Acronym |
Stands for |
3DES | Triple Data Encryption Standard |
AAA | Authentication, Authorization and Accounting |
ACL | Access Control List |
AES | Advanced Encryption Standard |
AES 256 | Advanced Encryption Standards, 256-bit |
AH | Authentication Header |
ARP | Address Resolution Protocol |
AUP | Acceptable Use Policy |
BCP | Business Continuity Planning |
BIOS | Basic Input/Output System |
BOTS | Network Robots |
CA | Certificate Authority |
CCTV | Closed-Circuit Television |
CERT | Computer Emergency Response Team |
CHAP | Challenge Handshake Authentication Protocol |
CIRT | Computer Incident Response Team |
CRL | Certification Revocation List |
DAC | Discretionary Access Control |
DDOS | Distributed Denial of Service |
DEP | Data Execution Prevention |
DES | Data Encryption Standard |
DHCP | Dynamic Host Configuration Protocol |
DLL | Dynamic Link Library |
DLP | Data Loss Prevention |
DMZ | Demilitarized Zone |
DNS | Domain Name Service |
DOS | Denial Of Service |
DRP | Disaster Recovery Plan |
DSA | Digital Signature Algorithm |
EAP | Extensible Authentication Protocol |
ECC | Elliptic Curve Cryptography |
EFS | Encrypted File System |
EMI | Electromagnetic Interference |
ESP | Encapsulated Security Payload |
FTP | File Transfer Protocol |
GPU | Graphic Processing Unit |
GRE | Generic Routing Encapsulation |
HDD | Hard Disk Drive |
HIDS | Host-Based Intrusion Detection System |
HIPS | Host-Based Intrusion Prevention System |
HMAC | Hashed Message Authentication Code |
HSM | Hardware Security Module |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol over SSL |
HVAC | Heating, Ventilation, Air Conditioning |
IaaS | Infrastructure as a Service |
ICMP | Internet Control Message Protocol |
ID | Identification |
IKE | Internet Key Exchange |
IM | Internet Messaging |
IMAP4 | Internet Message Access Protocol v4 |
IP | Internet Protocol |
IPSEC | Internet Protocol Security |
IRC | Internet Relay Chat |
ISP | Internet Service Provider |
KDC | Key Distribution Center |
L2TP | Layer 2 Tunneling Protocol |
LANMAN | Local Area Network Manager |
LDAP | Lightweight Directory Access Protocol |
LEAP | Lightweight Extensible Authentication Protocol |
MAC | Mandatory Access Control / Media Access Control |
MAC | Message Authentication Code |
MBR | Master Boot Record |
MDS | Message Digest 5 |
MSCHAP | Microsoft Challenge Handshake Authentication Protocol |
MTU | Maximum Transmission Unit |
NAC | Network Access Control |
NAT | Network Address Translation |
NIDS | Network-Based Intrusion Detection System |
NIPS | Network-Based Intrusion Prevention System |
NOS | Network Operating System |
NTFS | New Technology File System |
NTLM | New Technology LANMAN |
NTP | Network Time Protocol |
OS | Operating System |
OVAL | Open Vulnerability Assessment Language |
PAP | Password Authentication Protocol |
PAT | Port Address Translation |
PEAP | Protected Extensible Authentication Protocol |
PGP | Pretty Good Privacy |
PKI | Public Key Infrastructure |
PPP | Point-to-Point Protocol |
PPTP | Point-to-Point Tunneling Protocol |
PSK | Pre-Shared Key |
RA | Recovery Agent |
RADIUS | Remote Authentication Dial-in User Server |
RAID | Redundant Array of Inexpensive Disks |
RAS | Remote Access Server |
RBAC | Role Based Access Control |
RSA | Rivest, Shamir & Adleman |
RTP | Real-Time Transport Protocol |
S/MIME | Secure/Multipurpose Internet Mail Extension |
SaaS | Software as a Service |
SCAP | Security Content Automation Protocol |
SCSi | Small Computer System Interface |
SDLC | Software Development Life Cycle |
SDLM | Software Development Life Cycle Methodology |
SHA | Secure Hashing Algorithm |
SHTTP | Secure Hypertext Transfer Protocol |
SIM | Subscriber Identity Module |
SLA | Service Level Agreement |
SLE | Single Loss Expectancy |
SMS | Short Message Service |
SMTP | Simple Mail Transfer Protocol |
SNMP | Simple Network Management Protocol |
SSH | Secure Shell |
SSL | Secure Sockets Layer |
SSO | Single Sign-On |
TACACS | Terminal Access Controller Access Control System |
TCP/IP | Transmission Control Protocol/Internet Protocol |
TLS | Transport Layer Security |
TPM | Trusted Platform Module |
UAT | User Acceptance Testing |
UPS | Uninterrupted Power Supply |
URL | Universal Resource Locator |
USB | Universal Serial Bus |
UTP | Unshielded Twisted Pair |
VLAN | Virtual Local Area Network |
VoIP | Voice Over IP |
VPN | Virtual Private Network |
VTC | Video Teleconferencing |
WAF | Web Application Firewall |
WAP | Wireless Access Point |
WEP | Wired Equivalent Privacy |
WIDS | Wireless Intrusion detection System |
WIPS | Wireless Intrusion Prevention System |
WPA | Wireless Protected Access |
XSRF | Cross-Site request Forgery |
XSS | Cross-Site Scripting |