A Acronym
B Acronym
C Acronym
D Acronym
E Acronym
100

AP

A networking hardware device that allows other wi-fi devices to connect to a wired network

AP=Access Point

100

BYOD

the practice of allowing employees of an organization to bring their own computers, smartphones, or other devices for work purposes.

BYOD=Bring Your Own Device

100

CN

The characteristic value within a distinguished name (DN)

CN=Common Name

100

DEP

A security feature included in modern operating systems that marks areas of memory as either "executable" or "non-executable", and only allows data that is "executable".

DEP=Data Execution Prevention

100

ERP

 The integrated management of main business processes, often in real time and mediated by software and technology.

ERP=Enterprise Resource Planning

200

AI

Computer systems able to perform tasks that normally require human intelligence.


AI=Artificial Intelligence

200

BGP

A standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems on the internet.

BGP=Border Gateway Protocol

200

CERT

Expert group that handles computer security incidents.

CERT=Computer Emergency Response Team

200

DES

A symmetric key algorithm for the encryption of digital data.

DES=Data Encryption Standard

200

ESSID

 The logical network name used in an extended service set (ESS). ESSID is often synonymous with SSID.

ESSID=Extended Service Set Identifier

300

AAA

Framework used to control and track access within a computer network.

AAA= Authentication, Authorization, and Accounting

300
BSSID

A sequence of characters that uniquely names a wireless local area network. 

BSSID= Basic Service Set Identifier

300

CVSS

Open industry standard for assessing the severity of computer system security vulnerabilities.

CVSS=Common Vulnerabilities Scoring System

300

DRP

A written plan for recovering one or more information systems at an alternate facility in response to a major hardware or software failure or destruction of facilities.

DRP=Disaster Recovery Plan 

300

EDR

A cybersecurity technology that continually monitors an "endpoint" to mitigate malicious cyber threats.

EDR=Endpoint Detection and Response

400

ASLR

A computer security technique involved in preventing exploitation of memory corruption vulnerabilities. 

ASLR= Address Space Layout Randomization

400

BPDU

A data message transmitted across a local area network to detect loops in network topologies.

BPDU=Bridge Protocol Data Unit

400

CBC

A mode of operation for a block cipher- one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block. 

CBC=Cipher Block Chaining 

400

DMARC

An essential first line of defense against phishing emails and similar cyberattacks  

DMARC=Domain Message Authentication Reporting and Conformance

400

ECC

 A public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys

ECC=Elliptic Curve Cryptography

500

AES256

Process of concealing plain text data using the AES algorithm and an AES key length of 256 bits.

AES256=Advanced Encryption Standards 256bit

500

BASH

A command line interface that administrators of Unix and Linux operating system distributions use heavily.

BASH=Bourne Again Shell

500

CHAP

An authentication protocol used to validate users originally used by Point-to-Point protocol.

CHAP= Challenge Handshake Authentication Protocol

500

DHE

A mathematical method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as conceived by Ralph Merkle and named after Whitfield Diffie and Martin Hellman.

DHE=Diffie-Hellman Ephemeral

500

ECDHE

 An anonymous key agreement protocol that allows two parties, each having an elliptic curve public-private key pair, to establish a shared secret over an insecure channel.

ECDHE=Elliptic-curve Diffie-Hellman Ephemeral

M
e
n
u