The Acronyms

3DES – Triple Digital Encryption Standard
ACL – Access Control List
AES – Advanced Encryption Standard
AES256 – Advanced Encryption Standard
AH – Authentication Header
ALE – Annual or Annualized Loss Expectancy
ARO – Annualized Rate of Occurrence
ARP – Address Resolution Protocol
AUP – Acceptable Use Policy
BIOS – Basic Input/Output System
BOTS – Network Robots
CA – Certificate Authority
CAN – Controller Area Network
CCTV – Closed-Circuit Television
CHAP – Challenge Handshake Authentication Protocol
CRL – Certification Revocation List
DAC – Discretionary Access Control
DDoS – Distributed Denial of Service
DES – Digital Encryption Standard
DHCP – Dynamic Host Configuration Protocol
DLL – Dynamic Link Library
DMZ – demilitarized zone
DNS – Domain Name Service (Server)
DoS – denial of service
DTP – Dynamic Trunking Protocol
EAP – Extensible Authentication Protocol
ECC – Elliptic Curve Cryptography
FTP – File Transfer Protocol
GRE – Generic Routing Encapsulation
H-IDS – host-based intrusion detection system
H-IPS -host-based intrusion prevention system
HTTP – Hypertext Transfer Protocol
HTTPS – Hypertext Transfer Protocol (Hypertext Transfer Protocol over SSL)
HVAC – heating, ventilation, and air conditioning
ICMP – Internet Control Message Protocol
ID – Identification, or Intrusion Detection
IM – instant messaging
IMAP4 – Internet Message Access Protocol v4
IP – Internet Protocol
IPSec – Internet Protocol Security
IRC – Internet Relay Chat
ISP – Internet service provider
KDC – Key Distribution Center
L2TP – Layer 2 Tunneling Protocol
LANMAN – Local Area Network Manager
LDAP – Lightweight Directory Access Protocol
LSB – Least Significant Bit
MAC – Mandatory Access Control
MAC – Media Access Control
MAC – message authentication code
MAN – metropolitan area network
MD5 – Message Digest 5
MSCHAP – Microsoft Challenge Handshake Authentication Protocol
MTU – Maximum Transmission Unit
NAC – network access control
NAT – Network Address Translation
N-IDS – network-based intrusion detection system
N-IPS – network-based intrusion prevention system
NOS – network operating system
NTFS – New Technology File System
NTLM – New Technology LANMAN or New Technology LAN Manager
NTP – Network Time Protocol
OS – operating system
OVAL – Open Vulnerability and Assessment Language
OTP – One-time Pad
PAP – Password Authentication Protocol
PAC- Privileged Attribute Certificates
PAT – Port Address Translation
PBX – Private Branch Exchange
PGP – Pretty Good Privacy
PII – Personally Identifiable Information
PKI – Public Key Infrastructure
PNAC – Port Based NAC
PPP – Point-to-Point Protocol
PPTP – Point-to-Point Tunneling Protocol
PSK – Pre-Shared Key
RAD – Rapid Application Development
RADIUS – Remote Authentication Dial-In User Service
RAID – Redundant Array of Inexpensive Disks also Redundant Array of
Independent Disks
RAS – Remote Access Server
RBAC – Role-Based Access Control
RBAC – Rule-Based Access Control
RSA – Rivest, Shamir, and Adleman
SCM – Software Configuration Management
SDLC – Software Development Life Cycle
S/MIME – Secure Multipurpose Internet Mail Extensions
SCSI – Small Computer System Interface
SESAME – Secure European System for Application in a Multi-Vendor Environment
SHA – Secure Hashing Algorithm or Secure Hash Algorithm
SHTTP – Secure Hypertext Transfer Protocol
SLA – service-level agreement
SLE – single loss expectancy
SMTP – Simple Mail Transfer Protocol
SNMP – Simple Network Management Protocol
SPIM – Spam over Internet Messaging
SSH – Secure Shell
SSL – Secure Sockets Layer
SSO – single sign-on
STP – Shielded Twisted Pair
TACACS – Terminal Access Controller Access Control System
TCP/IP – Transmission Control Protocol/Internet Protocol
TKIP – Temporal Key Integrity Protocol
TKIP – Temporal Key Interchange Protocol
TLS – Transport Layer Security
TTP – Trusted Third Party
TPM – Trusted Platform Module
UPS – uninterruptable power supply
URL – Universal Resource Locator or Uniform Resource Locator
USB – Universal Serial Bus
UTP – Unshielded Twisted Pair
VLAN – virtual local area network
VoIP – Voice over IP
VPN – virtual private network
WEP – Wired Equivalent Privacy
WPA – Wi-Fi Protected Access

  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: