click below
click below
Normal Size Small Size show me how
Net+ & Sec+ Acronyms
Network+ & Security+ Acronyms
Term | Definition |
---|---|
3DES | Triple DES |
AAA | Authentication, Authorization, and Accounting |
AC | Alternating Current |
ACL | Access Control List |
ACS | Access Control Server |
ADSL | Asymmetric Digital Subscriber Line |
AES | Advanced Encryption Standard |
AH | Authentication Header |
AHP | Authentication Header Protocol |
ALE | Annualized Loss Expectancy |
ALG | Application Level Gateway |
ANS | Authoritative Name Server |
ANSI | American National Standards Institute |
AP | Access Point |
APC | Angled Physical Contact |
API | Application Programming Interface |
APIPA | Automatic Private IP Addressing |
APT | Advanced Persistent Threat |
ARO | Annualized Rate of Occurrence |
ARP | Address Resolution Protocol |
AS | Authentication Server |
AS | Autonomous System |
ASLR | Address Space Layout Randomization |
ASP | Application Service Provider |
ATM | Asynchronous Transfer Mode |
AUI Connector | Attachment Unit Interface Connector |
B Channel | Bearer Channel |
BCP | Business Continuity Planning |
BDR | Backup Designated Router |
BERT | Bit Error Rate Test |
BGP | Border Gateway Protocol |
BIOS | Basic Input/Output System |
BOOTP | Bootstrap Protocol |
BPA | Business Partners Agreement |
BPDU | Bridge Protocol Data Unit |
BPL | Broadband over Powerlines |
BPS | Bits Per Second |
BRI | Basic Rate Interface |
BSS | Basic Service Set |
BSSID | Basic Service Set Identifier |
BYOD | Bring Your Own Device |
CA | Certificate Authority |
CAB Files | Cabinet Files |
CAC | Common Access Card |
CAM Table | Content Addressable Memory Table |
CAN | Campus Area Network |
CAN | Controller Area Network |
CAPTCHA | Completely Automated Public Turing test to tell Computers and Humans Apart |
CAR | Corrective Action Report |
CARP | Common Address Redundancy Protocol |
CCITT | Comité Consutatif Internationale Téléphonique et Télégraphique |
CCMP | Counter Mode with Cipher Block Chaining Message Authentication Code Protocol |
CCTV | Closed-Circuit Television |
CDS/DSU | Channel Service Unit/Data Service Unit |
CERT | Computer Emergency Response Team |
CFB | Cipher Feedback |
CGI | Common Gateway Interface |
CHAP | Challenge Handshake Authentication Protocol |
CIA/AIC | Confidentiality, Integrity, Availability |
CIDR | Classless Inter Domain Routing |
CIFS | Common Internet File System |
CIO | Chief Information Officer |
CIRT | Computer Incident Response Team |
CMS | Content Management System |
CNAME | Canonical Name Record |
COOP | Continuity Of Operation Planning |
COPPA | Children'S Online Privacy Protection Act |
CoS | Class of Service |
CPE | Customer-Premises Equipment |
CRC | Cyclic Redundancy Check |
CRL | Certificate Revocation List |
CRM | Customer Relationship Management |
CSMA/CA | Carrier Sense Multiple Access with Collision Avoidance |
CSMA/CD | Carrier Sense Multiple Access with Collision Detection |
CSO | Chief Security Officer |
CSP | Cloud Service Provider |
CSR | Certificate Signing Request |
CSU | Channel Service Unit |
CTO | Chief Technology Officer |
CWDM | Coarse Wavelength Division Multiplexing |
D Channel | Delta Channel |
DAC | Discretionary Access Control |
DAI | Dynamic ARP Inspection |
Db | Decibel |
DBA | Database Administrator |
DC | Direct Current |
DCE | Data Communications Equipment |
DCF | Distributed Coordination Function |
DCS | Distributed Control System |
DDNS | Dynamic DNS |
DDoS | Distributed Denial of Service |
DDoS Attack | Distributed Denial of Service Attack |
DEP | Data Execution Prevention |
DES | Data Encryption Standard |
DET | Directory Entry Table |
DFS | Distributed File System |
DHCP | Dynamic Host Configuration Protocol |
DiffServ | Differentiated Services |
