Abbreviations


Abbreviations and acronyms are shortened forms of words or phrases. An abbreviation is typically a shortened form of words used to represent the whole (such as Dr. or Prof.) while an acronym contains a set of initial letters from a phrase that usually form another word (such as radar or scuba). Abbreviations and acronyms are often interchanged, yet the two are quite distinct. The main point of reference is that abbreviations are merely a series of letters while acronyms form new words. Each one allows writers to make large blocks of text easier to read. Beware that both abbreviations and acronyms are typically considered informal and should be carefully considered before including them in more formal writings.” Fair Use Source: https://abbreviations.yourdictionary.com/articles/what-is-the-difference-between-an-abbreviation-and-an-acroynm.html https://www.dictionary.com/e/acronym-or-abbreviation

Cybersecurity Index of Topics

#:

  • 3DES (Triple DES)
  • 32-bit address scheme
  • 64-bit encryption
  • 128-bit address scheme
  • 128-bit encryption
  • 802.1X communications
  • 802.1X environment
  • 802.1X standard
  • 802.11a standard
  • 802.11ac standard
  • 802.11b standard
  • 802.11g standard
  • 802.11n standard

A:

  • AAA (authentication authorization and accounting)
  • ABAC (attribute-based access control)
  • acceptable use policy (AUP)
  • access
    • gaining access
    • access to Internet
    • maintaining access
    • access to web sites
  • access control
    • account policy enforcement
    • account restrictions
    • common account practices
    • database security
    • denying access
    • environmental controls
    • file system security
    • group policies
    • implementing access control
    • introduction to access control
    • job rotation
    • location-based policies
    • monitoring user access
    • overview of access control
    • physical access control
    • printer security
    • access control privileges. See privileges
    • access control – rights
    • rotation of duties
    • access control – security controls. See security controls
    • security groups
    • security principles
    • separation of duties
    • user account types
  • access control lists. See ACLs
  • access control models
    • attribute-based access control
    • discretionary access control
    • group-based access control
    • mandatory access control
    • role-based access control
    • rule-based access control
  • access lists
  • access logs
  • access points. See also wireless access points
  • access rights
  • access systems
  • access tokens
  • access violations
  • account lockout policy
  • account maintenance
  • account policy enforcement
  • accountability
  • accounting services
  • ACK flag
  • ACK message
  • ACLs (access control lists)
    • checking rules in ACLs
    • Cisco ACLs
    • ACLs considerations
    • DACLs
    • ACLs described
    • ACLs overview
    • router ACLs
  • active/active configuration
  • active/passive configuration
  • ActiveX controls
  • activity logs
  • actors threat
  • ad hoc networking
  • address classes
  • Address Resolution Protocol. See ARP
  • administrative accounts
  • administrative console
  • administrative controls
  • administrator roles
  • administrators
    • administrator configuration goals
    • administrators described
    • impersonation of administrators
    • least privilege and administrators
    • administrator password policy
    • administrator passwords
    • policies affecting administrators
    • administrators rotation of duties
    • administrators separation of duties
  • dvanced Encryption Standard (AES)
  • advanced persistent threats (APT)
  • adverse actions
  • adware
  • AES (Advanced Encryption Standard)
  • AES256
  • agile life cycle model
  • agreements
  • AH (Authentication Header) protocol
  • air gaps
  • aireplay-ng command
  • airgap
  • airodump-ng program
  • alarm system
  • alarms
  • ALE (annual loss expectancy)
  • alerts
  • algorithms
    • asymmetric algorithms
    • algorithms described
    • hashing algorithms
    • secret algorithms
    • symmetric algorithms
    • weak/deprecated algorithms
  • all-in-one security appliance
  • amplification
  • analysis engine
  • Android OS
  • annual loss expectancy (ALE)
  • annual rate of occurrence (ARO)
  • anomaly-based systems
  • Anonymous (organization)
  • anonymous authentication
  • ANT protocol
  • antennas wireless
  • anti-adware
  • anti-malware software
  • Anti-Phishing Working Group (APWG)
  • anti-spam software
  • antispyware
  • antivirus logs
  • antivirus management
  • antivirus policy
  • antivirus software
    • analyzing logs of antivirus software
    • configuring antivirus software
    • antivirus software considerations
    • examples of antivirus software
    • antivirus software features
    • antivirus software heuristic analysis
    • importance of antivirus software
    • updates to antivirus software
  • anycast address
  • APIPA (automatic private IP addressing)
  • APIs (application programming interfaces)
  • app stores
  • Apple devices
  • appliances
  • application attacks
    • additional attacks listed
    • buffer overflow attacks
    • command injection attacks
    • cookie-based attacks
