Home
Flashcards
Preview
Security+ Acronyms
Home
Get App
Take Quiz
Create
3DES
Triple Digital Encryption Standard
AAA
Authentication Authorization Accounting
ACE
Access Control Entry
ACL
Access Control List
AES
Advanced Encryption Standard
AH
Authentication Header
ALE
Annualized Loss Expectancy
AP
Access Point
ARO
Annualized Rate of Occurrence
ARP
Address Resolution Protocol
AUP
Acceptable Use Policy
BCP
Business Continuity Plan
BIA
Business Impact Analysis
BIOS
Basic Input Output System
CA
Certificate Authority
CAC
Common Access Card
CAN
Controller Area Network
CCMP
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
CCTV
Closed Circuit Television
CERT
Computer Emergency Responce Team
CHAP
Challenge Handshake Authentication Protocol
CIA
Confidentiality Integrity Availability
CIRT
Computer Incident Responce Team
COOP
Continuity Of Operations Plan
CRC
Cyclical Redunancy Check
CRL
Certification Revocation List
DAC
Discretionary Access Control
DACL
Discretionary Access Control List
DDOS
Distributed Denail of Service
DEP
Data Execution Prevention
DES
Digital Encryption Standard
DHCP
Dynamic Host Configuration Protocol
DLL
Dynamic Link Library
DLP
Data Loss Protection
DMZ
Demilitarized Zone
DNS
Domain Name System
DoS
Denail Of Service
DRP
Disaster Recovery Plan
DSA
Digital Signature Algorithm
EAP
Extensible Authentication Protocol
ECC
Elliptic Curve Cryptography
EFS
Encrypting File System
EMI
Electromagnetic Interference
ESP
Encapsulating Security Protocol
FTP
File Transfer Protocol
FTPS
File Transfer Protocol Secure
GPG
GNU Privacy Gaurd
GPO
Group Policy Object
GPS
Global Positioning System
GRE
Generic Routing Encapsulation
GUI
Graphical User Interface
HDD
Hard Disk Drive
HIDS
Host-based Intrusion Dectection System
HIPS
Host-based Intrusion Prevention System
HMAC
Hash-based Message Authentication Code
HSM
Hardware Security Module
HTML
Hypertext Markup Language
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol Secure
HVAC
Heating Ventilation and Air Conditioning
IaaS
Infrastructure as a Service
ICMP
Internet Control Message Protocol
ID
Identification
IDS
Intrusion Detection System
IGMP
Internet Group Management Protocol
IIS
Internet Information Services
IKE
Internet Key Exchange
IM
Instant Message
IMAP4
Internet Message Access Protocol v4
IPS
Intrusion Prevention System
IPSec
Internet Protocol Security
IPv4
Internet Protocol v4
IPv6
Internet Protocol v6
IRC
Internet Relay Chat
IRT
Incident Responce Team
ISP
Internet Service Provider
IV
Initialization Vector
KDC
Key Distribution Center
L2TP
Layer 2 Tunneling Protocol
LAN
Local Area Network
LANMAN
Local Area Network Manager
LDAP
Lightwieght Directory Access Protocol
LEAP
Lightwieght Extensible Authentication Protocol
MAC
Mandatory Access Control
MAC
Media Access Control
MAC
Message Authentication Code
MAN
Metropolitan Area Network
MBR
Master Boot Record
MD5
Message Digest 5
MITM
Man in the Middle
MS-CHAP
Microsoft Challenge Handshake Authentication Protocol
MTU
Maximum Transmission Unit
NAC
Network Access Control
NAT
Network Address Translation
NIDS
Network Intrusion Detection System
NIPS
Network Intrusion Prevention System
NIST
National Institue of Standards and Technology
NOOP
No Operation
NOS
Network Operating System
NTFS
New Technology File System
NTLM
