Security Acronyms Cheat Sheet PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

SECURITY+ ACRONYMS DHCP Dynamic Host Configuration Protocol IP Internet Protocol

3DES Triple Digital Encryption Standard DLL Dynamic Link Library IPSEC Internet Protocol Security
AAA Authentication, Authorization, and DLP Data Loss Prevention IRC Internet Relay Chat
Accounting DMZ Demilitarized Zone ISP Internet Service Provider
ACL Access Control List DNS Domain Name Service (Server) IV Initialization Vector
AES Advanced Encryption Standard DOS Denial of Service KDC Key Distribution Center
AES256 Advanced Encryption Standards DRP Disaster Recovery Plan L2TP Layer 2 Tunneling Protocol
256bit DSA Digital Signature Algorithm LANMAN Local Area Network Manager
AH Authentication Header EAP Extensible Authentication Protocol LDAP Lightweight Directory Access Protocol
ALE Annualized Loss Expectancy ECC Elliptic Curve Cryptography LEAP Lightweight Extensible Authentication
AP Access Point EFS Encrypted File System Protocol
ARO Annualized Rate of Occurrence EMI Electromagnetic Interference MAC Mandatory Access Control / Media
ARP Address Resolution Protocol Access Control
ESP Encapsulated Security Payload
AUP Acceptable Use Policy MAC Message Authentication Code
FTP File Transfer Protocol
BCP Business Continuity Planning MAN Metropolitan Area Network
GPU Graphic Processing Unit
BIOS Basic Input / Output System MBR Master Boot Record
GRE Generic Routing Encapsulation
BOTS Network Robots MD5 Message Digest 5
HDD Hard Disk Drive
CA Certificate Authority MSCHAP Microsoft Challenge Handshake
HIDS Host Based Intrusion Detection
Authentication
CAC Common Access Card System
Protocol
CAN Controller Area Network HIPS Host Based Intrusion Prevention
MTU Maximum Transmission Unit
CCMP Counter-Mode/CBC-Mac Protocol System
NAC Network Access Control
CCTV Closed-circuit television HMAC Hashed Message Authentication Code
NAT Network Address Translation
CERT Computer Emergency Response Team HSM Hardware Security Module
NIDS Network Based Intrusion Detection
CHAP Challenge Handshake Authentication HTTP Hypertext Transfer Protocol
System
Protocol HTTPS Hypertext Transfer Protocol (SSL)
NIPS Network Based Intrusion Prevention
CIRT Computer Incident Response Team HVAC Heating, Ventilation Air Conditioning System
CRC Cyclical Redundancy Check IaaS Infrastructure as a Service NIST National Institute of Standards &
CRL Certification Revocation List ICMP Internet Control Message Protocol Technology
DAC Discretionary Access Control ID Identification NOS Network Operating System
DDOS Distributed Denial of Service IKE Internet Key Exchange NTFS New Technology File System
DEP Data Execution Prevention IM Instant messaging NTLM New Technology LANMAN
DES Digital Encryption Standard IMAP4 Internet Message Access Protocol v4 NTP Network Time Protocol
OS Operating System SCSI Small Computer System Interface VLAN Virtual Local Area Network
OVAL Open Vulnerability Assessment SDLC Software Development Life Cycle VoIP Voice over IP
Language SDLM Software Development Life Cycle VPN Virtual Private Network
PAP Password Authentication Protocol Methodology VTC Video Teleconferencing
PAT Port Address Translation SHA Secure Hashing Algorithm WAF Web-Application Firewall
PBX Private Branch Exchange SHHTP Secure Hypertext Transfer Protocol WAP Wireless Access Point
PEAP Protected Extensible Authentication SIM Subscriber Identity Module WEP Wired Equivalent Privacy
Protocol SLA Service Level Agreement WIDS Wireless Intrusion Detection System
PED Personal Electronic Device SLE Single Loss Expectancy WIPS Wireless Intrusion Prevention System
PGP Pretty Good Privacy SMS Short Message Service WPA Wireless Protected Access
PII Personally Identifiable Information SMTP Simple Mail Transfer Protocol XSRF Cross-Site Request Forgery
PKI Public Key Infrastructure SNMP Simple Network Management XSRF Cross-Site Request Forgery
POTS Plain Old Telephone Service Protocol
XSS Cross-Site Scripting
PPP Point-to-point Protocol SONET Synchronous Optical Network
PPTP Point to Point Tunneling Protocol Technologies
PSK Pre-Shared Key SPIM Spam over Internet Messaging
PTZ Pan-Tilt-Zoom SSH Secure Shell
RA Recovery Agent SSL Secure Sockets Layel
RAD Rapid application development SSO Single Sign On
RADIUS Remote Authentication Dial-in User STP Shielded Twisted Pair
Server TACACS Terminal Access Controller Access
RAID Redundant Array of Inexpensive Disks Control System
RAS Remote Access Server TCP/IP Transmission Control Protocol /
Internet Protocol
RBAC Role Based Access Control
TKIP Temporal Key Integrity Protocol
RBAC Rule Based Access Control
TLS Transport Layer Security
RSA Rivest, Shamir, & Adleman
TPM Trusted Platform Module
RTO Recovery Time Objective
UAT User Acceptance Testing
RTP Real-Time Transport Protocol
UPS Uninterruptable Power Supply
S/MIME Secure / Multipurpose internet Mail
Extensions URL Universal Resource Locator
SaaS Software as a Service USB Universal Serial Bus
SCAP Security Content Automation Protocol UTP Unshielded Twisted Pair

This cheat sheet was compiled by Steven M. Swafford, and is distributed according to the Creative Commons v3 “Attribution” License. File version 1.0. More cheat sheets?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy