click below
click below
Normal Size Small Size show me how
Security+ Acronyms
Term | Definition |
---|---|
AUP | Acceptable Use Policy |
ACL | Access Control List |
AP | Access Point |
ARP | Address Resolution Protocol |
ASLR | Address Space Layout Randomization |
AES | Advanced Encryption Standard |
APT | Advanced Persistent Threat |
ALE | Annualized Loss Expectancy |
ARO | Annualized Rate of Occurrence |
ALG | Application Level Gateway |
API | Application Programming Interface |
ASP | Application Service Provider |
AH | Authentication Header |
BIOS | Basic Input/Output System |
BGP | Border Gateway Protocol |
BPDU | Bridge Protocol Data Unit |
BYOD | Bring Your Own Device |
BCP | Business Continuity Planning |
BPA | Business Partners Agreement |
CRL | Certificate Revocation List |
CSR | Certificate Signing Request |
CHAP | Challenge Handshake Authentication Protocol |
CMT | Change Management Team |
CSU | Channel Service Unit |
CIO | Chief Information Officer |
CSO | Chief Security Officer |
CTO | Chief Technology Officer |
COPPA | Children'S Online Privacy Protection Act |
CFB | Cipher Feedback |
CCTV | Closed-Circuit Television |
CSP | Cloud Service Provider |
CAC | Common Access Card |
CGI | Common Gateway Interface |
CAPTCHA | Completely Automated Public Turing test to tell Computers and Humans Apart |
CERT | Computer Emergency Response Team |
CIRT | Computer Incident Response Team |
CAM Table | Content Addressable Memory Table |
CMS | Content Management System |
CP | Contingency Planning |
COOP | Continuity Of Operation Planning |
CAN | Controller Area Network |
CAR | Corrective Action Report |
CCMP | Counter-mode/CBC-MAC Protocol |
XSRF | Cross-Site Request Forgery |
XSS | Cross-Site Scripting |
CRM | Customer Relationship Management |
CRC | Cyclical Redundancy Check |
DES | Data Encryption Standard |
DEP | Data Execution Prevention |
DLP | Data Loss Prevention |
DSU | Data Service Unit |
DBA | Database Administrator |
DMZ | Demilitarized Zone |
DoS | Denial of Service |
DNAT | Destination Network Address Translation |
DSA | Digital Signature Algorithm |
DSL | Digital Subscriber Line |
DAC | Discretionary Access Control |
DDoS | Distributed Denial of Service |
DNS | Domain Name Service (Server) |
DHCP | Dynamic Host Configuration Protocol |
DLL | Dynamic Link Library |
EEPROM | Electrically Erasavle Programmable Read–Only Memory |
EMI | Electromagnetic Interference |
ESN | Electronic Serial Number |
ECDHE | Elliptic Curve Diffie-Hellman Exchange |
ECDSA | Elliptic Curve Digital Signature Algorithm |
ECC | Elliptic Key Cryptography |
ESP | Encapsulating Security Payload |
EFS | Encrypted File System |
ERP | Enterprise Resource Planning |
EAP | Extensible Authentication Protocol |
EAPoIP | Extensible Authentication Protocol over IP |
XML | Extensible Markup Language |
FRR | False Rejection Rate |
FACL | File system Access Control List |
FTP | File Transfer Protocol |
FCrDNS | Forward Confirmed reverse DNS |
FDE | Full Disk Encryption |
FQDN | Fully Qualified Domain Name |
GCM | Galois Counter Mode |
GRE | Generic Routing Encapsulation |
GPS | Global Positioning System |
GPG | GNU Privacy Guard |
GLBA | Gramm–Leach–Bliley Act |
GPU | Graphic Processing Unit |
GPO | Group Policy Object |
HDD | Hard Disk Drive |
HMAC | Hashed Message Authentication Code |
HIPAA | Health Insurance Portability And Accountability Act |
HVAC | Heating, Ventilation and Air Conditioning |
HA | High Availability |
HOTP | HMAC-based One Time Password |
HIDS | Host Intrusion Detection Systems |
HIPS | Host-based Intrusion Prevention System |
