< IT Security

IT Security/Acronyms

Acronyms that may be found on the exam.
AcronymFull name
AAAAuthentication, Authorization, and

Accounting

ACLAccess Control List
AESAdvanced Encryption Standard
AES-256Advanced Encryption Standards 256-bit
AHAuthentication Header
AIArtificial Intelligence
AISAutomated Indicator Sharing
ALEAnnualized Loss Expectancy
APAccess Point
APIApplication Programming Interface
APTAdvanced Persistent Threat
AROAnnualized Rate of Occurrence
ARPAddress Resolution Protocol
ASLRAddress Space Layout Randomization
ATT&CKAdversarial Tactics, Techniques, and

Common Knowledge

AUPAcceptable Use Policy
AVAntivirus
BASHBourne Again Shell
BCPBusiness Continuity Planning
BGPBorder Gateway Protocol
BIABusiness Impact Analysis
BIOSBasic Input/Output System
BPABusiness Partners Agreement
BPDUBridge Protocol Data Unit
BYODBring Your Own Device
CACertificate Authority
CAPTCHACompletely Automated Public Turing Test to

Tell Computers and Humans Apart

CARCorrective Action Report
CASBCloud Access Security Broker
CBCCipher Block Chaining
CCMPCounter Mode/CBC-MAC Protocol
CCTVClosed-circuit Television
CERTComputer Emergency Response Team
CFBCipher Feedback
CHAPChallenge Handshake Authentication

Protocol

CIAConfidentiality, Integrity, Availability
CIOChief Information Officer
CIRTComputer Incident Response Team
CMSContent Management System
COOPContinuity of Operation Planning
COPECorporate Owned, Personally Enabled
CPContingency Planning
CRCCyclical Redundancy Check
CRLCertificate Revocation List
CSOChief Security Officer
CSPCloud Service Provider
CSRCertificate Signing Request
CSRFCross-site Request Forgery
CSUChannel Service Unit
CTMCounter Mode
CTOChief Technology Officer
CVECommon Vulnerability Enumeration
CVSSCommon Vulnerability Scoring System
CYODChoose Your Own Device
DACDiscretionary Access Control
DBADatabase Administrator
DDoSDistributed Denial of Service
DEPData Execution Prevention
DESDigital Encryption Standard
DHCPDynamic Host Configuration Protocol
DHEDiffie-Hellman Ephemeral
DKIMDomainKeys Identified Mail
DLLDynamic Link Library
DLPData Loss Prevention
DMARCDomain Message Authentication Reporting

and Conformance

DNATDestination Network Address Translation
DNSDomain Name System
DoSDenial of Service
DPOData Privacy Officer
DRPDisaster Recovery Plan
DSADigital Signature Algorithm
DSLDigital Subscriber Line
EAPExtensible Authentication Protocol
ECBElectronic Code Book
ECCElliptic Curve Cryptography
ECDHEElliptic Curve Diffie-Hellman Ephemeral
ECDSAElliptic Curve Digital Signature Algorithm
EDREndpoint Detection and Response
EFSEncrypted File System
ERPEnterprise Resource Planning
ESNElectronic Serial Number
ESPEncapsulated Security Payload
FACLFile System Access Control List
FDEFull Disk Encryption
FIMFile Integrity Management
FPGAField Programmable Gate Array
FRRFalse Rejection Rate
FTPFile Transfer Protocol
FTPSSecured File Transfer Protocol
GCMGalois Counter Mode
GDPRGeneral Data Protection Regulation
GPRGNU Privacy Guard
GPOGroup Policy Object
GPSGlobal Positioning System
GPUGraphics Processing Unit
GREGeneric Routing Encapsulation
HAHigh Availability
HDDHard Disk Drive
HIDSHost-based Intrusion Detection System
HIPSHost-based Intrusion Prevention System
HMACHashed Message Authentication Code
HOTPHMAC-based One-time Password
HSMHardware Security Module
HTMLHypertext Markup Language
HTTPHypertext Transfer Protocol
HTTPSHypertext Transfer Protocol Secure
HVACHeating, Ventilation Air Conditioning
IaaSInfrastructure as a Service
IaCInfrastructure as Code
IAMIdentity and Access Management
ICMPInternet Control Message Protocol
ICSIndustrial Control Systems
IDEAInternational Data Encryption Algorithm
IDFIntermediate Distribution Frame
IdPIdentity Provider
IDSIntrusion Detection System
IEEEInstitute of Electrical and Electronics

