Acronym |
Stands for
|
3DES |
Triple Data Encryption Standard |
AAA |
Authentication, Authorization and Accounting |
ACL |
Access Control List |
AES |
Advanced Encryption Standard |
AES 256 |
Advanced Encryption Standards, 256-bit |
AH |
Authentication Header |
ARP |
Address Resolution Protocol |
AUP |
Acceptable Use Policy |
BCP |
Business Continuity Planning |
BIOS |
Basic Input/Output System |
BOTS |
Network Robots |
CA |
Certificate Authority |
CCTV |
Closed-Circuit Television |
CERT |
Computer Emergency Response Team |
CHAP |
Challenge Handshake Authentication Protocol |
CIRT |
Computer Incident Response Team |
CRL |
Certification Revocation List |
DAC |
Discretionary Access Control |
DDOS |
Distributed Denial of Service |
DEP |
Data Execution Prevention |
DES |
Data Encryption Standard |
DHCP |
Dynamic Host Configuration Protocol |
DLL |
Dynamic Link Library |
DLP |
Data Loss Prevention |
DMZ |
Demilitarized Zone |
DNS |
Domain Name Service |
DOS |
Denial Of Service |
DRP |
Disaster Recovery Plan |
DSA |
Digital Signature Algorithm |
EAP |
Extensible Authentication Protocol |
ECC |
Elliptic Curve Cryptography |
EFS |
Encrypted File System |
EMI |
Electromagnetic Interference |
ESP |
Encapsulated Security Payload |
FTP |
File Transfer Protocol |
GPU |
Graphic Processing Unit |
GRE |
Generic Routing Encapsulation |
HDD |
Hard Disk Drive |
HIDS |
Host-Based Intrusion Detection System |
HIPS |
Host-Based Intrusion Prevention System |
HMAC |
Hashed Message Authentication Code |
HSM |
Hardware Security Module |
HTTP |
Hypertext Transfer Protocol |
HTTPS |
Hypertext Transfer Protocol over SSL |
HVAC |
Heating, Ventilation, Air Conditioning |
IaaS |
Infrastructure as a Service |
ICMP |
Internet Control Message Protocol |
ID |
Identification |
IKE |
Internet Key Exchange |
IM |
Internet Messaging |
IMAP4 |
Internet Message Access Protocol v4 |
IP |
Internet Protocol |
IPSEC |
Internet Protocol Security |
IRC |
Internet Relay Chat |
ISP |
Internet Service Provider |
KDC |
Key Distribution Center |
L2TP |
Layer 2 Tunneling Protocol |
LANMAN |
Local Area Network Manager |
LDAP |
Lightweight Directory Access Protocol |
LEAP |
Lightweight Extensible Authentication Protocol |
MAC |
Mandatory Access Control / Media Access Control |
MAC |
Message Authentication Code |
MBR |
Master Boot Record |
MDS |
Message Digest 5 |
MSCHAP |
Microsoft Challenge Handshake Authentication Protocol |
MTU |
Maximum Transmission Unit |
NAC |
Network Access Control |
NAT |
Network Address Translation |
NIDS |
Network-Based Intrusion Detection System |
NIPS |
Network-Based Intrusion Prevention System |
NOS |
Network Operating System |
NTFS |
New Technology File System |
NTLM |
New Technology LANMAN |
NTP |
Network Time Protocol |
OS |
Operating System |
OVAL |
Open Vulnerability Assessment Language |
PAP |
Password Authentication Protocol |
PAT |
Port Address Translation |
PEAP |
Protected Extensible Authentication Protocol |
PGP |
Pretty Good Privacy |
PKI |
Public Key Infrastructure |
PPP |
Point-to-Point Protocol |
PPTP |
Point-to-Point Tunneling Protocol |
PSK |
Pre-Shared Key |
RA |
Recovery Agent |
RADIUS |
Remote Authentication Dial-in User Server |
RAID |
Redundant Array of Inexpensive Disks |
RAS |
Remote Access Server |
RBAC |
Role Based Access Control |
RSA |
Rivest, Shamir & Adleman |
RTP |
Real-Time Transport Protocol |
S/MIME |
Secure/Multipurpose Internet Mail Extension |
SaaS |
Software as a Service |
SCAP |
Security Content Automation Protocol |
SCSi |
Small Computer System Interface |
SDLC |
Software Development Life Cycle |
SDLM |
Software Development Life Cycle Methodology |
SHA |
Secure Hashing Algorithm |
SHTTP |
Secure Hypertext Transfer Protocol |
SIM |
Subscriber Identity Module |
SLA |
Service Level Agreement |
SLE |
Single Loss Expectancy |
SMS |
Short Message Service |
SMTP |
Simple Mail Transfer Protocol |
SNMP |
Simple Network Management Protocol |
SSH |
Secure Shell |
SSL |
Secure Sockets Layer |
SSO |
Single Sign-On |
TACACS |
Terminal Access Controller Access Control System |
TCP/IP |
Transmission Control Protocol/Internet Protocol |
TLS |
Transport Layer Security |
TPM |
Trusted Platform Module |
UAT |
User Acceptance Testing |
UPS |
Uninterrupted Power Supply |
URL |
Universal Resource Locator |
USB |
Universal Serial Bus |
UTP |
Unshielded Twisted Pair |
VLAN |
Virtual Local Area Network |
VoIP |
Voice Over IP |
VPN |
Virtual Private Network |
VTC |
Video Teleconferencing |
WAF |
Web Application Firewall |
WAP |
Wireless Access Point |
WEP |
Wired Equivalent Privacy |
WIDS |
Wireless Intrusion detection System |
WIPS |
Wireless Intrusion Prevention System |
WPA |
Wireless Protected Access |
XSRF |
Cross-Site request Forgery |
XSS |
Cross-Site Scripting |