The term computer security and information security covers a wide array of activities in an organization/network. It includes not only the products, but also the processes used to prevent unauthorized access to, modification of, and deletion of information.
Suggested Read:
- Python Django – Multiple Choice Questions (MCQ) with Answers
- Windows Server 2016 – Multiple Choice Questions (MCQ) With Answers
- Top 77 Linux Interview Questions to Ask Candidates
- A to Z – Cyber Security Tools Collection
Below is the list of all computer security related abbreviations that you should know:
S.No. | Acronym | Definition |
---|---|---|
1 | 3DES | Triple Digital Encryption Standard |
2 | ACL | Access Control List |
3 | AES | Advanced Encryption Standard |
4 | AES256 | Advanced Encryption Standard 256 bit |
5 | AH | Authentication Header |
6 | ALE | Annual or Annualized Loss Expectancy |
7 | ARO | Annualized Rate of Occurrence |
8 | ARP | Address Resolution Protocol |
9 | AUP | Acceptable Use Policy |
10 | BIOS | Basic Input/Output System |
11 | BOTS | Network Robots |
12 | CA | Certificate Authority |
13 | CAN | Controller Area Network |
14 | CCTV | Closed-Circuit Television |
15 | CHAP | Challenge Handshake Authentication Protocol |
16 | CRL | Certification Revocation List |
17 | DAC | Discretionary Access Control |
18 | DDoS | Distributed Denial of Service |
19 | DES | Digital Encryption Standard |
20 | DHCP | Dynamic Host Configuration Protocol |
21 | DLL | Dynamic Link Library |
22 | DMZ | Demilitarized Zone |
23 | DNS | Domain Name Service (Server) |
24 | DoS | Denial of Service |
25 | EAP | Extensible Authentication Protocol |
26 | ECC | Elliptic Curve Cryptography |
27 | FTP | File Transfer Protocol |
28 | GRE | Generic Routing Encapsulation |
29 | H-IDS | Host-based Intrusion Detection System |
30 | H-IPS | Host-based Intrusion Prevention System |
31 | HTTP | Hypertext Transfer Protocol |
32 | HTTPS | Hypertext Transfer Protocol over SSL |
33 | HVAC | Heating, Ventilation, and Air Conditioning |
34 | ICMP | Internet Control Message Protocol |
35 | ID | Identification, or Intrusion Detection |
36 | IM | Instant Messaging |
37 | IMAP4 | Internet Message Access Protocol v4 |
38 | IP | Internet Protocol |
39 | IPSec | Internet Protocol Security |
40 | IRC | Internet Relay Chat |
41 | ISP | Internet Service Provider |
42 | KDC | Key Distribution Center |
43 | L2TP | Layer 2 Tunneling Protocol |
44 | LANMAN | Local Area Network Manager |
45 | LDAP | Lightweight Directory Access Protocol |
46 | MAC | Mandatory Access Control |
47 | MAC | Media Access Control |
48 | MAC | Message Authentication Code |
49 | MAN | Metropolitan Area Network |
50 | MD5 | Message Digest 5 |
51 | MSCHAP | Microsoft Challenge Handshake Authentication Protocol |
52 | MTU | Maximum Transmission Unit |
53 | NAC | Network Access Control |
54 | NAT | Network Address Translation |
55 | N-IDS | Network-Based Intrusion Detection System |
56 | N-IPS | Network-Based Intrusion Prevention System |
57 | NOS | Network Operating System |
58 | NTFS | New Technology File System |
59 | NTLM | New Technology LAN Manager |
60 | NTP | Network Time Protocol |
61 | OS | Operating system |
62 | OVAL | Open Vulnerability and Assessment Language |
63 | PAP | Password Authentication Protocol |
64 | PAT | Port Address Translation |
65 | PBX | Private Branch Exchange |
66 | PGP | Pretty Good Privacy |
67 | PII | Personally Identifiable Information |
68 | PKI | Public Key Infrastructure |
69 | PPP | Point-to-Point Protocol |
70 | PPTP | Point-to-Point Tunneling Protocol |
71 | RAD | Rapid Application Development |
72 | RADIUS | Remote Authentication Dial-In User Service |
73 | RAID | Redundant Array of Inexpensive Disks |
74 | RAS | Remote Access Server |
75 | RBAC | Role-Based Access Control |
76 | RBAC | Rule-Based Access Control |
77 | RSA | Rivest, Shamir, and Adleman |
78 | S/MIME | Secure Multipurpose Internet Mail Extensions |
79 | SCSI | Small Computer System Interface |
80 | SHA | Secure Hashing Algorithm or Secure Hash Algorithm |
81 | SHTTP | Secure Hypertext Transfer Protocol |
82 | SLA | Service-Level Agreement |
83 | SLE | Single loss expectancy |
84 | SMTP | Simple Mail Transfer Protocol |
85 | SNMP | Simple Network Management Protocol |
86 | SPIM | Spam over Internet Messaging |
87 | SSH | Secure Shell |
88 | SSL | Secure Sockets Layer |
89 | SSO | Single Sign-On |
90 | STP | Shielded Twisted Pair |
91 | TACACS | Terminal Access Controller Access Control System |
92 | TCP/IP | Transmission Control Protocol/Internet Protocol |
93 | TKIP | Temporal Key Integrity Protocol |
94 | TKIP | Temporal Key Interchange Protocol |
95 | TLS | Transport Layer Security |
96 | TPM | Trusted Platform Module |
97 | UPS | Uninterruptable Power Supply |
98 | URL | Universal Resource Locator or Uniform Resource Locator |
99 | USB | Universal Serial Bus |
100 | UTP | Unshielded Twisted Pair |
101 | VLAN | Virtual Local Area Network |
102 | VoIP | Voice Over IP |
103 | VPN | Virtual Private Network |
104 | WEP | Wired Equivalent Privacy |
105 | WPA | Wi-Fi Protected Access |
- Most Common Online Threats – Protecting Yourself from Digital Scams
- 10 Steps to Secure and Manage Your Passwords
- Gmail and Facebook Users Advised to Secure Their Accounts Immediately
- Pentagon’s Proactive Approach to Cybersecurity – Over 50,000 Vulnerability Reports Since 2016
- Windows Hardening – Key Points To Remember
- Top 10 Fundamental Questions for Network Security
- How to Remove x-powered-by in Apache/PHP for Enhanced Security
- 12 Point Checklist – PHP Security Best Practices
- Secure Programming Checklist – 2023 Compilation Guide
- The Ultimate Network Security Checklist – 2023 Complete Guide