    • cross-site scripting
    • directory traversal attacks
    • integer overflow attacks
    • LDAP injection attacks
    • preventing application attacks
    • SQL injection attacks
    • XML injection attacks
    • zero-day attacks
  • application code manipulation
  • application containers
  • application hardening. See also application security
  • application layer protocols
  • application layer proxy
  • application logging
  • application programming interfaces (APIs)
  • application security. See also application hardening
    • application security best practices
    • application security change management
    • client-side vs. server-side validation of application security
    • application security considerations
    • disabling features of application security
    • application security – input validation
    • application security issues/concerns
    • application security overview
    • application security – patch management
    • application security – preventing attacks
    • application security – secure coding
    • application security – Secure DevOps
    • application security – version control
  • application-based firewalls
  • application-level rootkits
  • applications. See also software
    • application authentication
    • application baseline configuration
    • application blacklisting
    • application encryption
    • Java application
    • logging activity of applications
    • malicious add-ons in applications
    • mobile device applications (apps)
    • application patches
    • removing unnecessary applications
    • securing applications. See application security
    • security issues related to applications
    • social media and applications
    • web applications
    • application whitelisting
  • APT (advanced persistent threats)
  • architecture/design weaknesses
  • armored viruses
  • ARO (annual rate of occurrence)
  • ARP (Address Resolution Protocol)
  • ARP poisoning
  • arp tool
  • assessments. See security assessments
  • asset management
  • assets
    • common assets
    • assets described
    • hidden assets
    • identifying assets
    • loss of assets
    • owner of assets
    • password protection of assets
    • asset threat assessment
    • asset tracking
    • undocumented assets
  • asymmetric algorithms
  • asymmetric encryption
  • asymmetric key pair
  • attachments e-mail
  • attack surface
  • attacks. See also threats; vulnerabilities
    • application attacks
    • ARP poisoning attacks
    • Bluetooth attacks
    • client-side attacks
    • command injection attacks
    • cookie-based attacks
    • DDoS attacks
    • dictionary attacks
    • directory traversal attacks
    • DoS attacks
    • eavesdropping attacks
    • e-mail attacks
    • evil twin attacks
    • hybrid attacks
    • impersonation attacks
    • integer overflow attacks
    • IV attacks
    • known-plaintext attacks
    • LDAP injection attacks
    • man-in-the-browser attacks
    • man-in-the-middle attacks
    • attacks on network. See network attacks
    • offline attacks
    • online attacks
    • attacks on password. See password attacks
    • phishing attacks
    • physical attacks. See physical threats/attacks
    • plaintext attacks
    • port scanning attacks
    • privilege escalation attacks
    • replay attacks
    • smurf attacks
    • social engineering attacks. See social engineering
    • spoofing attacks
    • transitive attacks
    • vishing attacks
    • watering hole attacks
    • WPS attacks
    • XML injection attacks
    • zero-day attacks
  • attestation
  • attribute-based access control (ABAC)
  • audit files
  • audit logs
  • audit policy
  • auditing
    • configuring auditing
    • auditing considerations
    • auditing described
    • auditing FTP
    • auditing in Linux
    • routine audits
    • web auditing
    • where to enable auditing
    • auditing in Windows
  • AUP (acceptable use policy)
  • authentication
    • anonymous authentication
    • application authentication
    • authentication vs. authorization
    • basic authentication
    • authentication biometrics. See biometric systems
    • certificate-based authentication
    • claims-based authentication
    • authentication considerations
    • context-aware authentication
    • DIAMETER protocol authentication
    • federation services authentication
    • authentication vs. identification
    • implementing authentication
    • IPSec authentication
    • Kerberos authentication
    • authentication overview
    • RADIUS authentication
    • remote access authentication
    • authentication security issues
    • single-factor authentication
    • smartcard authentication
    • authentication terminology
    • three-factor authentication
    • authentication tokens. See tokens
    • two-factor authentication
    • user account authentication
    • username authentication
    • wireless network authentication
  • authentication authorization and accounting (AAA)
  • authentication factors
  • Authentication Header (AH) protocol
  • authentication models
  • authentication protocols
  • authentication servers
  • authentication services
  • authenticators
  • authority
  • authorization
  • authorization services
  • automatic private IP addressing (APIPA)
  • automation
  • availability

