front 1 3DES | back 1 Triple Digital Encryption Standard |
front 2 AAA | back 2 Authentication, Authorization, and Accounting |
front 3 ACL | back 3 Access Control List |
front 4 AES | back 4 Advanced Encryption Standard |
front 5 AES256 | back 5 Advanced Encryption Standards 256bit |
front 6 AH | back 6 Authentication Header |
front 7 ALE | back 7 Annualized Loss Expectancy |
front 8 AP | back 8 Access Point |
front 9 API | back 9 Application Programming Interface |
front 10 ASP | back 10 Application Service Provider |
front 11 ARO | back 11 Annualized Rate of Occurrence |
front 12 ARP | back 12 Address Resolution Protocol |
front 13 AUP | back 13 Acceptable Use Policy |
front 14 BAC | back 14 Business Availability Center |
front 15 BCP | back 15 Business Continuity Planning |
front 16 BIA | back 16 Business Impact Analysis |
front 17 BIOS | back 17 Basic Input / Output System |
front 18 BPA | back 18 Business Partners Agreement |
front 19 BYOD | back 19 Bring Your Own Device |
front 20 CA | back 20 Certificate Authority |
front 21 CAC | back 21 Common Access Card |
front 22 CAN | back 22 Controller Area Network |
front 23 CAPTCHA | back 23 Completely Automated Public Turning Test to Tell |
front 24 Computers | back 24 and Humans Apart |
front 25 CAR | back 25 Corrective Action Report |
front 26 CCMP | back 26 CounterMode/CBCMac Protocol |
front 27 CCTV | back 27 Closedcircuit television |
front 28 CERT | back 28 Computer Emergency Response Team |
front 29 CHAP | back 29 Challenge Handshake Authentication Protocol |
front 30 CIO | back 30 Chief Information Officer |
front 31 CIRT | back 31 Computer Incident Response Team |
front 32 COOP | back 32 Continuity of Operation Planning |
front 33 CP | back 33 Contingency Planning |
front 34 CRC | back 34 Cyclical Redundancy Check |
front 35 CRL | back 35 Certification Revocation List |
front 36 CSR | back 36 Control Status Register |
front 37 CSU | back 37 Channel Service Unit |
front 38 CTO | back 38 Chief Technology Officer |
front 39 DAC | back 39 Discretionary Access Control |
front 40 DBADatabase | back 40 Administrator |
front 41 DDOS | back 41 Distributed Denial of Service |
front 42 DEP | back 42 Data Execution Prevention |
front 43 DES | back 43 Digital Encryption Standard |
front 44 DHCP | back 44 Dynamic Host Configuration Protocol |
front 45 DHE | back 45 DataHandling Electronics |
front 46 DHE | back 46 DiffieHellman Ephemeral |
front 47 DLL | back 47 Dynamic Link Library |
front 48 DLP | back 48 Data Loss Prevention |
front 49 DMZ | back 49 Demilitarized Zone |
front 50 DNAT | back 50 Destination Network Address Transaction |
front 51 DNS | back 51 Domain Name Service (Server) |
front 52 DOS | back 52 Denial of Service |
front 53 DRP | back 53 Disaster Recovery Plan |
front 54 DSA | back 54 Digital Signature Algorithm |
front 55 DSL | back 55 Digital Subscriber line |
front 56 DSU | back 56 Data Service Unit |
front 57 EAP | back 57 Extensible Authentication Protocol |
front 58 ECC | back 58 Elliptic Curve Cryptography |
front 59 ECDHE | back 59 Elliptic Curve DiffieHellman Ephemeral |
front 60 EFS | back 60 Encrypted File System |
front 61 EMI | back 61 Electromagnetic Interference |
front 62 ESN | back 62 Electronic Serial Number |
front 63 ESP | back 63 Encapsulated Security Payload |
front 64 FACL | back 64 File System Access Control List |
front 65 FDEFull | back 65 Disk Encryption |
front 66 FTP | back 66 File Transfer Protocol |
front 67 FTPS | back 67 Secured File Transfer Protocol |
front 68 GPG | back 68 Global Property Guide |
front 69 GPO | back 69 Group Policy Object |
front 70 GPS | back 70 Global Positioning System |
front 71 GPU | back 71 Graphic Processing Unit |
front 72 GRE | back 72 Generic Routing Encapsulation |
front 73 HDD | back 73 Hard Disk Drive |
front 74 HIDS | back 74 Host Based Intrusion Detection System |
front 75 HIPS | back 75 Host Based Intrusion Prevention System |
front 76 HMAC | back 76 Hashed Message Authentication Code |
front 77 HOTP | back 77 HMAC based One Time Password |
front 78 HSM | back 78 Hardware Security Module |
front 79 HTTP | back 79 Hypertext Transfer Protocol |