DIG | Domain Information Groper |
DLL | Dynamic Link Library |
DLP | Data Loss Prevention |
DMZ | Demilitarized Zone |
DNAT | Destination Network Address Translation |
DNS | Domain Name System |
DNSBLs | DNS Blacklists |
DOCSIS | Data Over Cable Service Interface Specification |
DoS | Denial of Service |
DoS Attack | Denial of Service Attack |
DR | Designated Router |
DS | Distribution System |
DS1 | Digital Signal 1 |
DSA | Digital Signature Algorithm |
DSH | Digital Signal Hierarchy |
DSL | Digital Subscriber Line |
DSLAM | DSL Access Multiplexer |
DSP | Digital Signal Processor |
DSSS | Direct Sequence Spread Spectrum |
DSU | Data Service Unit |
DTE | Data Termination Equipment |
DVM | Digital Volt Meter |
DWDM | Dense Wavelength Division Multiplexing |
EAP | Extensible Authentication Protocol |
EAPoIP | Extensible Authentication Protocol over IP |
EAPOL | Extensible Authentication Protocol over LAN |
EAP-TLS | Extensible Authentication Protocol with Transport Layer Security |
EAP-TTLS | Extensible Authentication Protocol with Tunneled Transport Layer Security |
ECC | Elliptic Key Cryptography |
ECDHE | Elliptic Curve Diffie-Hellman Exchange |
ECDSA | Elliptic Curve Digital Signature Algorithm |
EDAC | Error Detection and Correction |
EDB | External Data Bus |
EDC | Error Detection Code |
EEPROM | Electrically Erasable Programmable Read–Only Memory |
EFS | Encrypting File System |
EGP | Exterior Gateway Protocol |
EIA | Electronic Industries Alliance |
EIGRP | Enhanced Interior Gateway Routing Protocol |
Electronic Mail | |
EMI | Electromagnetic Interference |
EoP | Ethernet Over Power |
ERP | Enterprise Resource Planning |
ES | Edge System |
ESD | Electrostatic Discharge |
ESN | Electronic Serial Number |
ESP | Encapsulating Security Payload |
ESP Protocol | Encapsulating Security Payload Protocol |
ESS | Extended Service Set |
ESSID | Extended Service Set Identifier |
EUI-48 | Extended Unique Identifier, 48-bit |
EUI-64 | Extended Unique Identifier, 64-bit |
FACL | File system Access Control List |
FAT | File Allocation Table |
FC | Face Contact |
FC | Fibre Channel |
FCC | Federal Communications Commission |
FCrDNS | Forward Confirmed reverse DNS |
FCS | Frame Check Sequence |
FDDI | Fiber Distributed Data Interface |
FDE | Full Disk Encryption |
FDM | Frequency Division Multiplexing |
FEXT | Far-End Crosstalk |
FHSS | Frequency Hopping Spread Spectrum |
FQDN | Fully Qualified Domain Name |
FRR | False Rejection Rate |
FTP | File Transfer Protocol |
GBIC | Gigabit Interface Converter |
GCM | Galois Counter Mode |
GFS | Grandfather, Father, Son |
GIF | Graphics Interchange Format |
GLBA | Gramm–Leach–Bliley Act |
GPG | GNU Privacy Guard |
GPO | Group Policy Object |
GPS | Global Positioning System |
GPU | Graphic Processing Unit |
GRE | Generic Routing Encapsulation |
HCC | Horizontal cross-connect |
HDD | Hard Disk Drive |
HEC | HDMI Ethernet Channel |
Hex | Hexadecimal |
HIDS | Host Intrusion Detection Systems |
HIPAA | Health Insurance Portability And Accountability Act |
HIPS | Host-based IPS |
HMAC | Hashed Message Authentication Code |
HMI | Human Machine Interface |
HOTP | HMAC-based One Time Password |
HSM | Hardware Security Module |
HSPA+ | Evolved High-Speed Packet Access |
HSRP | Hot Standby Router Protocol |
HTML | Hypertext Markup Language |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol over SSL |
HVAC | Heating, Ventilating, and Air Conditioning |
IA | Information Assurance |
IaaS | Infrastructure as a Service |
IANA | Internet Assigned Number Authority |
IAS | Internet Authentication Service |
IBSS | Independent Basic Service Set |
ICA | Independent Computing Architecture |
ICANN | Internet Corporation for Assigned Names and Numbers |
ICC | Intermediate Cross-connect |
