Acronym Alley
Defense Tactics
Threats & Risks
Network & Access
100

The fundamental security triad consisting of Confidentiality, Integrity, and this third component.

What is Availability?

100

This security measure acts as a barrier between a trusted network and an untrusted network.

What is a Firewall?

100

This type of software is designed to block access to a computer system until a sum of money is paid.

What is Ransomware?

100

A private network that allows secure, remote access to an organization's internal resources.

What is a VPN (Virtual Private Network)?

200

This type of phishing is specifically targeted at high-level executives within an organization.

What is Whaling?(or BEC - Business Email Compromise)

200

This type of software is designed to detect, prevent, and take action against malicious software.

What is Anti-malware/Antivirus?

200

An attack that uses deception to trick individuals into revealing sensitive information.

What is Social Engineering?

200

The process of verifying the identity of a user or system.

What is Authentication?

300

This framework, developed by a US government agency, provides guidelines for organizations to manage and reduce cybersecurity risk.

What is the NIST Framework?

300

A simulated cyberattack against your computer system to check for exploitable vulnerabilities.

What is a Penetration Test? (Pen Test)

300

A type of malware that self-replicates and spreads across networks without human interaction.

What is a Worm?

300

A mechanism that allows a user to log in once and gain access to multiple systems.

What is SSO (Single Sign-On)?

400

A security process requiring more than one method of authentication from independent categories of credentials.

What is MFA (Multi-Factor Authentication)?

400

This system monitors network traffic for suspicious activity and issues alerts.

What is an IDS (Intrusion Detection System)?

400

An attack that exploits a vulnerability before it is known to the software vendor.

What is a Zero-Day Attack?

400

The principle of restricting user access rights to only what is necessary for their job.

What is PoLP (Principle of Least Privilege)?

500

This protocol is used to provide secure communication over a computer network, widely used for secure web browsing.

What is TLS (Transport Layer Security)?

500

A security strategy that uses multiple layers of defense to protect data.

What is Defense in Depth?

500

The abbreviation for Personally Identifiable Information, which must be protected from breaches.

Answer: What is PII?

500

This standard ensures that all companies that accept, process, store, or transmit credit card information maintain a secure environment.

What is PCI DSS?

M
e
n
u