front 80 HTTPS | back 80 Hypertext Transfer Protocol over SSL |
front 81 HVAC | back 81 Heating, Ventilation Air Conditioning |
front 82 IaaS | back 82 Infrastructure as a Service |
front 83 ICMP | back 83 Internet Control Message Protocol |
front 84 ID | back 84 Identification |
front 85 IDS | back 85 Intrusion Detection System |
front 86 IKE | back 86 Internet Key Exchange |
front 87 IM | back 87 Instant messaging |
front 88 IMAP4 | back 88 Internet Message Access Protocol v4 |
front 89 IP | back 89 Internet Protocol |
front 90 IPSEC | back 90 Internet Protocol Security |
front 91 IRIncident | back 91 Response |
front 92 IRC | back 92 Internet Relay Chat |
front 93 IRP | back 93 Incident Response Procedure |
front 94 ISA | back 94 Interconnection Security Agreement |
front 95 ISP | back 95 Internet Service Provider |
front 96 ISSO | back 96 Information Systems Security Officer |
front 97 ITCP | back 97 IT Contingency Plan |
front 98 IV | back 98 Initialization Vector |
front 99 JBODJust | back 99 a Bunch of Disks |
front 100 KDC | back 100 Key Distribution Center |
front 101 L2TP | back 101 Layer 2 Tunneling Protocol |
front 102 LAN | back 102 Local Area Network |
front 103 LDAP | back 103 Lightweight Directory Access Protocol |
front 104 LEAP | back 104 Lightweight Extensible Authentication Protocol |
front 105 MaaS | back 105 Monitoring as a Service |
front 106 MAC | back 106 Mandatory Access Control / Media Access Control |
front 107 MAC | back 107 Message Authentication Code |
front 108 MAN | back 108 Metropolitan Area Network |
front 109 MBR | back 109 Master Boot Record |
front 110 MD5 | back 110 Message Digest 5 |
front 111 MOU | back 111 Memorandum of Understanding |
front 112 MPLS | back 112 MultiProtocol Layer Switch |
front 113 MSCHAP | back 113 Microsoft Challenge Handshake Authentication Protocol |
front 114 MTBF | back 114 Mean Time Between Failures |
front 115 MTTR | back 115 Mean Time to Recover |
front 116 MTTF | back 116 Mean Time to Failure |
front 117 MTU | back 117 Maximum Transmission Unit |
front 118 NAC | back 118 Network Access Control |
front 119 NAT | back 119 Network Address Translation |
front 120 NDA | back 120 NonDisclosure Agreement |
front 121 NFCNear | back 121 Field Communication |
front 122 NIDS | back 122 Network Based Intrusion Detection System |
front 123 NIPS | back 123 Network Based Intrusion Prevention System |
front 124 NIST | back 124 National Institute of Standards & Technology |
front 125 NOS | back 125 Network Operating System |
front 126 NTFS | back 126 New Technology File System |
front 127 NTLM | back 127 New Technology LANMAN |
front 128 NTP | back 128 Network Time Protocol |
front 129 OCSP | back 129 Online Certificate Status Protocol |
front 130 OLA | back 130 Open License Agreement |
front 131 OS | back 131 Operating System |
front 132 OVAL | back 132 Open Vulnerability Assessment Language |
front 133 P2P | back 133 Peer to Peer |
front 134 PACProxy | back 134 Auto Configuration |
front 135 PAM | back 135 Pluggable Authentication Modules |
front 136 PAP | back 136 Password Authentication Protocol |
front 137 PAT | back 137 Port Address Translation |
front 138 PBKDF2 | back 138 Password Based Key Derivation Function 2 |
front 139 PBX | back 139 Private Branch Exchange |
front 140 PCAP | back 140 Packet Capture |
front 141 PEAP | back 141 Protected Extensible Authentication Protocol |
front 142 PED | back 142 Personal Electronic Device |
front 143 PGP | back 143 Pretty Good Privacy |
front 144 PII | back 144 Personally Identifiable Information |
front 145 PIV | back 145 Personal Identity Verification |
front 146 PKI | back 146 Public Key Infrastructure |
front 147 POTS | back 147 Plain Old Telephone Service |
front 148 PPP | back 148 Pointtopoint Protocol |
front 149 PPTP | back 149 Point to Point Tunneling Protocol |
front 150 PSK | back 150 PreShared Key |
front 151 PTZ | back 151 PanTiltZoom |
front 152 RA | back 152 Recovery Agent |
front 153 RAD | back 153 Rapid application development |
front 154 RADIUS | back 154 Remote Authentication Dialin User Server |
front 155 RAID | back 155 Redundant Array of Inexpensive Disks |