New Technology LANMAN
NTP
Network Time Protocol
OS
Operating System
OVAL
Open Vulnerability Assessment Language
P2P
Peer 2 Peer
PaaS
Platform as a Service
PAP
Password Authentication Protocol
PAT
Port Address Translation
PBX
Private Branch Exchange
PEAP
Protected Extensible Authentication Protocol
PED
Personal Electronic Device
PGP
Pretty Good Privacy
PII
Personally Identifiable Information
PIN
Personal Identification Number
PIV
Personal Identity Verification Card
PKI
Public Key Infrastructure
POP3
Post Office Protocol v3
POTS
Plain Old Telephone Service
PPP
Point to Point Protocol
PPTP
Point to Point Tunneling Protocol
PSK
Pre-Shared Key
PTZ
Pan Tilt Zone
RA
Recovery Agent
RADIUS
Remote Authentication Dial-In User Service
RAID
Redundant Array of Inexpensive Disk
RAID-0
Disk Striping
RAID-1
Disk Mirroring
RAID-5
Disk Striping with Parity
RAM
Random Access Memory
RAS
Remote Access Service
RBAC
Role-Based Access Control
RBAC
Rule-Based Access Control
RC4
Ron's Code or Rivest Cipher
RFI
Radio Frequency Interference
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
RPO
Recovery Point Objective
RSTP
Rapid Spanning Tree Protocol
RTO
Recovery Time Objective
RTP
Real-Time Transport Protocol
S/MIME
Secure/Multipurpose Internet Mail Extensions
SaaS
System as a Service
SCAP
Security Content Automation Protocol
SCP
Secure Copy
SCSI
Small Computer System Interface
SDLC
Software Development Life Cycle
SDLM
Software Delopment Life Cycle Methodology
SELinux
Security-Enhanced Linux
SFTP
Secure File Transfer Protocol
SHA
Secure Hash Algorithm
SHTTP
Secure Hypertext Transfer Protocol
SID
Security Identifier
SIM
Subscriber Identity Module
SIRT
Security Incident Response Team
SLA
Service Level Agreement
SLE
Single Loss Expectancy
SMTP
Simple Mail Transfer Protocol
SNMP
Simple Network Management Protocol
SONET
Synchronous Optical Network Technologies
SPIM
Spam over Instant Messaging
SPOF
Single Point of Failure
SQL
Structured Query Language
SSH
Secure Shell
SSID
Service Set Identifier
SSL
Secure Sockets Layer
SSO
Single Sign On
SSTP
Secure Socket Tunneling Protocol
STP
Spanning Tree Protocol
CAT-5 STP
Shielded Twisted Pair
SYN
Synchronize
TACACS
Terminal Access Controller Access-Control System
TCO
Total Cost of Ownership
TCP
Transmission Control Protocol
TFTP
Trivial File Transfer Protocol
TKIP
Temporal Key Integrity Protocol
TLS
Transport Layer Security
TPM
Trusted Platform Module
UAT
User Acceptance Testing
UDP
User Datagram Protocol
UPS
Uniterruptible Power Supply
URL
Universal Resource Locator
USB
Universal Serial Bus
CAT-5 UTP
Unshielded Twisted Pair
VLAN
Virtual Local Area Network
VM
Virtual Machine
VoIP
Voice over Internet Protocol
VPN
Virtual Private Network
VTC
Video Teleconferencing
WAF
Web Application Firewall
WAP
Wireless Access Point
WEP
Wired Equivalent Privacy
WIDS
Wireless Intrusion Detection System
WIPS
Wireless Intrusion Prevention System
WLAN
Wireless Local Area Network
WPA
Wi-Fi Protected Access
WTLS
Wireless Transport Layer Security
XML
Extensible Markup Language
XTACACS
Extended Terminal Access Controller Access Control System
XSRF
Cross-Site Request Forgery
XSS
Cross Site Scripting
Author
soda_guy80
ID
152108
Card Set
Security+ Acronyms
Description
Acronyms
Updated
2012-05-05T01:16:54Z
Show Answers
Home
Flashcards
Preview