Certifications
Acronyms

Security+ Acronyms

0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

example

0-9

3DES - Triple Data Encryption Standard

A

AAA - Authentication, Authorization, Accounting.

ABAC - Attribute-based Access Control

ACE - Access Control Entry

ACK - Acknowledge

ACL - Access control list

AD -Active Directory

AES - Advanced Encryption Standard

AH -Authentication Header

AI - Artificial Intelligence CHAP

AIS - Automated Indicator Sharing

ALE - Annualized Loss Expectancy

AP - Access Point

API - Application Programming Interface

APT - Advanced Persistent Threat

ARO - Annual Rate of Occurrence

ARP - Address Resolution Protocol

ARP - Poisoning

ASCII - American Standard Code for Information Interchange

ASLR - Address Space Layout Randomization

ASP - Active Server Pages

ATT&CK - Adversarial Tactics, Techniques, and Common Knowledge

AUP - Acceptible Use Policy

AV - Antivirus

B

BASH - Bourne Again Shell

BCP - Business Continuity Planning

BGP - Border Gateway Protocol

BIA - Business Impact Analysis

BIND - Berkeley Internet Name Domain

BIOS - Basic Input/Output System

BPA - Business Partnership Agreement

BPDU Guard - Bridge Protocol Data Unit Guard

BSSID - Basic Service Set Identifier

BYOD - Bring Your Own Device

C

CA - Certificate Authority

CAPTCHA - Completely Automated Public Turing Test to Tell Computers and Humans Apart

CAR - Corrective Action Report

CASB - Cloud Access Security Broker

CBC - Cipher Block Chaining

CBT - Computer-based Training

CCMP - Counter-Mode/CBC-MAC Protocol

CCTV - Closed-Circuit Television

CERT - Computer Emergency Response Team

CFB - Cipher Feedback

CHAP - Challenge-Handshake Authentication Protocol

CI/CD - Continuous Integration/Continuous Delivery

CIO - Chief Information Officer

CIRT - Computer Incident Response Team

CIS - Center for Internet Security

CMDB - Configuration Management Database

CMS - Content Management System

CN - Common Name

COOP - Continuity of Operations Planning

COPE - Corporate-owned Personally Enabled

CP - Contingency Planning

CPU - Central Processing Unit

CRC - Cyclic Redundancy Check

CRL - Certificate Revocation List

CSA - Cloud Security Alliance

CSIRT - Computer Security Incident Response Team

CSO - Chief Security Officer

CSP - Cloud Service Provider

CSR - Certificate Signing Request

CSRF - Cross-Site Request Forgery

CSU - Channel Service Unit

CTM - Counter-Mode

CTO - Chief Technology Officer

CVE - Common Vulnerabilities and Exposures

CVSS - Common Vulnerability Scoring System

CYOD - Choose Your Own Device

D

DAC - Discretionary Access Control

DBA - Database Administrator

DDoS - Distributed Denial-of-Service

DEP - Data Execution Prevention

DER - Distinguished Encoding Rules

DES - Data Encryption Standard

DHCP - Dynamic Host Configuration Protocol

DHE - Diffie-Hellman Ephemeral

DKIM - Domain Keys Identified Mail

DLL - Dynamic-link Library

DLP - Data Loss Prevention

DMARC - Domain Message Authentication Reporting and Conformance

DNAT - Destination Network Address Translation

DNS - Domain Name System

DNSSEC - Domain Name System Security Extensions

DoS - Denial-of-Service

DPO - Data Protection Officer

DRP - Disaster Recovery Plan

DSA - Digital Signature Algorithm

DSL - Digital Subscriber Line

E

EAP - Extensible Authentication Protocol

ECB - Electronic Code Book

ECC - Elliptic-curve Cryptography

ECDHE - Elliptic-curve Diffie-Hellman Ephemeral ECDSA Elliptic-curve Digital Signature Algorithm EDR Endpoint Detection and Response

EFS - Encrypted File System

EIP - Extended Instruction Pointer

EOL - End of Life

EOS - End of Service

ERP - Enterprise Resource Planning

ESN - Electronic Serial Number

ESP - Encapsulating Security Payload

ESSID - Extended Service Set Identifier

F

FACL - File System Access Control List

FDE - Full Disk Encryption

FIM - File Integrity Monitoring

FPGA - Field Programmable Gate Array

FRR - False Rejection Rate

FTP - File Transfer Protocol

FTPS - Secured File Transfer Protocol

G

GCM - Galois/Counter Mode

GDPR - General Data Protection Regulation

GPG - GNU Privacy Guard

GPO - Group Policy Object

GPS - Global Positioning System

GPU - Graphics Processing Unit

GRE - Generic Routing Encapsulation

H

HA - High Availability

HDD - Hard Disk Drive

HIDS - Host-based Intrusion Detection System

HIPS - Host-based Intrusion Prevention System HMAC Hash-based Message Authentication Code HOTP HMAC-based One-time Password

HSM - Hardware Security Module

HSMaaS - Hardware Security Module as a Service HTML Hypertext Markup Language

HTTP - Hypertext Transfer Protocol

HTTPS - Hypertext Transfer Protocol Secure HVAC Heating, Ventilation, Air Conditioning

I

IaaS - Infrastructure as a Service

IAM - Identity and Access Management

ICMP - Internet Control Message Protocol

ICS - Industrial Control Systems

IDEA - International Data Encryption Algorithm IDF Intermediate Distribution Frame

IdP - Identity Provider

IDS - Intrusion Detection System

IEEE - Institute of Electrical and Electronics Engineers IKE Internet Key Exchange

IM - Instant Messaging

IMAP4 - Internet Message Access Protocol v4

IoC - Indicators of Compromise

IoT - Internet of Things

IP - Internet Protocol

IPS - Intrusion Prevention System

IPSec - Internet Protocol Security

IR - Incident Response

IRC - Internet Relay Chat

IRP - Incident Response Plan

ISA - Interconnection Security Agreement

ISFW - Internal Segmentation Firewall

ISO - International Organization for Standardization

ISP - Internet Service Provider

ISSO - Information Systems Security Officer

ITCP - IT Contingency Plan

IV - Initialization Vector

J

JSON - Javascript Object Notation

K

KDC - Key Distribution Center

KEK - Key Encryption Key

L

L2TP - Layer 2 Tunneling Protocol

LAN - Local Area Network

LDAP - Lightweight Directory Access Protocol

LEAP - Lightweight Extensible Authentication Protocol

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z