click below
click below
Normal Size Small Size show me how
Net+ & Sec+ Acronyms
Network+ & Security+ Acronyms
| Term | Definition |
|---|---|
| 3DES | Triple DES |
| AAA | Authentication, Authorization, and Accounting |
| AC | Alternating Current |
| ACL | Access Control List |
| ACS | Access Control Server |
| ADSL | Asymmetric Digital Subscriber Line |
| AES | Advanced Encryption Standard |
| AH | Authentication Header |
| AHP | Authentication Header Protocol |
| ALE | Annualized Loss Expectancy |
| ALG | Application Level Gateway |
| ANS | Authoritative Name Server |
| ANSI | American National Standards Institute |
| AP | Access Point |
| APC | Angled Physical Contact |
| API | Application Programming Interface |
| APIPA | Automatic Private IP Addressing |
| APT | Advanced Persistent Threat |
| ARO | Annualized Rate of Occurrence |
| ARP | Address Resolution Protocol |
| AS | Authentication Server |
| AS | Autonomous System |
| ASLR | Address Space Layout Randomization |
| ASP | Application Service Provider |
| ATM | Asynchronous Transfer Mode |
| AUI Connector | Attachment Unit Interface Connector |
| B Channel | Bearer Channel |
| BCP | Business Continuity Planning |
| BDR | Backup Designated Router |
| BERT | Bit Error Rate Test |
| BGP | Border Gateway Protocol |
| BIOS | Basic Input/Output System |
| BOOTP | Bootstrap Protocol |
| BPA | Business Partners Agreement |
| BPDU | Bridge Protocol Data Unit |
| BPL | Broadband over Powerlines |
| BPS | Bits Per Second |
| BRI | Basic Rate Interface |
| BSS | Basic Service Set |
| BSSID | Basic Service Set Identifier |
| BYOD | Bring Your Own Device |
| CA | Certificate Authority |
| CAB Files | Cabinet Files |
| CAC | Common Access Card |
| CAM Table | Content Addressable Memory Table |
| CAN | Campus Area Network |
| CAN | Controller Area Network |
| CAPTCHA | Completely Automated Public Turing test to tell Computers and Humans Apart |
| CAR | Corrective Action Report |
| CARP | Common Address Redundancy Protocol |
| CCITT | Comité Consutatif Internationale Téléphonique et Télégraphique |
| CCMP | Counter Mode with Cipher Block Chaining Message Authentication Code Protocol |
| CCTV | Closed-Circuit Television |
| CDS/DSU | Channel Service Unit/Data Service Unit |
| CERT | Computer Emergency Response Team |
| CFB | Cipher Feedback |
| CGI | Common Gateway Interface |
| CHAP | Challenge Handshake Authentication Protocol |
| CIA/AIC | Confidentiality, Integrity, Availability |
| CIDR | Classless Inter Domain Routing |
| CIFS | Common Internet File System |
| CIO | Chief Information Officer |
| CIRT | Computer Incident Response Team |
| CMS | Content Management System |
| CNAME | Canonical Name Record |
| COOP | Continuity Of Operation Planning |
| COPPA | Children'S Online Privacy Protection Act |
| CoS | Class of Service |
| CPE | Customer-Premises Equipment |
| CRC | Cyclic Redundancy Check |
| CRL | Certificate Revocation List |
| CRM | Customer Relationship Management |
| CSMA/CA | Carrier Sense Multiple Access with Collision Avoidance |
| CSMA/CD | Carrier Sense Multiple Access with Collision Detection |
| CSO | Chief Security Officer |
| CSP | Cloud Service Provider |
| CSR | Certificate Signing Request |
| CSU | Channel Service Unit |
| CTO | Chief Technology Officer |
| CWDM | Coarse Wavelength Division Multiplexing |