Engineers

IKEInternet Key Exchange
IMInstant Messaging
IMAPInternet Message Access Protocol
IoCIndicators of Compromise
IoTInternet of Things
IPInternet Protocol
IPSIntrusion Prevention System
IPSecInternet Protocol Security
IRIncident Response
IRCInternet Relay Chat
IRPIncident Response Plan
ISOInternational Standards Organization
ISPInternet Service Provider
ISSOInformation Systems Security Officer
IVInitialization Vector
KDCKey Distribution Center
KEKKey Encryption Key
L2TPLayer 2 Tunneling Protocol
LANLocal Area Network
LDAPLightweight Directory Access Protocol
LEAPLightweight Extensible Authentication

Protocol

MaaSMonitoring as a Service
MACMandatory Access Control
MACMedia Access Control
MACMessage Authentication Code
MANMetropolitan Area Network
MBRMaster Boot Record
MD5Message Digest 5
MDFMain Distribution Frame
MDMMobile Device Management
MFAMultifactor Authentication
MFDMultifunction Device
MFPMultifunction Printer
MLMachine Learning
MMSMultimedia Message Service
MOAMemorandum of Agreement
MOUMemorandum of Understanding
MPLSMulti-protocol Label Switching
MSAMaster Service Agreement
MSCHAPMicrosoft Challenge Handshake

Authentication Protocol

MSPManaged Service Provider
MSSPManaged Security Service Provider
MTBFMean Time Between Failures
MTTFMean Time to Failure
MTTRMean Time to Recover
MTUMaximum Transmission Unit
NACNetwork Access Control
NATNetwork Address Translation
NDANon-disclosure Agreement
NFCNear Field Communication
NGFWNext-generation Firewall
NIDSNetwork-based Intrusion Detection System
NIPSNetwork-based Intrusion Prevention System
NISTNational Institute of Standards & Technology
NTFSNew Technology File System
NTLMNew Technology LAN Manager
NTPNetwork Time Protocol
OAUTHOpen Authorization
OCSPOnline Certificate Status Protocol
OIDObject Identifier
OSOperating System
OSINTOpen-source Intelligence
OSPFOpen Shortest Path First
OTOperational Technology
OTAOver the Air
OVALOpen Vulnerability Assessment Language
P12PKCS #12
P2PPeer to Peer
PaaSPlatform as a Service
PACProxy Auto Configuration
PAMPrivileged Access Management
PAMPluggable Authentication Modules
PAPPassword Authentication Protocol
PATPort Address Translation
PBKDF2Password-based Key Derivation Function 2
PBXPrivate Branch Exchange
PCAPPacket Capture
PCI DSSPayment Card Industry Data Security

Standard

PDUPower Distribution Unit
PEAPProtected Extensible Authentication

Protocol

PEDPersonal Electronic Device
PEMPrivacy Enhanced Mail
PFSPerfect Forward Secrecy
PGPPretty Good Privacy
PHIPersonal Health Information
PIIPersonally Identifiable Information
PIVPersonal Identity Verification
PKCSPublic Key Cryptography Standards
PKIPublic Key Infrastructure
POPPost Office Protocol
POTSPlain Old Telephone Service
PPPPoint-to-Point Protocol
PPTPPoint-to-Point Tunneling Protocol
PSKPre-shared Key
PTZPan-tilt-zoom
PUPPotentially Unwanted Program
RARecovery Agent
RARegistration Authority
RACEResearch and Development in Advanced

Communications Technologies in Europe

RADRapid Application Development
RADIUSRemote Authentication Dial-in User Service
RAIDRedundant Array of Inexpensive Disks
RASRemote Access Server
RATRemote Access Trojan
RBACRole-based Access Control
RBACRule-based Access Control
RC4Rivest Cipher version 4
RDPRemote Desktop Protocol
RFIDRadio Frequency Identifier
RIPEMDRACE Integrity Primitives Evaluation

Message Digest

ROIReturn on Investment
RPORecovery Point Objective
RSARivest, Shamir, & Adleman
RTBHRemotely Triggered Black Hole
RTORecovery Time Objective
RTOSReal-time Operating System
RTPReal-time Transport Protocol
S/MIMESecure/Multipurpose Internet Mail

Extensions

SaaSSoftware as a Service
SAESimultaneous Authentication of Equals
SAMLSecurity Assertions Markup Language
SANStorage Area Network
SANSubject Alternative Name
SASESecure Access Service Edge
SCADASupervisory Control and Data Acquisition
SCAPSecurity Content Automation Protocol
SCEPSimple Certificate Enrollment Protocol
SD-WANSoftware-defined Wide Area Network
SDKSoftware Development Kit
SDLCSoftware Development Lifecycle
SDLMSoftware Development Lifecycle

Methodology

SDNSoftware-defined Networking
SE LinuxSecurity-enhanced Linux
SEDSelf-encrypting Drives
SEHStructured Exception Handler
SFTPSecured File Transfer Protocol
SHASecure Hashing Algorithm
SHTTPSecure Hypertext Transfer Protocol
SIEMSecurity Information and Event Management
SIMSubscriber Identity Module
SLAService-level Agreement
SLESingle Loss Expectancy
SMSShort Message Service
SMTPSimple Mail Transfer Protocol
SMTPSSimple Mail Transfer Protocol Secure
SNMPSimple Network Management Protocol
SOAPSimple Object Access Protocol
SOARSecurity Orchestration, Automation,

Response

SoCSystem on Chip
SOCSecurity Operations Center
SOWStatement of Work
SPFSender Policy Framework
SPIMSpam over Internet Messaging
SQLStructured Query Language
SQLiSQL Injection
SRTPSecure Real-Time Protocol
SSDSolid State Drive
SSHSecure Shell
SSLSecure Sockets Layer
SSOSingle Sign-on
STIXStructured Threat Information eXchange
SWGSecure Web Gateway
TACACS+Terminal Access Controller Access Control

System

TAXIITrusted Automated eXchange of Indicator

Information

TCP/IPTransmission Control Protocol/Internet

Protocol

TGTTicket Granting Ticket
TKIPTemporal Key Integrity Protocol
TLSTransport Layer Security
TOCTime-of-check
TOTPTime-based One-time Password
TOUTime-of-use
TPMTrusted Platform Module
TTPTactics, Techniques, and Procedures
TSIGTransaction Signature
UATUser Acceptance Testing
UAVUnmanned Aerial Vehicle
UDPUser Datagram Protocol
UEFIUnified Extensible Firmware Interface
UEMUnified Endpoint Management
UPSUninterruptable Power Supply
URIUniform Resource Identifier
URLUniversal Resource Locator
USBUniversal Serial Bus
USB OTGUSB On the Go
UTMUnified Threat Management
UTPUnshielded Twisted Pair
VBAVisual Basic
VDEVirtual Desktop Environment
VDIVirtual Desktop Infrastructure
VLANVirtual Local Area Network
VLSMVariable Length Subnet Masking
VMVirtual Machine
VoIPVoice over IP
VPCVirtual Private Cloud
VPNVirtual Private Network
VTCVideo Teleconferencing
WAFWeb Application Firewall
WAPWireless Access Point
WEPWired Equivalent Privacy
WIDSWireless Intrusion Detection System
WIPSWireless Intrusion Prevention System
WOWork Order
WPAWi-Fi Protected Access
WPSWi-Fi Protected Setup
WTLSWireless TLS
XDRExtended Detection and Response
XMLExtensible Markup Language
XORExclusive Or
XSRFCross-site Request Forgery
XSSCross-site Scripting
This article is issued from Wikiversity. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.