ICMP | Internet Control Message Protocol |
ICS | Industrial Control Server |
ICS | Internet Connection Sharing |
IDEA | International Data Encryption Algorithm |
IDF | Intermediate Distribution Frame |
IdP | Identity Provider |
IDS | Intrusion Detection System |
IEEE | Institute of Electrical and Electronics Engineers |
IETF | Internet Engineering Task Force |
IFG | Interframe Gap |
IFS | Interframe Space |
IGMP | Internet Group Management Protocol |
IGP | Interior Gateway Protocol |
IGRP | Interior Gateway Routing Protocol |
IIS | Internet Information Services |
IKE | Internet Key Exchange |
ILM | Information Lifecycle Management |
IMAP4 | Internet Message Access Protocol |
IoT | Internet of Things |
IP | Internet Protocol |
IPS | Intrusion Prevention System |
IPSec | Internet Protocol Security |
IPv4 | Internet Protocol Version 4 |
IPv6 | Internet Protocol Version 6 |
IRC | Internet Relay Chat |
IRP | Incident Response Policy |
ISA | Interconnection Security Agreement |
ISATAP | Intra-Site Automatic Tunnel Addressing Protocol |
iSCSI | Internet Small Computer System Interface |
ISDN | Integrated Services Digital Network |
IS-IS | Intermediate System to Intermediate System |
ISOC | International Organization for Standardization |
iSOC | Internet Society |
ISP | Internet Service Provider |
ISSO | Information Systems Security Officer |
IT | Information Technology |
ITCP | IT Contingency Plan |
ITU | International Telecommunication Union |
IV | Initialization Vector |
JBOD | Just a Bunch of Disks |
JPEG | Joint Photographic Experts Group |
Kbps | Kilobits Per Second |
KDC | Key Distribution Center |
KEK | Key Encryption Key |
KHMAC | Key Hashing for Message Authentication Code |
KHz | Kilohertz |
L2TP | Layer 2 Tunneling Protocol |
LACP | Link Aggregation Control Protocol |
LAN | Local Area Network |
LC | Local Connector |
LDAP | Lightweight Directory Access Protocol |
LEAP | Lightweight Extensible Authentication Protocol |
LED | Light Emitting Diode |
LFM | Log File Monitor |
LLC | Logical Link Control |
LTE | Long Term Evolution |
MaaS | Monitoring as a Service |
MAC | Mandatory Access Control |
MAC | Media Access Control |
MAC | Message Authentication Code |
MAC Address | Media Access Control Address |
MAN | Metropolitan Area Network |
MB | Megabyte |
MBSA | Microsoft Baseline Security Analyzer |
MCC | Main cross-connect |
MD5 | Message-Digest Algorithm Version 5 |
MDF | Main Distribution Frame |
MGCP | Media Gateway Control Protocol |
MHz | Megahertz |
MIB | Management Information Base |
MIME | Multipurpose Internet Mail Extensions |
MIMO | Multiple In/Multiple Out |
MMC | Microsoft Management Console |
MME | MME (Mesh Made Easy) |
MMF | Multimode Fiber |
Modem | Modulator-Demodulator |
MOU | Memorandum of Understanding |
MPLS | Multiprotocol Label Switching |
MPPE | Microsoft Point-to-Point Encryption |
MSA | Multisource Agreement |
MSCHAP | Microsoft Challenge Handshake Authentication Protocol |
MSDS | Material Safety Data Sheet |
MTBF | Mean Time Between Failures |
mtr | My Traceroute |
MT-RJ | Mechanical Transfer Registered Jack |
MTSO | Mobile Telecommunications Switching Office |
MTTF | Mean Time To Failure |
MTTR | Mean Time To Recover |
MTU | Maximum Transmission Unit |
MUX | Multiplexer |
MX | Mail Exchange |
MX Record | Mail Exchange Record |
NaaS | Network as a Service |
NAC | Network Access Control |
NAC | Network Address Control |
NAS | Network Access Server |
NAS | Network Attached Storage |
NAT | Network Address Translation |
NDA | Non-Disclosure Agreement |
NetBEUI | NetBIOS Extended User Interface |
NetBIOS | Network Basic Input/Output System |
NetBT | NetBIOS over TCP/IP |
NEXT | Near-End Crosstalk |
NFC | Near Field Communication |
NFS | Network File System |
