Threats, Attacks and Vulnerabilities
Technologies and Tools
Architecture and Design
Identity and Access Management
Cryptography and PKI
100

DDoS

Distributed Denial of Service

100

ACL

Access Control List

100

IaaS

Infrastructure as a Service

100

ABAC

Attribute-based Access Control

100

WPA

WiFi Protected Access

200

RAT

Remote Access Trojan

200

UTM

Unified Threat Management

200

SED

Self Encrypting Drive

200

SAML

Security Assertion Markup Language

200

SHA

Secure Hashing Algorithm

300

MITM

Man-in-the-Middle

300

HIDS

Host-based Intrusion Detection System

300

TPM

Trusted Platform Module

300

RADIUS

Remote Authentication Dial-In User Service

300

AES

Advanced Encryption Standard

400

NFC

Near-Field Communication

400

ESP

Encapsulated Security Payload

400

UEFI

Unified Extensible Firmware Interface

400

CHAP

Challenge Handshake Authentication Protocol

400

RSA

Rivest, Shamir, & Adleman

500

IV

Initialization Vector

500

SRTP

Secure Real-time Transport Protocol

500

RAID

Redundant Array of Inexpensive Disks

500

TACACS+

Terminal Access Controller Access-Control System Plus

500

CCMP

Counter-Mode with Cipher Block Chaining Message Authentication Protocol

M
e
n
u