B:

  • back doors
  • background checks
  • BackTrack tool
  • backup operations. See also restore operations
  • availability and backup
  • backup plan template
  • cloud services and backup
  • differential backups
  • full backups
  • geographic considerations for backups
  • incremental backups
  • offsite storage of backups
  • scheduling backups
  • backup security
  • backup snapshots
  • tape media for backups
  • backup on Windows Server
  • backup on Linux
  • backup policy
  • backup tools
  • banner grabbing
  • barricades
  • baseline deviation
  • baseline reporting
  • baselines
    • application baselines
    • MBSA baselines
    • baselines and patches
    • permissions and baselines
    • secure baseline
    • security baselines
  • baselining
  • Bayonet Neill-Concelman. See BNC
  • BCP. See business continuity plan
  • benchmarks
  • BIA (business impact assessment)
  • Big Data
  • biometric factors
  • biometric systems
    • biometric systems described
    • biometric system enrollment process
    • biometric systems error types
    • physical security and biometric systems
  • biometrics
  • BIOS chip
  • BIOS features
  • BIOS power-on password
  • BIOS settings
  • birthday attacks
  • black box test
  • black-hat hackers
  • blacklisting
  • blanket purchase agreement (BPA)
  • block ciphers
  • Blowfish algorithm
  • Bluebugging
  • bluejacking
  • bluesnarfing
  • Bluetooth connections
  • Bluetooth devices
  • Bluetooth technology
  • BNC connectors
  • bollards
  • boot media
  • boot passwords
  • boot sector viruses
  • bootup secure
  • botnets
  • bots
  • BPA (blanket purchase agreement)
  • bring your own device. See BYOD
  • broadcast domains
  • broadcast messages
  • browsers. See web browsers
  • brute-force attacks
  • Brutus tool
  • buffer overflow attacks
  • buffers
  • bugs
  • bump key
  • business continuity plan (BCP)
    • business continuity plan (BCP) in action
    • business continuity plan (BCP) alternate business practices
    • business continuity plan (BCP) – alternate processing sites
    • business continuity plan (BCP) – backups. See backup operations
    • business continuity plan (BCP) basic concepts
    • business continuity plans (BCP) described
    • developing business continuity plans (BCP)
    • initiating business continuity plans (BCP)
    • maintaining business continuity plans (BCP)
    • reasons for business continuity plans (BCP)
    • business continuity plan (BCP) recovery objectives
    • business continuity plan (BCP) reports
    • business continuity plan (BCP) representatives
    • business continuity plan (BCP) – restores. See restore operations
    • business continuity plan (BCP) risks. See risk
    • steps to create a business continuity plan (BCP)
    • business continuity plan (BCP) terminology
    • business continuity plan (BCP) testing
    • business continuity plan (BCP) threats. See threats
  • business impact analysis
  • business impact assessment (BIA)
  • business partnerships
  • business processes
  • business users
  • businesses. See companies
  • BYOD (bring your own device)
  • BYOD policy

C:

