Security Acronyms

  1. 3DES
    Triple Digital Encryption Standard
  2. AAA
    Authentication, Authorization, and Accounting
  3. ACL
    Access Control List
  4. AES
    Advanced Encryption Standard
  5. AES256
    Advanced Encryption Standard 256bit
  6. AH
    Authentication Header
  7. ALE
    Annualized Loss Expectancy
  8. AP
    Access Point
  9. ARO
    Annualized Rate of Occurrence
  10. ARP
    Address Resolution Protocol
  11. AUP
    Acceptable Use Policy
  12. BCP
    Business Continuity Planning
  13. BIOS
    Basic Input / Output System
  14. BOTS
    Network Robots
  15. CA
    Certificate Authority
  16. CAC
    Common Access Card
  17. CAN
    Controller Area Network
  18. CCMP
    Counter-Mode/CBC-Mac Protocol
  19. CCTC
    Closed-circuit Television
  20. CERT
    Computer Emergency Response Team
  21. CHAP
    Challenge Handshake Authentication Protocol
  22. CIRT
    Computer Incident Response Team
  23. CRC
    Cyclical Redundancy Check
  24. CRL
    Certification Revocation List
  25. DAC
    Discretionary Access Control
  26. DDOS
    Distributed Denial of Services
  27. DEP
    Data Execution Prevention
  28. DHCP
    Dynamic Host Configuration Protocol
  29. DLL
    Dynamic Link Library
  30. DLP
    Data Loss Prevention
  31. DMZ
    Demilitarized Zone
  32. DNS
    Domain Name Service (Server)
  33. DOS
    Denial of Service
  34. DRP
    Disaster Recovery Plan
  35. DSA
    Digital Signature Algorithm
  36. EAP
    Extensible Authentication Protocol
  37. ECC
    Elliptic Curve Cryptography
  38. EFS
    Encrypted File System
  39. EMI
    Electromagnetic Interference
  40. ESP
    Encapsulated Security Payload
  41. FTP
    File Transfer Protocol
  42. GPU
    Graphic Processing Unit
  43. GRE
    Genereic Routing Encapsulation
  44. HDD
    Hard Disk Drive
  45. HIDS
    Host Based Intrusion Detection System
  46. HIPS
    Host Based Intrusion Prevention System
  47. HMAC
    Hashed Message Authentication Code
  48. HSM
    Hardware Security Module
  49. HTTP
    Hypertext Transfer Protocol
  50. HTTPS
    Hypertext Transfer Protocol over SSL
  51. HVAC
    Heating, Ventilation Air Conditioning
  52. IaaS
    Infrastructure as a Service
  53. ICMP
    Internet Control Message Protocol
  54. ID
  55. IKE
    Internet Key Exchange
  56. IM
    Instant Message
  57. IMAP4
    Internet Message Access Protocol v4
  58. IP
    Internet Protocol
  59. IPSEC
    Internet Protocol Security
  60. IRC
    Internet Relay Chat
  61. ISP
    Internet Service Provider
  62. IV
    Initialization Vector
  63. KDC
    Key Distribution Center
  64. L2TP
    Layer 2 Tunneling Protocol
  65. LANMAN
    Local Area Network Manager
  66. LDAP
    Lightweight Directory Access Protocol
  67. LEAP
    Lightweight Extensible Authentication Protocol
  68. MAC
    Mandatory Access Control / Media Access Control
  69. MAN
    Metropolitan Area Network
  70. MBR
    Master Boot Record
  71. MD5
    Message Digest 5
  72. MSCHAP
    Microsoft Challenge Handshake Authentication Protocol
  73. MTU
    Maximum Transmission Unit
  74. NAC
    Network Access Conrol
  75. NAT
    Network Address Translation
  76. NIDS
    Network Based Intrustion Detection System
  77. NIPS
    Network Based Intrusion Prevention System
  78. NIST
    National Institute of Standards & Technology
  79. NOS
    Network Operating System
  80. NTFS
    New Technology File System
  81. NTLM
    New Technology LANMAN
  82. NTP
    Network Time Protocol
  83. OS
    Operating System
  84. OVAL
    Open Vulnerability Assessment Language
  85. PAT
    Port Address Translation
  86. PAP
    Password Authentication Protocol
  87. PBX
    Private Branch Exchange
  88. PEAP
    Protected Extensible Authentication Protocol
  89. PED
    Personal Electronic Devices
  90. PGP
    Pretty Good Privacy
  91. PII
    Personally Identifiable Information
  92. PKI
    Public Key Infrastructure
  93. POTS
    Plain Old Telephone Service
  94. PPP
    Point-to-Point Protocol
  95. PPTP
    Point-to-Point Tunneling Protocol
  96. PSK
    Pre Shared Key
  97. PTZ
  98. RA
    Recovery Agent
  99. RAD
    Rapid Application Development
  100. RADIUS
    Remote Authentication Dial-In User
  101. RAID
    Redundant Array of Inexpensive Disks
  102. RAS
    Remote Access Server
  103. RBAC
    • Rule Based Access Control
    • Role Based Access Control
  104. RSA
    Rivest, Shamir, and Adleman
  105. RTO
    Recovery Time Objective
  106. RTP
    Real-Time Transport Protocol
  107. S/MIME
    SecureĀ / Multipurpose Internet Mail Extensions
  108. Saas
    Software as a Service
  109. SCAP
    Security Content Automation Protocol
  110. SCSI
    Small Computer System Interface
  111. SDLC
    Software Development Life Cycle
  112. SDLM
    Software Development Life Cycle Methodology
  113. SHA
    Secure Hashing Algorithm
  114. SHTTP
    Secure Hypertext Transfer Protocol
  115. SIM
    Subscriber Identity Module
  116. SLA
    Service Level Agreement
  117. SLE
    Single Loss Expectancy
  118. SMS
    Short Message Service
  119. SMTP
    Simple Mail Transfer Protocol
  120. SNMP
    Simple Network Management Protocol
  121. SONET
    Synchronized Optical Network Technologies
Card Set
Security Acronyms
Security Acronyms