| D Channel | Delta Channel |
| DAC | Discretionary Access Control |
| DAI | Dynamic ARP Inspection |
| Db | Decibel |
| DBA | Database Administrator |
| DC | Direct Current |
| DCE | Data Communications Equipment |
| DCF | Distributed Coordination Function |
| DCS | Distributed Control System |
| DDNS | Dynamic DNS |
| DDoS | Distributed Denial of Service |
| DDoS Attack | Distributed Denial of Service Attack |
| DEP | Data Execution Prevention |
| DES | Data Encryption Standard |
| DET | Directory Entry Table |
| DFS | Distributed File System |
| DHCP | Dynamic Host Configuration Protocol |
| DiffServ | Differentiated Services |
| DIG | Domain Information Groper |
| DLL | Dynamic Link Library |
| DLP | Data Loss Prevention |
| DMZ | Demilitarized Zone |
| DNAT | Destination Network Address Translation |
| DNS | Domain Name System |
| DNSBLs | DNS Blacklists |
| DOCSIS | Data Over Cable Service Interface Specification |
| DoS | Denial of Service |
| DoS Attack | Denial of Service Attack |
| DR | Designated Router |
| DS | Distribution System |
| DS1 | Digital Signal 1 |
| DSA | Digital Signature Algorithm |
| DSH | Digital Signal Hierarchy |
| DSL | Digital Subscriber Line |
| DSLAM | DSL Access Multiplexer |
| DSP | Digital Signal Processor |
| DSSS | Direct Sequence Spread Spectrum |
| DSU | Data Service Unit |
| DTE | Data Termination Equipment |
| DVM | Digital Volt Meter |
| DWDM | Dense Wavelength Division Multiplexing |
| EAP | Extensible Authentication Protocol |
| EAPoIP | Extensible Authentication Protocol over IP |
| EAPOL | Extensible Authentication Protocol over LAN |
| EAP-TLS | Extensible Authentication Protocol with Transport Layer Security |
| EAP-TTLS | Extensible Authentication Protocol with Tunneled Transport Layer Security |
| ECC | Elliptic Key Cryptography |
| ECDHE | Elliptic Curve Diffie-Hellman Exchange |
| ECDSA | Elliptic Curve Digital Signature Algorithm |
| EDAC | Error Detection and Correction |
| EDB | External Data Bus |
| EDC | Error Detection Code |
| EEPROM | Electrically Erasable Programmable Read–Only Memory |
| EFS | Encrypting File System |
| EGP | Exterior Gateway Protocol |
| EIA | Electronic Industries Alliance |
| EIGRP | Enhanced Interior Gateway Routing Protocol |
| Electronic Mail | |
| EMI | Electromagnetic Interference |
| EoP | Ethernet Over Power |
| ERP | Enterprise Resource Planning |
| ES | Edge System |
| ESD | Electrostatic Discharge |
| ESN | Electronic Serial Number |
| ESP | Encapsulating Security Payload |
| ESP Protocol | Encapsulating Security Payload Protocol |
| ESS | Extended Service Set |
| ESSID | Extended Service Set Identifier |
| EUI-48 | Extended Unique Identifier, 48-bit |
| EUI-64 | Extended Unique Identifier, 64-bit |
| FACL | File system Access Control List |
| FAT | File Allocation Table |
| FC | Face Contact |
| FC | Fibre Channel |
| FCC | Federal Communications Commission |
| FCrDNS | Forward Confirmed reverse DNS |
| FCS | Frame Check Sequence |
| FDDI | Fiber Distributed Data Interface |
| FDE | Full Disk Encryption |
| FDM | Frequency Division Multiplexing |
| FEXT | Far-End Crosstalk |
| FHSS | Frequency Hopping Spread Spectrum |
| FQDN | Fully Qualified Domain Name |
| FRR | False Rejection Rate |
| FTP | File Transfer Protocol |
