Acronym |
Stands for |
3DES | Triple Data Encryption Standard |
AAA | Authentication, Authorization and Accounting |
ACL | Access Control List |
AES | Advanced Encryption Standard |
AES 256 | Advanced Encryption Standards, 256-bit |
AH | Authentication Header |
ARP | Address Resolution Protocol |
AUP | Acceptable Use Policy |
BCP | Business Continuity Planning |
BIOS | Basic Input/Output System |
BOTS | Network Robots |
CA | Certificate Authority |
CCTV | Closed-Circuit Television |
CERT | Computer Emergency Response Team |
CHAP | Challenge Handshake Authentication Protocol |
CIRT | Computer Incident Response Team |
CRL | Certification Revocation List |
DAC | Discretionary Access Control |
DDOS | Distributed Denial of Service |
DEP | Data Execution Prevention |
DES | Data Encryption Standard |
DHCP | Dynamic Host Configuration Protocol |
DLL | Dynamic Link Library |
DLP | Data Loss Prevention |
DMZ | Demilitarized Zone |
DNS | Domain Name Service |
DOS | Denial Of Service |
DRP | Disaster Recovery Plan |
DSA | Digital Signature Algorithm |
EAP | Extensible Authentication Protocol |
ECC | Elliptic Curve Cryptography |
EFS | Encrypted File System |
EMI | Electromagnetic Interference |
ESP | Encapsulated Security Payload |
FTP | File Transfer Protocol |
GPU | Graphic Processing Unit |
GRE | Generic Routing Encapsulation |
HDD | Hard Disk Drive |
HIDS | Host-Based Intrusion Detection System |
HIPS | Host-Based Intrusion Prevention System |
HMAC | Hashed Message Authentication Code |
HSM | Hardware Security Module |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol over SSL |
HVAC | Heating, Ventilation, Air Conditioning |
IaaS | Infrastructure as a Service |
ICMP | Internet Control Message Protocol |
ID | Identification |
IKE | Internet Key Exchange |
IM | Internet Messaging |
IMAP4 | Internet Message Access Protocol v4 |
IP | Internet Protocol |
IPSEC | Internet Protocol Security |
IRC | Internet Relay Chat |
ISP | Internet Service Provider |
KDC | Key Distribution Center |
L2TP | Layer 2 Tunneling Protocol |
LANMAN | Local Area Network Manager |
LDAP | Lightweight Directory Access Protocol |
LEAP | Lightweight Extensible Authentication Protocol |
MAC | Mandatory Access Control / Media Access Control |
MAC | Message Authentication Code |
MBR | Master Boot Record |
MDS | Message Digest 5 |
MSCHAP | Microsoft Challenge Handshake Authentication Protocol |
MTU | Maximum Transmission Unit |
NAC | Network Access Control |
NAT | Network Address Translation |
NIDS | Network-Based Intrusion Detection System |
NIPS | Network-Based Intrusion Prevention System |
NOS | Network Operating System |
NTFS | New Technology File System |
NTLM | New Technology LANMAN |
NTP | Network Time Protocol |
OS | Operating System |
OVAL | Open Vulnerability Assessment Language |
PAP | Password Authentication Protocol |
PAT | Port Address Translation |
PEAP | Protected Extensible Authentication Protocol |
PGP | Pretty Good Privacy |
PKI | Public Key Infrastructure |
PPP | Point-to-Point Protocol |
PPTP | Point-to-Point Tunneling Protocol |
PSK | Pre-Shared Key |
RA | Recovery Agent |
RADIUS | Remote Authentication Dial-in User Server |
RAID | Redundant Array of Inexpensive Disks |
RAS | Remote Access Server |
RBAC | Role Based Access Control |
RSA | Rivest, Shamir & Adleman |
RTP | Real-Time Transport Protocol |
S/MIME | Secure/Multipurpose Internet Mail Extension |
SaaS | Software as a Service |
SCAP | Security Content Automation Protocol |
SCSi | Small Computer System Interface |
SDLC | Software Development Life Cycle |
SDLM | Software Development Life Cycle Methodology |
SHA | Secure Hashing Algorithm |
SHTTP | Secure Hypertext Transfer Protocol |
SIM | Subscriber Identity Module |
SLA | Service Level Agreement |
SLE | Single Loss Expectancy |
SMS | Short Message Service |
SMTP | Simple Mail Transfer Protocol |
SNMP | Simple Network Management Protocol |
SSH | Secure Shell |
SSL | Secure Sockets Layer |
SSO | Single Sign-On |
TACACS | Terminal Access Controller Access Control System |
TCP/IP | Transmission Control Protocol/Internet Protocol |
TLS | Transport Layer Security |
TPM | Trusted Platform Module |
UAT | User Acceptance Testing |
UPS | Uninterrupted Power Supply |
URL | Universal Resource Locator |
USB | Universal Serial Bus |
UTP | Unshielded Twisted Pair |
VLAN | Virtual Local Area Network |
VoIP | Voice Over IP |
VPN | Virtual Private Network |
VTC | Video Teleconferencing |
WAF | Web Application Firewall |
WAP | Wireless Access Point |
WEP | Wired Equivalent Privacy |
WIDS | Wireless Intrusion detection System |
WIPS | Wireless Intrusion Prevention System |
WPA | Wireless Protected Access |
XSRF | Cross-Site request Forgery |
XSS | Cross-Site Scripting |
I hardly create remarks, however after reading a lot of remarks on SECURITY+ Acronyms | lakkireddymadhu.
I do have a couple of questions for you if you don’t mind.
Could it be just me or does it seem like a few of these
comments come across like they are coming from brain dead people?
😛 And, if you are writing on additional online social sites, I
would like to keep up with you. Would you list
of all of your shared pages like your Facebook page, twitter feed, or linkedin profile?
Reblogged this on Người Đến Từ Bình Dương.