  • cable locks
  • cables
    • cables and cabling best practices
    • CAT 5 UTP cable
    • CAT 5e cable
    • coaxial cable
    • cable color
    • crossover cable
    • cable and cabling described
    • fiber-optic cable
    • cables listed
    • cable lockdown
    • cable networks
    • RG-8 cable
    • RG-58 cable
    • shielded twisted-pair cable
    • straight-through cable
    • Ethernet thicknet cable
    • Ethernet thinnet cable
    • types of cable
    • UTP cable
  • CAC (common access card)
  • Caesar cipher
  • Cain & Abel tool
  • camera systems
  • cameras
  • cameras, security
  • camouflage
  • car computing systems
  • CAs. See certificate authorities
  • CASB (cloud access security broker)
  • CAT 5 UTP cables
  • CAT 5e cables
  • CBC (Cipher Block Chaining) mode
  • CBT (computer based training)
  • CCMP (Cipher Block Chaining Message Authentication Code Protocol)
  • CCTV (closed-circuit television) systems
  • cell phones. See mobile devices
  • cellular networks
  • Center for Internet Security (CIS)
  • CER (crossover error rate)
  • certificate authorities (CAs). See also certificates
    • installing certificate authorities
    • issuing CA certificate authorities
    • online vs. offline certificate authorities
    • private certificate authorities
    • public certificate authorities
    • certificate authorities – root CA
    • submitting certificate requests to certificate authorities
    • certificate authorities – subordinate CAs
  • certificate chaining
  • certificate issues
  • certificate keys
  • certificate revocation list (CRL)
  • certificate signing request (CSR)
  • certificate-based authentication
  • certificates. See also certificate authorities
    • common issues with certificates
    • certificate common name
    • cross-certificate
    • downloading certificates
    • certificate formats
    • certificate life cycle
    • overview of certificates
    • certificates renewal
    • revoking certificates
    • subject name certificates
    • types of certificates
  • FB (Cipher Feedback) mode
  • CFO (chief financial officer)
  • chain of custody
  • Challenge Handshake Authentication Protocol (CHAP)
  • change management
  • channel bonding
  • channels
  • CHAP (Challenge Handshake Authentication Protocol)
  • checksum
  • chief financial officer (CFO)
  • chief privacy officer (CPO)
  • choose your own device (CYOD) deployment model
  • CIA triad
  • CIAA term
  • Cipher Block Chaining Message Authentication Code Protocol (CCMP)
  • Cipher Block Chaining (CBC) mode
  • Cipher Feedback (CFB) mode
  • cipher locks
  • cipher suites
  • cipher text
  • ciphers
    • block ciphers
    • Caesar ciphers
    • RC4/RC5 ciphers
    • ROT13 cipher
    • stream ciphers
    • substitution ciphers
    • transposition ciphers
    • Twofish ciphers
    • Vigenère cipher
  • ciphertext
  • CIRT (Computer Incident Response Team)
  • CIS (Center for Internet Security)
  • Cisco access lists
  • cladding
  • claims
  • claims-based authentication
  • class A addresses
  • class B addresses
  • class C addresses
  • class D addresses
  • class E addresses
  • classification labels
  • classification levels
  • classification policy
  • clean desk policy
  • clear text
  • clickjacking
  • clients
  • client-side attacks
  • closed-circuit sensors
  • closed-circuit television (CCTV) systems
  • cloud access security broker (CASB)
  • cloud computing
  • cloud computing models
  • cloud services
  • cloud storage
  • clustering
  • CMOS setup program
  • coaxial cables
  • code execution
  • code reviews
  • code signing
  • coding – programming. See also scripting
    • coding – programming best practices
    • coding – programming – change management
    • coding – programming – code reuse
    • coding – programming – compiled vs. runtime code
    • coding – programming – dead code
    • coding – programming – development life cycle (SDLC)
    • coding – programming – encryption
    • coding – programming – error handling
    • coding – programming – exception handling
    • infrastructure as code (IaC)
    • coding – programming – input validation
    • coding – programming – quality / software testing
    • script kiddies
    • programming – secure coding techniques
    • coding – programming – Secure DevOps
    • coding – programming – security concepts
    • coding – programming – server-side vs. client-side
    • coding – programming – stored procedures
    • coding – programming – validation
    • coding – programming – version control
  • cold sites
  • cold spare devices
  • collision domains
  • collisions
  • command injection attacks
  • command-line tools
  • common access card (CAC)
  • Common Criteria
  • communication security
  • companies
    • common tangible impacts on companies
    • finding information on companies
    • loss of production for companies
    • loss of revenue for companies
    • reputation for companies
  • compensating controls
  • competitors
  • compliance
  • compressing zeros
  • computer based training (CBT)
  • computer forensics
    • cell phone forensics
    • computer forensics – chain of custody
    • computer forensics – corporate investigations
    • computer forensics described
    • computer forensics – documenting steps
    • computer forensics – network traffic/logs
    • computer forensics – personal devices
    • computer forensics – public investigations
    • computer forensics – RAID arrays
    • computer forensics – record time offset
    • computer forensics – reporting findings
    • computer forensics – screenshots
    • computer forensics – SIM cards
    • computer forensics – videotaping
    • computer forensics – witness interviews
  • computer forensics tools
    • acquisition tools