| GBIC | Gigabit Interface Converter |
| GCM | Galois Counter Mode |
| GFS | Grandfather, Father, Son |
| GIF | Graphics Interchange Format |
| GLBA | Gramm–Leach–Bliley Act |
| GPG | GNU Privacy Guard |
| GPO | Group Policy Object |
| GPS | Global Positioning System |
| GPU | Graphic Processing Unit |
| GRE | Generic Routing Encapsulation |
| HCC | Horizontal cross-connect |
| HDD | Hard Disk Drive |
| HEC | HDMI Ethernet Channel |
| Hex | Hexadecimal |
| HIDS | Host Intrusion Detection Systems |
| HIPAA | Health Insurance Portability And Accountability Act |
| HIPS | Host-based IPS |
| HMAC | Hashed Message Authentication Code |
| HMI | Human Machine Interface |
| HOTP | HMAC-based One Time Password |
| HSM | Hardware Security Module |
| HSPA+ | Evolved High-Speed Packet Access |
| HSRP | Hot Standby Router Protocol |
| HTML | Hypertext Markup Language |
| HTTP | Hypertext Transfer Protocol |
| HTTPS | Hypertext Transfer Protocol over SSL |
| HVAC | Heating, Ventilating, and Air Conditioning |
| IA | Information Assurance |
| IaaS | Infrastructure as a Service |
| IANA | Internet Assigned Number Authority |
| IAS | Internet Authentication Service |
| IBSS | Independent Basic Service Set |
| ICA | Independent Computing Architecture |
| ICANN | Internet Corporation for Assigned Names and Numbers |
| ICC | Intermediate Cross-connect |
| ICMP | Internet Control Message Protocol |
| ICS | Industrial Control Server |
| ICS | Internet Connection Sharing |
| IDEA | International Data Encryption Algorithm |
| IDF | Intermediate Distribution Frame |
| IdP | Identity Provider |
| IDS | Intrusion Detection System |
| IEEE | Institute of Electrical and Electronics Engineers |
| IETF | Internet Engineering Task Force |
| IFG | Interframe Gap |
| IFS | Interframe Space |
| IGMP | Internet Group Management Protocol |
| IGP | Interior Gateway Protocol |
| IGRP | Interior Gateway Routing Protocol |
| IIS | Internet Information Services |
| IKE | Internet Key Exchange |
| ILM | Information Lifecycle Management |
| IMAP4 | Internet Message Access Protocol |
| IoT | Internet of Things |
| IP | Internet Protocol |
| IPS | Intrusion Prevention System |
| IPSec | Internet Protocol Security |
| IPv4 | Internet Protocol Version 4 |
| IPv6 | Internet Protocol Version 6 |
| IRC | Internet Relay Chat |
| IRP | Incident Response Policy |
| ISA | Interconnection Security Agreement |
| ISATAP | Intra-Site Automatic Tunnel Addressing Protocol |
| iSCSI | Internet Small Computer System Interface |
| ISDN | Integrated Services Digital Network |
| IS-IS | Intermediate System to Intermediate System |
| ISOC | International Organization for Standardization |
| iSOC | Internet Society |
| ISP | Internet Service Provider |
| ISSO | Information Systems Security Officer |
| IT | Information Technology |
| ITCP | IT Contingency Plan |
| ITU | International Telecommunication Union |
| IV | Initialization Vector |
| JBOD | Just a Bunch of Disks |
| JPEG | Joint Photographic Experts Group |
| Kbps | Kilobits Per Second |
| KDC | Key Distribution Center |
| KEK | Key Encryption Key |
| KHMAC | Key Hashing for Message Authentication Code |
| KHz | Kilohertz |
| L2TP | Layer 2 Tunneling Protocol |
| LACP | Link Aggregation Control Protocol |
| LAN | Local Area Network |
| LC | Local Connector |
