagnetic Interference
ESA
Enterprise Security Architecture
ESB
Enterprise Service Bus
ESP
Encapsulating Security Payload
EV
Extended Validation Certificate
FCoE
Fiber Channel over Ethernet
FTP
File Transfer Protocol
GPU
Graphic Processing Unit
GRC
Governance, Risk, & Compliance
GRE
Generic Routing Encapsulation
HBA
Host Based Authentication
HBA
Host Based Adapter
HDD
Hard Disk Drive
HIDS
Host Based Intrusion Detection System
HIPS
Host Based Intrusion Prevention System
HMAC
Hashed Message Authentication Code
HSM
Hardware Security Module
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol over SSL
HVAC
Heating, Ventilation Air Conditioning
IaaS
Infrastructure as a Service
ICMP
Internet Control Message Protocol
ICS
Industrial Control System
ID
Identification
IDF
Intermediate Distribution Frame
IdM
Identity Management
IDP
Identity Provider
IDS
Intrusion Detection System
IETF
Internet Engineering Task Force
IKE
Internet Key Exchange
IM
Instant Messaging
IMAP4
Internet Message Access Protocol v4
IP
Internet Protocol
IPS
Intrusion Prevention Systems
IPSec
Internet Protocol Security
IRC
Internet Relay Chat
ISA
Interconnection Security Agreement
ISMS
Information Security Management System
ISP
Internet Service Provider
IV
Initialization Vector
KDC
Key Distribution Center
L2TP
Layer 2 Tunneling Protocol
LANMAN
Local Area Network Manager
LDAP
Lightweight Directory Access Protocol
LEAP
Lightweight Extensible Authentication Protocol
LUN
Link Uninhibit (SS7)
MAC
Mandatory Access Control / Media Access Control
MAC
Message Authentication Code
MAN
Metropolitan Area Network
MBR
Master Boot Record
MD5
Message Digest 5
MDF
Main Distribution Frame
MFD
Multifunction Device
MITM
Man in the Middle
MOA
Memorandum of Agreement
MOU
Memorandum of Understanding
MPLS
Multiprotocol Label Switching
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
MSS
Managed Security Service
MTBF
Mean-Time Between Failure
MTTR
Mean Time To Recovery
MTU
Maximum Transmission Unit
NAC
Network Access Control
NAS
Network Attached Storage
NAT
Network Address Translation
NDA
Non-Disclosure Agreement
NIDS
Network Based Intrusion Detection System
NIPS
Network Based Intrusion Prevention System
NIST
National Institute of Standards & Technology
NLA
Network Level Authentication
NOS
Network Operating System
NTFS
New Technology File System
NTLM
New Technology LANMAN
NTP
Network Time Protocol
OCSP
Online Certificate Status Protocol
OLA
Operating Level Agreement
ORB
Object Request Broker
OS
Operating System
OTP
One Time Password
OVAL
Open Vulnerability Assessment Language
PaaS
Platform as a Service
PAP
Password Authentication Protocol
PAT
Port Address Translation
PBX
Private Branch Exchange
PCI-DSS
Payment Card Industry Data Security Standard
PDP
Policy Distribution Point
PEAP
Protected Extensible Authentication Protocol
PED
Personal Electronic Device
PEP
Policy Enforcement Point
PFS
Perfect Forward Secrecy
PGP
Pretty Good Privacy
PII
Personally Identifiable Information
PII
Personal Identifiable Information
PIP
Policy Information Point
PKI
Public Key Infrastructure
POTS
Plain Old Telephone Service
PPP
Point-to-point Protocol
PPTP
Point to Point Tunneling Protocol
PSK
Pre-Shared Key
PSP
Provisioning Service Provider
PST
Provisioning Service Target
PTZ
Pan-Tilt-Zoom
QoS
Quality of Service
RA
Recovery Agent
RA
Request Authority
RAD
Rapid application development
RADIUS
Remote Authentication Dial-in User Server
RAID
Redundant Array of Inexpensive Disks
RA
Request Authority
RAS
Remote Access Server
RBAC
Role Based Access Control
RBAC
Rule Based Access Control
RFI
Request for Information
RFP
Request for Proposal
RFQ
Request for Quote
RSA
Rivest, Shamir, & Adleman
RTO
Recovery Time Objective
RTP
Real-Time Transport Protocol
S/MIME
Secure / Multipurpose internet Mail Extensions
SaaS
Software as a Service
SAML
Security Assertions Markup Language
SAN
Storage Area Network
SCADA
Supervisory Control and Data Acquisition
SCAP
Security Content Automation Protocol
SCP
Secure Copy
SCSI
Small Computer System Interface
SDL
Security Development Life Cycle
SDLC
Software Development Life Cycle
SDLM
Software Development Life Cycle Methodology
SHA
Secure Hashing Algorithm
SHTTP
Secure Hypertext Transfer Protocol
SIEM
Security Information Event Management
SIM
Subscriber Identity Module
SIP
Session Initiation Protocol
SLA
Service Level Agreement
SLE
Single Loss Expectancy
SMS
Short Message Service
SMTP
Simple Mail Transfer Protocol
SNMP
Simple Network Management Protocol
SOA
Service Oriented Architecture
SOAP
Simple Object Access Protocol
SOA
Start of Authority
SOC
Security Operations Center
SOE
Standard Operating Environment
SONET
Synchronous Optical Network Technologies
SOX
Sarbanes-Oxley Act
SP
Service Provider
SPIM
Spam over Internet Messaging
SPIT
Spam over Internet Telephony
SPML
Service Provisioning Markup Language
SRTM
Software Requirements Traceability Matrix
SRTP
Secure Real-time Protocol
SSD
Solid State Drive
SSDLC
Security System Development Life Cycle
SSH
Secure Shell
SSL
Secure Sockets Layer
SSO
Single Sign On
STP
Shielded Twisted Pair
TACACS
Terminal Access Controller Access Control System
TCO
Total Cost of Ownership
TCP/IP
Transmission Control Protocol / Internet Protocol
TKIP
Temporal Key Integrity Protocol
TLS
Transport Layer Security
TOS
Type of Service
TPM
Trusted Platform Module
TSIG
Transaction Signature Interoperability Group
UAC
User Access Control
UAT
User Acceptance Testing
UDDI
Universal Description Discovery and Integration
UDP
User Datagram Protocol
UPS
Uninterruptable Power Supply
URL
Universal Resource Locator
USB
Universal Serial Bus
UTP
Unshielded Twisted Pair
VDI
Virtual Desktop Infrastructure
VLAN
Virtual Local Area Network
VoIP
Voice over IP
VPN
Virtual Private Network
vSAN
Virtual Storage Area Network
VTC
Video Teleconferencing
WAC
Web Access Control
WAF
Web-Application Firewall
WAP
Wireless Access Point
WAYF
Where Are You From
WEP
Wired Equivalent Privacy
WIDS
Wireless Intrusion Detection System
WIPS
Wireless Intrusion Prevention System
WPA
Wireless Protected Access
WSDL
Web Services Description Language
WWN
World Wide Name
XACML
eXtensible Access Control Markup Language
XSRF
Cross-Site Request Forgery
XSS
Cross-Site Scripting
THIS SET IS OFTEN IN FOLDERS WITH...
CASP
90 terms
CASP Acronyms (CAS-002)
304 terms
CompTIA Advanced Security Practitioner CAS-002
42 terms
CASP - Ch 3 - Virtualization
9 terms
YOU MIGHT ALSO LIKE...
CompTIA Security+ SY0-501 Acronyms
321 terms
Security+ Acronyms
105 terms
Security + CH8
71 terms
Chapter 11
27 terms