NIC | Network Interface Card |
NIDS | Network Intrusion Detection System |
NIPS | Network-based IPS |
NIST | National Institute of Standards and Technology |
NIU | Network Interface Unit |
NMS | Network Management Software |
NMS | Network Management Station |
NNI | Network-to-Network Interface |
NNTP | Network News Transfer Protocol |
NOS | Network Operating System |
NRZ | Non-Return to Zero |
NRZI | Non-Return to Zero Inverted |
NS | Name Server |
ns | Nanosecond |
NT | Network Termination |
NTFS | New Technology File System |
NTLM | New Technology LAN Manager |
NTP | Network Time Protocol |
NTU | Network Termination Unit |
NX | No Execute |
OAUTH | Open Authorization |
OCSP | Online Certificate Status Protocol |
OCx | Optical Carrier x |
OEM | Original Equipment Manufacturer |
OLA | Open License Agreement |
OS | Operating System |
OSI | Open Systems Interconnection |
OSI Model | Open Systems Interconnection Reference Model |
OSPF | Open Shortest Path First |
OTDR | Optical Time-Domain Reflectometer |
OTP | One Time Pad |
OUI | Organizationally Unique Identifier |
OVAL | Open Vulnerability Assessment Language |
P2P | Peer to Peer |
PaaS | Platform as a Service |
PAC | Proxy Auto Configuration |
PAM | Pluggable Authentication Modules |
PAN | Personal Area Network |
PAP | Password Authentication Protocol |
PAT | Port Address Translation |
PBKDF2 | Password-Based Key Derivation Function 2 |
PBX | Private Branch Exchange |
PCAP | Packet Capture |
PDH | Plesiochronous Digital Hierarchy |
PDoS Attack | Permanent DoS Attack |
PEAP | Protected Extensible Authentication Protocol |
PED | Personal Electronic Device |
PFS | Perfect Forward Secrecy |
PGP | Pretty Good Privacy |
PII | Personally Identifiable Information |
PIV | Personal Identity Verification |
PKI | Public Key Infrastructure |
POD | Ping Of Death |
PoE | Power over Ethernet |
PON | Passive Optical Network |
POP | Point of Presence |
POP3 | Post Office Protocol version 3 |
POTS | Plain Old Telephone Service |
PPP | Point-to-Point Protocol |
PPTP | Point-to-Point Tunneling Protocol |
PROM | Programmable Read–Only Memory |
PSK | Pre-Shared Key |
PSTN | Public Switched Telephone Network |
PTR | Pointer |
PTZ | Pan-Tilt-Zoom |
PVC | Permanent Virtual Circuit |
PVC | Polyvinyl Chloride |
QoS | Quality of Service |
RA | Recovery Agent |
RA | Registration Authority |
RAD | Rapid Application Development |
RADIUS | Remote Authentication Dial-In User Service |
RAID | Redundant Array of Inexpensive Disks |
RAID 1 | Redundant Array of Independent Disks 1 |
RAID 5 | Redundant Array of Independent Disks 5 |
RARP | Reverse Address Resolution Protocol |
RAS | Remote Access Services |
RBAC | Role–Based Access Control |
RC4 | RSA Variable Key Size Encryption Algorithm |
RDP | Remote Desktop Protocol |
RF | Radio Frequency |
RFB | Remote Framebuffer |
RFI | Radio Frequency Interference |
RIP | Routing Information Protocol |
RIPEMD RACE | Integrity Primitives Evaluation Message Digest |
ROI | Return On Investment |
RPO | Recovery Point Objectives |
RSA | Rivest, Shamir and Adleman |
RTBH Filtering | Remote Triggered Black Hole Filtering |
RTO | Recovery Time Objectives |
RTP | Real-time Transport Protocol |
S/MIME | Secure/Multipurpose Internet Mail Extensions |
SA | Security Association |
SaaS | Software as a Service |
SAML | Security Assertions Markup Language |
SAN | Storage Area Network |
Sarbox | Sarbanes–Oxley Act |
SC | Subscriber Connector or Standard Connector |
SCADA | System Control and Data Acquisition |
SCAP | Security Content Automation Protocol |
SCEP | Simple Certificate Enrollment Protocol |
SCP | Secure Copy Protocol |
SCSI | Small Computer System Interface |
SDH | Synchronous Digital Hierarchy |
SDLC | Systems Development Life Cycle |