| LDAP | Lightweight Directory Access Protocol |
| LEAP | Lightweight Extensible Authentication Protocol |
| LED | Light Emitting Diode |
| LFM | Log File Monitor |
| LLC | Logical Link Control |
| LTE | Long Term Evolution |
| MaaS | Monitoring as a Service |
| MAC | Mandatory Access Control |
| MAC | Media Access Control |
| MAC | Message Authentication Code |
| MAC Address | Media Access Control Address |
| MAN | Metropolitan Area Network |
| MB | Megabyte |
| MBSA | Microsoft Baseline Security Analyzer |
| MCC | Main cross-connect |
| MD5 | Message-Digest Algorithm Version 5 |
| MDF | Main Distribution Frame |
| MGCP | Media Gateway Control Protocol |
| MHz | Megahertz |
| MIB | Management Information Base |
| MIME | Multipurpose Internet Mail Extensions |
| MIMO | Multiple In/Multiple Out |
| MMC | Microsoft Management Console |
| MME | MME (Mesh Made Easy) |
| MMF | Multimode Fiber |
| Modem | Modulator-Demodulator |
| MOU | Memorandum of Understanding |
| MPLS | Multiprotocol Label Switching |
| MPPE | Microsoft Point-to-Point Encryption |
| MSA | Multisource Agreement |
| MSCHAP | Microsoft Challenge Handshake Authentication Protocol |
| MSDS | Material Safety Data Sheet |
| MTBF | Mean Time Between Failures |
| mtr | My Traceroute |
| MT-RJ | Mechanical Transfer Registered Jack |
| MTSO | Mobile Telecommunications Switching Office |
| MTTF | Mean Time To Failure |
| MTTR | Mean Time To Recover |
| MTU | Maximum Transmission Unit |
| MUX | Multiplexer |
| MX | Mail Exchange |
| MX Record | Mail Exchange Record |
| NaaS | Network as a Service |
| NAC | Network Access Control |
| NAC | Network Address Control |
| NAS | Network Access Server |
| NAS | Network Attached Storage |
| NAT | Network Address Translation |
| NDA | Non-Disclosure Agreement |
| NetBEUI | NetBIOS Extended User Interface |
| NetBIOS | Network Basic Input/Output System |
| NetBT | NetBIOS over TCP/IP |
| NEXT | Near-End Crosstalk |
| NFC | Near Field Communication |
| NFS | Network File System |
| NIC | Network Interface Card |
| NIDS | Network Intrusion Detection System |
| NIPS | Network-based IPS |
| NIST | National Institute of Standards and Technology |
| NIU | Network Interface Unit |
| NMS | Network Management Software |
| NMS | Network Management Station |
| NNI | Network-to-Network Interface |
| NNTP | Network News Transfer Protocol |
| NOS | Network Operating System |
| NRZ | Non-Return to Zero |
| NRZI | Non-Return to Zero Inverted |
| NS | Name Server |
| ns | Nanosecond |
| NT | Network Termination |
| NTFS | New Technology File System |
| NTLM | New Technology LAN Manager |
| NTP | Network Time Protocol |
| NTU | Network Termination Unit |
| NX | No Execute |
| OAUTH | Open Authorization |
| OCSP | Online Certificate Status Protocol |
| OCx | Optical Carrier x |
| OEM | Original Equipment Manufacturer |
| OLA | Open License Agreement |
| OS | Operating System |
| OSI | Open Systems Interconnection |
| OSI Model | Open Systems Interconnection Reference Model |
| OSPF | Open Shortest Path First |
| OTDR | Optical Time-Domain Reflectometer |
| OTP | One Time Pad |
| OUI | Organizationally Unique Identifier |
| OVAL | Open Vulnerability Assessment Language |
| P2P | Peer to Peer |
| PaaS | Platform as a Service |
| PAC | Proxy Auto Configuration |
| PAM | Pluggable Authentication Modules |