front 156 RAS | back 156 Remote Access Server |
front 157 RBAC | back 157 Role Based Access Control |
front 158 RBAC | back 158 Rule Based Access Control |
front 159 RC4 | back 159 RSA Variable Key Size Encryption Algorithm |
front 160 RIPEMD | back 160 RACE Integrity Primitives Evaluation Message Digest |
front 161 ROI | back 161 Return of Investment |
front 162 RPO | back 162 Recovery Point Objective |
front 163 RSA | back 163 Rivest, Shamir, & Adleman |
front 164 RTO | back 164 Recovery Time Objective |
front 165 RTP | back 165 RealTime Transport Protocol |
front 166 S/MIME | back 166 Secure / Multipurpose Internet Mail Extensions |
front 167 SAML | back 167 Security Assertions Markup Language |
front 168 SaaS | back 168 Software as a Service |
front 169 SAN | back 169 Storage Area Network |
front 170 SCADA | back 170 System Control and Data Acquisition |
front 171 SCAP | back 171 Security Content Automation Protocol |
front 172 SCEP | back 172 Simple Certificate Enrollment Protocol |
front 173 SCSI | back 173 Small Computer System Interface |
front 174 SDLC | back 174 Software Development Life Cycle |
front 175 SDLM | back 175 Software Development Life Cycle Methodology |
front 176 SEH | back 176 Structured Exception Handler |
front 177 SHA | back 177 Secure Hashing Algorithm |
front 178 SFTP | back 178 Secured File Transfer Protocol |
front 179 SHTTP | back 179 Secure Hypertext Transfer Protocol |
front 180 SIEM | back 180 Security Information and Event Management |
front 181 SIM | back 181 Subscriber Identity Module |
front 182 SLA | back 182 Service Level Agreement |
front 183 SLE | back 183 Single Loss Expectancy |
front 184 SMS | back 184 Short Message Service |
front 185 SMTP | back 185 Simple Mail Transfer Protocol |
front 186 SNMP | back 186 Simple Network Management Protocol |
front 187 SOAP | back 187 Simple Object Access Point |
front 188 SONET | back 188 Synchronous Optical Network Technologies |
front 189 SPIM | back 189 Spam over Internet Messaging |
front 190 SQL | back 190 Structured Query Language |
front 191 SSD | back 191 Solid State Drive |
front 192 SSH | back 192 Secure Shell |
front 193 SSL | back 193 Secure Sockets Layer |
front 194 SSO | back 194 Single Sign On |
front 195 STP | back 195 Shielded Twisted Pair |
front 196 TACACS+ | back 196 Terminal Access Controller Access Control System |
front 197 TCP/IP | back 197 Transmission Control Protocol / Internet Protocol |
front 198 TGTTicket | back 198 Granting Ticket |
front 199 TKIP | back 199 Temporal Key Integrity Protocol |
front 200 TLS | back 200 Transport Layer Security |
front 201 TOTP | back 201 TimeBased OneTime Password |
front 202 TPM | back 202 Trusted Platform Module |
front 203 TSIG | back 203 Transaction Signature |
front 204 UAT | back 204 User Acceptance Testing |
front 205 UEFI | back 205 Unified Extensible Firmware Interface |
front 206 UDP | back 206 User Datagram Protocol |
front 207 UPS | back 207 Uninterruptable Power Supply |
front 208 URI | back 208 Uniform Resource Identifier |
front 209 URL | back 209 Universal Resource Locator |
front 210 USB | back 210 Universal Serial Bus |
front 211 UTM | back 211 Unified Threat Management |
front 212 UTP | back 212 Unshielded Twisted Pair |
front 213 VDI | back 213 Virtualization Desktop Infrastructure |
front 214 VLAN | back 214 Virtual Local Area Network |
front 215 VoIP | back 215 Voice over IP |
front 216 VPN | back 216 Virtual Private Network |
front 217 VTC | back 217 Video Teleconferencing |
front 218 WAF | back 218 WebApplication Firewall |
front 219 WAP | back 219 Wireless Access Point |
front 220 WEP | back 220 Wired Equivalent Privacy |
front 221 WIDS | back 221 Wireless Intrusion Detection System |
front 222 WIPS | back 222 Wireless Intrusion Prevention System |
front 223 WPA | back 223 Wireless Protected Access |
front 224 WPA2 | back 224 WiFi Protected Access 2 |
front 225 WPS | back 225 WiFi Protected Setup |
front 226 WTLS | back 226 Wireless TLS |
front 227 XML | back 227 Extensible Markup Language |
front 228 XSRF | back 228 CrossSite Request Forgery |
front 229 XSS | back 229 CrossSite Scripting |