SDLM | Software Development Life Cycle Methodology |
SEH | Structured Exception Handler |
SFP | Small Form Factor Pluggable |
SFTP | Secured File Transfer Protocol |
SHA | Secure Hash Algorithm |
SHTTP | Secure Hypertext Transfer Protocol |
SIEM | Security Information and Event Management |
SIM | Subscriber Identity Module |
SIV | System Integrity Verifier |
SLA | Service Level Agreement |
SLE | Single Loss Expectancy |
SMA | Sub Multi Assembly or Sub Miniature type A |
SMB | Server Message Block |
SMB Protocol | Server Message Block Protocol |
SMS | Short Message Service |
SMTP | Simple Mail Transfer Protocol |
SNIPS | System and Network Integrated Polling Software |
SNMP | Simple Network Management Protocol |
SOA | Start of Authority |
SOAP | Simple Object Access Protocol |
SoD | Separation of Duties |
SOHO | Small office/home office |
SONET | Synchronous Optical Network |
SPA | Security Posture Assessments |
SPI | Security Parameters Index |
SPI | Stateful Packet Inspection |
SPIM | Spam over Internet Messaging |
SQL | Structured Query Language |
SRV | Service Locator |
SSD | Solid State Drive |
SSH | Secure Shell |
SSID | Service Set Identifier |
SSL | Secure Sockets Layer |
SSL VPN | Secure Socket Layer VPN |
SSO | Single Sign-On |
SSTP | Secure Socket Tunneling Protocol |
ST | Straight Tip |
STA | Station |
Static NAT | Static Network Address Translation |
STP | Shielded Twisted Pair |
STP | Spanning-Tree Protocol |
SVC | Switched Virtual Circuit |
TA | Terminal Adapters |
TACACS | Terminal Access Controller Access Control System |
TACACS+ | Terminal Access Controller Access Control System Plus |
TCP | Transmission Control Protocol |
TCP/IP | Transmission Control Protocol/Internet Protocol |
TCSEC | Trusted Computer System Evaluation Criteria |
TDM | Time-Division Multiplexing |
TDR | Time-Domain Reflectometer |
TE | Terminal Equipment |
TFTP | Trivial File Transfer Protocol |
TGT | Ticket Granting Ticket |
TIA | Telecommunications Industry Association |
TIFF | Tagged Image File Format |
TKIP | Temporal Key Integrity Protocol |
TLS | Transport Layer Security |
TOTP | Time-based One-Time Password |
TPM | Trusted Platform Module |
TSIG | Transaction Signature |
TTL | Time To Live |
TTS | Transaction Tracking System |
UAC | User Account Control |
UAT | User Acceptance Testing |
UDP | User Datagram Protocol |
UEFI | Unified Extensible Firmware Interface |
UNI | User-to-Network Interface |
UPS | Uninterruptible Power Supply |
UR | L Universal Resource Locator |
URI | Uniform Resource Identifier |
USB | Universal Serial Bus |
UTM | Unified Threat Management |
UTP | Unshielded Twisted Pair |
VCC | Vertical Cross-Connect |
VDI | Virtualization Desktop Infrastructure |
VER | Voltage Event Recorder |
VLAN | Virtual LAN |
VLAN Hopping | Virtual Local Area Network Hopping |
VLSM | Variable Length Subnet Mask |
VM | Virtual Machine |
VNC | Virtual Network Computing |
VoIP | Voice over IP |
VPN | Virtual Private Network |
VSAT | Very Small Aperture Terminal |
VTC | Video Teleconferencing |
VTP | VLAN Trunking Protocol |
WAF | Web-Application Firewall |
WAN | Wide Area Network |
WAP | Wireless Access Point |
Web Proxy | HTTP Proxy |
WEP | Wired Equivalent Privacy |
WIDS | Wireless Intrusion Detection System |
WiMAX | Worldwide Interoperability for Microwave Access |
WINS | Windows Internet Naming Service |
WIPS | Wireless Intrusion Prevention System |
WLAN | Wireless Local Area Network |
WPA | Wi-Fi Protected Access |
WPA2 | Wi-Fi Protected Access v2 |
WPAN | Wireless Personal Area Network |
WPS | WiFi Protected Setup |
WTLS | Wireless TLS |
WWAN | Wireless Wide Area Network |
XML | Extensible Markup Language |
XSRF | Cross-Site Request Forgery |
XSS | Cross-Site Scripting |
Zerconf | Zero Configuration Networking |