- Barajar
ActivarDesactivar
- Alphabetizar
ActivarDesactivar
- Frente Primero
ActivarDesactivar
- Ambos lados
ActivarDesactivar
- Leer
ActivarDesactivar
Leyendo...
Cómo estudiar sus tarjetas
Teclas de Derecha/Izquierda: Navegar entre tarjetas.tecla derechatecla izquierda
Teclas Arriba/Abajo: Colvea la carta entre frente y dorso.tecla abajotecla arriba
Tecla H: Muestra pista (3er lado).tecla h
Tecla N: Lea el texto en voz.tecla n
Boton play
Boton play
81 Cartas en este set
- Frente
- Atrás
ACL
|
Access Control List
|
ADFS
|
Active Directory Federation Services
|
AP
|
Access Point
|
API
|
Application Programming Interface
|
APNS
|
Apple Push NotificationService
|
APT
|
Advanced Persistent Threat
|
ASLR
|
Address Space Layout Randomization
|
BPA
|
Business Partnership Agreement
|
CA
|
Certificate Authority
|
CAPEC
|
Common Atacks Patterns Enumeration Classification
|
CERT
|
Computer Emergency Response Team
|
CGI
|
Common Gateway Interface
|
CIFS
|
Common Internet File System
|
CIRT
|
Computer Incident Response Team
|
CORS
|
Cross-Origin Request Scripting
|
COTS
|
Commercial Off-The-Shell
|
CRL
|
Cerficate Revocation List
|
CSRF
|
Cross-Site Request Forgery
|
CVE
|
Common Vulnerability EXposures
|
CVSS
|
Common Vulnerability Scorring System
|
CWE
|
Common Weaknees Enumeration
|
DAST
|
Dynamic Application Security Testing
|
DCOM
|
Distributed Component Object Model
|
DFD
|
Data Flow Diagram
|
DLL
|
Dynamic Link Library
|
DNS
|
Domain Name Service
|
DOM
|
Document Object Model
|
DoS
|
Denail of Services
|
DTP
|
Dynamic Trunking Protocol
|
ECDSA
|
Elliptic Curve Digital Signature Algorithm
|
EULA
|
End User Lincense Agreement
|
FTP
|
File Transfer Protocol
|
GPO
|
Group Policy Object
|
GPP
|
Generic Packetized Protocol
|
GRE
|
Generic Routing Encapsulation
|
HSTS
|
HTTP Strict Trasport Security
|
HTML
|
HyperText Markup Language
|
I/O
|
Input/Output
|
ICMP
|
Internet Control Message Protocol
|
ICS
|
Industrial Control Systems
|
IDOR
|
Indirect Object Reference
|
IoT
|
Internet of things
|
IPS
|
Intrusion Prevention System
|
IV
|
Initialization Vector
|
JPCERT
|
Japan Computer Emergency Response Team
|
JTAG
|
Join Test Action Group
|
LAPS
|
Local Administrator Password Solution
|
LFI
|
Local File Inclusion
|
LLMNR
|
Link-Local Multicast Name Resolution
|
LSASS
|
Local Security Authority Sybsystem Service
|
MDM
|
Mobile Divece Management
|
MFA
|
Multifactor Authentication
|
MITM
|
Man-in-the-Middle
|
MSA
|
Master Service Agreement
|
NAC
|
Network Access Control
|
NBNS
|
Net Bios Name Service
|
NDA
|
Non-Disclosure Agreement
|
NFC
|
Near-Field Communication
|
NIST
|
National Institute of Standards and Technology
|
NOP
|
No Operation
|
NSE
|
Network Service Engine
|
OS
|
Operation System
|
OSINT
|
Open Source Intelligence
|
OWASP
|
Open Web Application Security Project
|
PII
|
Personally Identifiable Information
|
POS
|
Point Of Sale
|
PS
|
PowerShell
|
RCE
|
Remote Code Execution
|
RDP
|
Remote Desktop Protocole
|
RFI
|
Remote File Inclusion
|
RFID
|
Radio Frequent ID
|
RFP
|
Request for Proposal
|
ROE
|
Rules of Engagement
|
RPC
|
remote Procedure Call
|
RSH
|
Remote Shell
|
RTOS
|
Real Time Operation System
|
SAM
|
Security Account Manager
|
SAN
|
Subject Alternative Name
|
SAST
|
Static Application Security Testing
|
SCADA
|
Supervisory Control and Data Acquisition
|
SCEP
|
Simple Certificate Enroolment Protocol
|