You are on page 1of 2

SECURITY+ ACRONYMS

3DES AAA ACL AES AES256 AH ALE AP ARO ARP AUP BCP BIOS BOTS CA CAC CAN CCMP CCTV CERT CHAP CIRT CRC CRL DAC DDOS DEP DES Triple Digital Encryption Standard Authentication, Authorization, and Accounting Access Control List Advanced Encryption Standard Advanced Encryption Standards 256bit Authentication Header Annualized Loss Expectancy Access Point Annualized Rate of Occurrence Address Resolution Protocol Acceptable Use Policy Business Continuity Planning Basic Input / Output System Network Robots Certificate Authority Common Access Card Controller Area Network Counter-Mode/CBC-Mac Protocol Closed-circuit television Computer Emergency Response Team Challenge Handshake Authentication Protocol Computer Incident Response Team Cyclical Redundancy Check Certification Revocation List Discretionary Access Control Distributed Denial of Service Data Execution Prevention Digital Encryption Standard

DHCP DLL DLP DMZ DNS DOS DRP DSA EAP ECC EFS EMI ESP FTP GPU GRE HDD HIDS HIPS HMAC HSM HTTP HTTPS HVAC IaaS ICMP ID IKE IM IMAP4

Dynamic Host Configuration Protocol Dynamic Link Library Data Loss Prevention Demilitarized Zone Domain Name Service (Server) Denial of Service Disaster Recovery Plan Digital Signature Algorithm Extensible Authentication Protocol Elliptic Curve Cryptography Encrypted File System Electromagnetic Interference Encapsulated Security Payload File Transfer Protocol Graphic Processing Unit Generic Routing Encapsulation Hard Disk Drive Host Based Intrusion Detection System Host Based Intrusion Prevention System Hashed Message Authentication Code Hardware Security Module Hypertext Transfer Protocol Hypertext Transfer Protocol (SSL) Heating, Ventilation Air Conditioning Infrastructure as a Service Internet Control Message Protocol Identification Internet Key Exchange Instant messaging Internet Message Access Protocol v4

IP IPSEC IRC ISP IV KDC L2TP LANMAN LDAP LEAP MAC MAC MAN MBR MD5 MSCHAP

Internet Protocol Internet Protocol Security Internet Relay Chat Internet Service Provider Initialization Vector Key Distribution Center Layer 2 Tunneling Protocol Local Area Network Manager Lightweight Directory Access Protocol Lightweight Extensible Authentication Protocol Mandatory Access Control / Media Access Control Message Authentication Code Metropolitan Area Network Master Boot Record Message Digest 5 Microsoft Challenge Handshake Authentication Protocol Maximum Transmission Unit Network Access Control Network Address Translation Network Based Intrusion Detection System Network Based Intrusion Prevention System National Institute of Standards & Technology Network Operating System New Technology File System New Technology LANMAN Network Time Protocol

MTU NAC NAT NIDS NIPS NIST NOS NTFS NTLM NTP

OS OVAL PAP PAT PBX PEAP PED PGP PII PKI POTS PPP PPTP PSK PTZ RA RAD RADIUS RAID RAS RBAC RBAC RSA RTO RTP S/MIME SaaS SCAP

Operating System Open Vulnerability Assessment Language Password Authentication Protocol Port Address Translation Private Branch Exchange Protected Extensible Authentication Protocol Personal Electronic Device Pretty Good Privacy Personally Identifiable Information Public Key Infrastructure Plain Old Telephone Service Point-to-point Protocol Point to Point Tunneling Protocol Pre-Shared Key Pan-Tilt-Zoom Recovery Agent Rapid application development Remote Authentication Dial-in User Server Redundant Array of Inexpensive Disks Remote Access Server Role Based Access Control Rule Based Access Control Rivest, Shamir, & Adleman Recovery Time Objective Real-Time Transport Protocol Secure / Multipurpose internet Mail Extensions Software as a Service Security Content Automation Protocol

SCSI SDLC SDLM SHA SHHTP SIM SLA SLE SMS SMTP SNMP SONET SPIM SSH SSL SSO STP TACACS TCP/IP TKIP TLS TPM UAT UPS URL USB UTP

Small Computer System Interface Software Development Life Cycle Software Development Life Cycle Methodology Secure Hashing Algorithm Secure Hypertext Transfer Protocol Subscriber Identity Module Service Level Agreement Single Loss Expectancy Short Message Service Simple Mail Transfer Protocol Simple Network Management Protocol Synchronous Optical Network Technologies Spam over Internet Messaging Secure Shell Secure Sockets Layel Single Sign On Shielded Twisted Pair Terminal Access Controller Access Control System Transmission Control Protocol / Internet Protocol Temporal Key Integrity Protocol Transport Layer Security Trusted Platform Module User Acceptance Testing Uninterruptable Power Supply Universal Resource Locator Universal Serial Bus Unshielded Twisted Pair

VLAN VoIP VPN VTC WAF WAP WEP WIDS WIPS WPA XSRF XSRF XSS

Virtual Local Area Network Voice over IP Virtual Private Network Video Teleconferencing Web-Application Firewall Wireless Access Point Wired Equivalent Privacy Wireless Intrusion Detection System Wireless Intrusion Prevention System Wireless Protected Access Cross-Site Request Forgery Cross-Site Request Forgery Cross-Site Scripting

This cheat sheet was compiled by Steven M. Swafford, and is distributed according to the Creative Commons v3 Attribution License. File version 1.0. More cheat sheets?

You might also like