CertificationsSecurity+AcronymsSecurity+ Acronyms 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z example 0-9 3DES - Triple Data Encryption Standard A AAA - Authentication, Authorization, Accounting. ABAC - Attribute-based Access Control ACE - Access Control Entry ACK - Acknowledge ACL - Access control list AD -Active Directory AES - Advanced Encryption Standard AH -Authentication Header AI - Artificial Intelligence CHAP AIS - Automated Indicator Sharing ALE - Annualized Loss Expectancy AP - Access Point API - Application Programming Interface APT - Advanced Persistent Threat ARO - Annual Rate of Occurrence ARP - Address Resolution Protocol ARP - Poisoning ASCII - American Standard Code for Information Interchange ASLR - Address Space Layout Randomization ASP - Active Server Pages ATT&CK - Adversarial Tactics, Techniques, and Common Knowledge AUP - Acceptible Use Policy AV - Antivirus B BASH - Bourne Again Shell BCP - Business Continuity Planning BGP - Border Gateway Protocol BIA - Business Impact Analysis BIND - Berkeley Internet Name Domain BIOS - Basic Input/Output System BPA - Business Partnership Agreement BPDU Guard - Bridge Protocol Data Unit Guard BSSID - Basic Service Set Identifier BYOD - Bring Your Own Device C CA - Certificate Authority CAPTCHA - Completely Automated Public Turing Test to Tell Computers and Humans Apart CAR - Corrective Action Report CASB - Cloud Access Security Broker CBC - Cipher Block Chaining CBT - Computer-based Training CCMP - Counter-Mode/CBC-MAC Protocol CCTV - Closed-Circuit Television CERT - Computer Emergency Response Team CFB - Cipher Feedback CHAP - Challenge-Handshake Authentication Protocol CI/CD - Continuous Integration/Continuous Delivery CIO - Chief Information Officer CIRT - Computer Incident Response Team CIS - Center for Internet Security CMDB - Configuration Management Database CMS - Content Management System CN - Common Name COOP - Continuity of Operations Planning COPE - Corporate-owned Personally Enabled CP - Contingency Planning CPU - Central Processing Unit CRC - Cyclic Redundancy Check CRL - Certificate Revocation List CSA - Cloud Security Alliance CSIRT - Computer Security Incident Response Team CSO - Chief Security Officer CSP - Cloud Service Provider CSR - Certificate Signing Request CSRF - Cross-Site Request Forgery CSU - Channel Service Unit CTM - Counter-Mode CTO - Chief Technology Officer CVE - Common Vulnerabilities and Exposures CVSS - Common Vulnerability Scoring System CYOD - Choose Your Own Device D DAC - Discretionary Access Control DBA - Database Administrator DDoS - Distributed Denial-of-Service DEP - Data Execution Prevention DER - Distinguished Encoding Rules DES - Data Encryption Standard DHCP - Dynamic Host Configuration Protocol DHE - Diffie-Hellman Ephemeral DKIM - Domain Keys Identified Mail DLL - Dynamic-link Library DLP - Data Loss Prevention DMARC - Domain Message Authentication Reporting and Conformance DNAT - Destination Network Address Translation DNS - Domain Name System DNSSEC - Domain Name System Security Extensions DoS - Denial-of-Service DPO - Data Protection Officer DRP - Disaster Recovery Plan DSA - Digital Signature Algorithm DSL - Digital Subscriber Line E EAP - Extensible Authentication Protocol ECB - Electronic Code Book ECC - Elliptic-curve Cryptography ECDHE - Elliptic-curve Diffie-Hellman Ephemeral ECDSA Elliptic-curve Digital Signature Algorithm EDR Endpoint Detection and Response EFS - Encrypted File System EIP - Extended Instruction Pointer EOL - End of Life EOS - End of Service ERP - Enterprise Resource Planning ESN - Electronic Serial Number ESP - Encapsulating Security Payload ESSID - Extended Service Set Identifier F FACL - File System Access Control List FDE - Full Disk Encryption FIM - File Integrity Monitoring FPGA - Field Programmable Gate Array FRR - False Rejection Rate FTP - File Transfer Protocol FTPS - Secured File Transfer Protocol G GCM - Galois/Counter Mode GDPR - General Data Protection Regulation GPG - GNU Privacy Guard GPO - Group Policy Object GPS - Global Positioning System GPU - Graphics Processing Unit GRE - Generic Routing Encapsulation H HA - High Availability HDD - Hard Disk Drive HIDS - Host-based Intrusion Detection System HIPS - Host-based Intrusion Prevention System HMAC Hash-based Message Authentication Code HOTP HMAC-based One-time Password HSM - Hardware Security Module HSMaaS - Hardware Security Module as a Service HTML Hypertext Markup Language HTTP - Hypertext Transfer Protocol HTTPS - Hypertext Transfer Protocol Secure HVAC Heating, Ventilation, Air Conditioning I IaaS - Infrastructure as a Service IAM - Identity and Access Management ICMP - Internet Control Message Protocol ICS - Industrial Control Systems IDEA - International Data Encryption Algorithm IDF Intermediate Distribution Frame IdP - Identity Provider IDS - Intrusion Detection System IEEE - Institute of Electrical and Electronics Engineers IKE Internet Key Exchange IM - Instant Messaging IMAP4 - Internet Message Access Protocol v4 IoC - Indicators of Compromise IoT - Internet of Things IP - Internet Protocol IPS - Intrusion Prevention System IPSec - Internet Protocol Security IR - Incident Response IRC - Internet Relay Chat IRP - Incident Response Plan ISA - Interconnection Security Agreement ISFW - Internal Segmentation Firewall ISO - International Organization for Standardization ISP - Internet Service Provider ISSO - Information Systems Security Officer ITCP - IT Contingency Plan IV - Initialization Vector J JSON - Javascript Object Notation K KDC - Key Distribution Center KEK - Key Encryption Key L L2TP - Layer 2 Tunneling Protocol LAN - Local Area Network LDAP - Lightweight Directory Access Protocol LEAP - Lightweight Extensible Authentication Protocol M N O P Q R S T U V W X Y ZSecurity+Glossary