| PAN | Personal Area Network |
| PAP | Password Authentication Protocol |
| PAT | Port Address Translation |
| PBKDF2 | Password-Based Key Derivation Function 2 |
| PBX | Private Branch Exchange |
| PCAP | Packet Capture |
| PDH | Plesiochronous Digital Hierarchy |
| PDoS Attack | Permanent DoS Attack |
| PEAP | Protected Extensible Authentication Protocol |
| PED | Personal Electronic Device |
| PFS | Perfect Forward Secrecy |
| PGP | Pretty Good Privacy |
| PII | Personally Identifiable Information |
| PIV | Personal Identity Verification |
| PKI | Public Key Infrastructure |
| POD | Ping Of Death |
| PoE | Power over Ethernet |
| PON | Passive Optical Network |
| POP | Point of Presence |
| POP3 | Post Office Protocol version 3 |
| POTS | Plain Old Telephone Service |
| PPP | Point-to-Point Protocol |
| PPTP | Point-to-Point Tunneling Protocol |
| PROM | Programmable Read–Only Memory |
| PSK | Pre-Shared Key |
| PSTN | Public Switched Telephone Network |
| PTR | Pointer |
| PTZ | Pan-Tilt-Zoom |
| PVC | Permanent Virtual Circuit |
| PVC | Polyvinyl Chloride |
| QoS | Quality of Service |
| RA | Recovery Agent |
| RA | Registration Authority |
| RAD | Rapid Application Development |
| RADIUS | Remote Authentication Dial-In User Service |
| RAID | Redundant Array of Inexpensive Disks |
| RAID 1 | Redundant Array of Independent Disks 1 |
| RAID 5 | Redundant Array of Independent Disks 5 |
| RARP | Reverse Address Resolution Protocol |
| RAS | Remote Access Services |
| RBAC | Role–Based Access Control |
| RC4 | RSA Variable Key Size Encryption Algorithm |
| RDP | Remote Desktop Protocol |
| RF | Radio Frequency |
| RFB | Remote Framebuffer |
| RFI | Radio Frequency Interference |
| RIP | Routing Information Protocol |
| RIPEMD RACE | Integrity Primitives Evaluation Message Digest |
| ROI | Return On Investment |
| RPO | Recovery Point Objectives |
| RSA | Rivest, Shamir and Adleman |
| RTBH Filtering | Remote Triggered Black Hole Filtering |
| RTO | Recovery Time Objectives |
| RTP | Real-time Transport Protocol |
| S/MIME | Secure/Multipurpose Internet Mail Extensions |
| SA | Security Association |
| SaaS | Software as a Service |
| SAML | Security Assertions Markup Language |
| SAN | Storage Area Network |
| Sarbox | Sarbanes–Oxley Act |
| SC | Subscriber Connector or Standard Connector |
| SCADA | System Control and Data Acquisition |
| SCAP | Security Content Automation Protocol |
| SCEP | Simple Certificate Enrollment Protocol |
| SCP | Secure Copy Protocol |
| SCSI | Small Computer System Interface |
| SDH | Synchronous Digital Hierarchy |
| SDLC | Systems Development Life Cycle |
| SDLM | Software Development Life Cycle Methodology |
| SEH | Structured Exception Handler |
| SFP | Small Form Factor Pluggable |
| SFTP | Secured File Transfer Protocol |
| SHA | Secure Hash Algorithm |
| SHTTP | Secure Hypertext Transfer Protocol |
| SIEM | Security Information and Event Management |
| SIM | Subscriber Identity Module |
| SIV | System Integrity Verifier |
| SLA | Service Level Agreement |
| SLE | Single Loss Expectancy |
| SMA | Sub Multi Assembly or Sub Miniature type A |
| SMB | Server Message Block |
| SMB Protocol | Server Message Block Protocol |
| SMS | Short Message Service |
| SMTP | Simple Mail Transfer Protocol |