HSRP | Hot Standby Router Protocol |
Web Proxy | HTTP Proxy |
HTML | Hypertext Markup Language |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol over SSL |
IdP | Identity Provider |
IRP | Incident Response Procedure |
ICS | Industrial Control Systems |
IA | Information Assurance |
ILM | Information Lifecycle Management |
ISSO | Information Systems Security Officer |
IaaS | Infrastructure as a Service |
IV | Initialization Vector |
RIPEMD RACE | Integrity Primitives Evaluation Message Digest |
ISA | Interconnection Security Agreement |
IDF | Intermediate Distribution Frame |
IDEA | International Data Encryption Algorithm |
ICMP | Internet Control Message Protocol |
IKE | Internet key Exchange |
IMAP4 | Internet Message Access Protocol v4 |
IoT | Internet of Things |
IP | Internet Protocol |
IPSec | Internet Protocol Security |
IRC | Internet Relay Chat |
ISP | Internet Service Provider |
IDS | Intrusion Detection System |
ITCP | IT Contingency Plan |
JBOD | Just a Bunch Of Disks |
KDC | Key Distribution Center |
KEK | Key Encryption Key |
KHMAC | Key Hashing for Message Authentication Code |
UR | L Universal Resource Locator |
L2TP | Layer 2 Tunneling Protocol |
LDAP | Lightweight Directory Access Protocol |
LEAP | Lightweight Extensible Authentication Protocol |
LAN | Local Area Network |
LFM | Log File Monitor |
MX Record | Mail Exchange Record |
MDF | Main Distribution Frame |
MAC | Mandatory Access Control |
MITM Attack | Man-in-the-Middle Attack |
MTU | Maximum Transmission Unit |
MTBF | Mean Time Between Failures |
MTTF | Mean Time To Failure |
MTTR | Mean Time To Recover |
MOU | Memorandum Of Understanding |
MAC | Message Authentication Code |
MD5 | Message-Digest Algorithm 5 |
MAN | Metropolitan Area Network |
MSCHAP | Microsoft Challenge Handshake Authentication Protocol |
MTSO | Mobile Telecommunications Switching Office |
MaaS | Monitoring as a Service |
MPLS | Multi-Protocol Layer Switch |
NIST | National Institute of Standards and Technology |
NFC | Near Field Communication |
NAC | Network Access Control |
NAC | Network Address Control |
NAT | Network Address Translation |
NAS | Network Attached Storage |
NIDS | Network Intrusion Detection System |
NIPS | Network Intrusion Prevention System |
NMS | Network Management System |
NNTP | Network News Transfer Protocol |
NOS | Network Operating System |
NTP | Network Time Protocol |
NTFS | New Technology File System |
NTLM | New Technology LAN Manager |
NX | No Execute |
NDA | Non-Disclosure Agreement |
OTP | One Time Pad |
OCSP | Online Certificate Status Protocol |
OAUTH | Open Authorization |
OLA | Open License Agreement |
OVAL | Open Vulnerability Assessment Language |
OS | Operating System |
PCAP | Packet Capture |
PTZ | Pan-Tilt-Zoom |
PAP | Password Authentication Protocol |
PBKDF2 | Password-Based Key Derivation Function 2 |
P2P | Peer to Peer |
PFS | Perfect Forward Secrecy |
PDoS Attack | Permanent DoS Attack |
PED | Personal Electronic Device |
PIV | Personal Identity Verification |
PII | Personally Identifiable Information |
POD | Ping Of Death |
POTS | Plain Old Telephone Service |
PaaS | Platform as a Service |
PAM | Pluggable Authentication Modules |
POP | Point of Presence |
PPP | Point-to-Point Protocol |
PPTP | Point-to-Point Tunneling Protocol |
PAT | Port Address Translation |
POP3 | Post Office Protocol v3 |
PSK | Pre-Shared Key |
PGP | Pretty Good Privacy |
PBX | Private Branch Exchange |
PROM | Programmable Read–Only Memory |
PEAP | Protected Extensible Authentication Protocol |
PAC | Proxy Auto Configuration |
PKI | Public Key Infrastructure |