analysis tools

Forensic Acquisition Utilities

Forensic Toolkit

Helix tool

hex editors

image file analysis tools

for live analysis

for mobile forensics

ProDiscover

Computer Incident Response Team (CIRT)

confidential information

confidential label

confidentiality

confidentiality integrity and availability. See CIA triad

configuration assessment

configuration compliance scanner

configuration guides

configuration validation

confusion

connectors

console

containerization

content filtering

content inspection

context-aware authentication

continuing education

continuity of operations

continuous integration

continuous monitoring

cookie-based attacks

cookies

COPE (corporate owned personally enabled) deployment model

copy command

copyright violations

corporate owned personally enabled (COPE) deployment model

corporate-owned device deployment deployment model

corrective controls

correlation engine

Counter mode (CTM)

Counter (CTR) mode

CPO (chief privacy officer)

crackers. See password crackers

credential management

credentials

criminals . See also hackers

Critical Security Controls

critical updates

CRL (certificate revocation list)

cross-certificate

crossover cables

crossover error rate (CER)

cross-site request forgery

cross-site scripting (XSS)

crypto service provider (CSP)

cryptographic protocols

cryptography . See also encryption

authentication. See authentication

core services

hashing. See hashing

in-band vs. out-of-band

introduction to

quantum

steganography

terms and concepts

crypto-malware

CSP (crypto service provider)

CSR (certificate signing request)

CTM (Counter mode)

CTR (Counter) mode

custodian

CYOD (choose your own device) deployment model

D:

\

E:

F:

G:

H:

I:

J:

K:

L:

M:

N:

O:

P:

Q:

R:

S:

T:

U:

V:

X:

Y:

Z:

Fair Use Source: B076J3QNB2

Polymath

See Cloud Monk.

“Von Wowern defined polymathy as “knowledge of various matters, drawn from all kinds of studies […] ranging freely through all the fields of the disciplines, as far as the human mind, with unwearied industry, is able to pursue them”.[4]

Fair Use Source: https://en.wikipedia.org/wiki/Polymath

Perhaps the best summary of a Polymath comes from the world’s greatest SciFi writer Robert Heinlein’s famous quote on Skillset and Self-Sufficiency

Buddhist Glossary of Buddha Dharma Terms

See List of Buddhist Topics,

A:

B:

  • Brahma Net Sutra – BNS

C:

D:

E:

F:

G:

H:

I:

O:

T:

Fair Use Sources:

See Also:

Buddhism Glossary, Three Refuges: 1. Buddhas, 2. Dharma: SutrasShastrasBuddhist Bibliography, 3. Sangha: BodhisattvasHistoric Buddhist MastersModern Buddhist Masters

Glossaries

One of the best ways of learning is to “learn the language”, lingo and jargon of a field of study. This is why Cloud Monk spends so much time compiling and editing glossaries.

Guidelines while writing: https://www.wikihow.com/Write-a-Glossary

Dharma Glossaries:

IT Glossaries:

Hobby Glossaries:

  • Permaculture Gardening Glossary
  • History Glossary
  • Science Fiction Glossary