| SNIPS | System and Network Integrated Polling Software |
| SNMP | Simple Network Management Protocol |
| SOA | Start of Authority |
| SOAP | Simple Object Access Protocol |
| SoD | Separation of Duties |
| SOHO | Small office/home office |
| SONET | Synchronous Optical Network |
| SPA | Security Posture Assessments |
| SPI | Security Parameters Index |
| SPI | Stateful Packet Inspection |
| SPIM | Spam over Internet Messaging |
| SQL | Structured Query Language |
| SRV | Service Locator |
| SSD | Solid State Drive |
| SSH | Secure Shell |
| SSID | Service Set Identifier |
| SSL | Secure Sockets Layer |
| SSL VPN | Secure Socket Layer VPN |
| SSO | Single Sign-On |
| SSTP | Secure Socket Tunneling Protocol |
| ST | Straight Tip |
| STA | Station |
| Static NAT | Static Network Address Translation |
| STP | Shielded Twisted Pair |
| STP | Spanning-Tree Protocol |
| SVC | Switched Virtual Circuit |
| TA | Terminal Adapters |
| TACACS | Terminal Access Controller Access Control System |
| TACACS+ | Terminal Access Controller Access Control System Plus |
| TCP | Transmission Control Protocol |
| TCP/IP | Transmission Control Protocol/Internet Protocol |
| TCSEC | Trusted Computer System Evaluation Criteria |
| TDM | Time-Division Multiplexing |
| TDR | Time-Domain Reflectometer |
| TE | Terminal Equipment |
| TFTP | Trivial File Transfer Protocol |
| TGT | Ticket Granting Ticket |
| TIA | Telecommunications Industry Association |
| TIFF | Tagged Image File Format |
| TKIP | Temporal Key Integrity Protocol |
| TLS | Transport Layer Security |
| TOTP | Time-based One-Time Password |
| TPM | Trusted Platform Module |
| TSIG | Transaction Signature |
| TTL | Time To Live |
| TTS | Transaction Tracking System |
| UAC | User Account Control |
| UAT | User Acceptance Testing |
| UDP | User Datagram Protocol |
| UEFI | Unified Extensible Firmware Interface |
| UNI | User-to-Network Interface |
| UPS | Uninterruptible Power Supply |
| UR | L Universal Resource Locator |
| URI | Uniform Resource Identifier |
| USB | Universal Serial Bus |
| UTM | Unified Threat Management |
| UTP | Unshielded Twisted Pair |
| VCC | Vertical Cross-Connect |
| VDI | Virtualization Desktop Infrastructure |
| VER | Voltage Event Recorder |
| VLAN | Virtual LAN |
| VLAN Hopping | Virtual Local Area Network Hopping |
| VLSM | Variable Length Subnet Mask |
| VM | Virtual Machine |
| VNC | Virtual Network Computing |
| VoIP | Voice over IP |
| VPN | Virtual Private Network |
| VSAT | Very Small Aperture Terminal |
| VTC | Video Teleconferencing |
| VTP | VLAN Trunking Protocol |
| WAF | Web-Application Firewall |
| WAN | Wide Area Network |
| WAP | Wireless Access Point |
| Web Proxy | HTTP Proxy |
| WEP | Wired Equivalent Privacy |
| WIDS | Wireless Intrusion Detection System |
| WiMAX | Worldwide Interoperability for Microwave Access |
| WINS | Windows Internet Naming Service |
| WIPS | Wireless Intrusion Prevention System |
| WLAN | Wireless Local Area Network |
| WPA | Wi-Fi Protected Access |
| WPA2 | Wi-Fi Protected Access v2 |
| WPAN | Wireless Personal Area Network |
| WPS | WiFi Protected Setup |
| WTLS | Wireless TLS |
| WWAN | Wireless Wide Area Network |
| XML | Extensible Markup Language |
| XSRF | Cross-Site Request Forgery |
| XSS | Cross-Site Scripting |
| Zerconf | Zero Configuration Networking |