PSTN | Public Switched Telephone Network |
RFI | Radio Frequency Interference |
RAD | Rapid Application Development |
RTP | Real-time Transport Protocol |
RA | Recovery Agent |
RPO | Recovery Point Objectives |
RTO | Recovery Time Objectives |
RAID 1 | Redundant Array of Independent Disks 1 |
RAID 5 | Redundant Array of Independent Disks 5 |
RAID | Redundant Array of Inexpensive Disks |
RA | Registration Authority |
RAS | Remote Access Service |
RADIUS | Remote Authentication Dial-In User Server |
RDP | Remote Desktop Protocol |
RTBH Filtering | Remote Triggered Black Hole Filtering |
ROI | Return On Investment |
RSA | Rivest, Shamir and Adleman |
RBAC | Role–Based Access Control |
RC4 | RSA Variable Key Size Encryption Algorithm |
Sarbox | Sarbanes–Oxley Act |
SHA | Secure Hash Algorithm |
SHTTP | Secure Hypertext Transfer Protocol |
SSH | Secure Shell |
SSL | Secure Sockets Layer |
S/MIME | Secure/Multipurpose Internet Mail Extensions |
SFTP | Secured File Transfer Protocol |
SAML | Security Assertions Markup Language |
SCAP | Security Content Automation Protocol |
SIEM | Security Information and Event Management |
SPA | Security Posture Assessments |
SoD | Separation of Duties |
SMB Protocol | Server Message Block Protocol |
SLA | Service Level Agreement |
SP | Service Pack |
SSID | Service Set Identifier |
SCP | Session Control Protocol |
STP | Shielded Twisted Pair |
SMS | Short Message Service |
SCEP | Simple Certificate Enrollment Protocol |
SMTP | Simple Mail Transfer Protocol |
SNMP | Simple Network Management Protocol |
SOAP | Simple Object Access Protocol |
SLE | Single Loss Expectancy |
SSO | Single Sign-On |
SCSI | Small Computer System Interface |
SaaS | Software as a Service |
SDLM | Software Development Life Cycle Methodology |
SSD | Solid State Drive |
SPIM | Spam over Internet Messaging |
SPI | Stateful Packet Inspection |
Static NAT | Static Network Address Translation |
SAN | Storage Area Network |
SEH | Structured Exception Handler |
SQL | Structured Query Language |
SIM | Subscriber Identity Module |
SONET | Synchronous Optical Network Technologies |
SCADA | System Control and Data Acquisition |
SIV | System Integrity Verifier |
SDLC | Systems Development Life Cycle |
TKIP | Temporal Key Integrity Protocol |
TACACS | Terminal Access Controller Access Control System |
TACACS+ | Terminal Access Controller Access Control System Plus |
TGT | Ticket Granting Ticket |
TOTP | Time-based One-Time Password |
TSIG | Transaction Signature |
TCP/IP | Transmission Control Protocol/Internet Protocol |
TLS | Transport Layer Security |
3DES | Triple Data Encryption Standard |
TFTP | Trivial File Transfer Protocol |
TCSEC | Trusted Computer System Evaluation Criteria |
TPM | Trusted Platform Module |
UEFI | Unified Extensible Firmware Interface |
UTM | Unified Threat Management |
URI | Uniform Resource Identifier |
UPS | Uninterruptable Power Supply |
USB | Universal Serial Bus |
UTP | Unshielded Twisted Pair |
UAT | User Acceptance Testing |
UAC | User Account Control |
UDP | User Datagram Protocol |
VLSM | Variable Length Subnet Masking |
VTC | Video Teleconferencing |
VLAN | Virtual Local Area Network |
VLAN Hopping | Virtual Local Area Network Hopping |
VM | Virtual Machine |
VPN | Virtual Private Network |
VDI | Virtualization Desktop Infrastructure |
VoIP | Voice over IP |
WAF | Web-Application Firewall |
WPA | WiFi Protected Access |
WPS | WiFi Protected Setup |
WEP | Wired Equivalent Privacy |
WAP | Wireless Access Point |
WIDS | Wireless Intrusion Detection System |
WIPS | Wireless Intrusion Prevention System |
WTLS | Wireless TLS |