The term computer security and information security covers a wide array of activities in an organization/network. It includes not only the products, but also the processes used to prevent unauthorized access to, modification of, and deletion of information.
Suggested Read:
- Python Django – Multiple Choice Questions (MCQ) with Answers
- Windows Server 2016 – Multiple Choice Questions (MCQ) With Answers
- Top 77 Linux Interview Questions to Ask Candidates
- A to Z – Cyber Security Tools Collection
Below is the list of all computer security related abbreviations that you should know:
| S.No. | Acronym | Definition |
|---|---|---|
| 1 | 3DES | Triple Digital Encryption Standard |
| 2 | ACL | Access Control List |
| 3 | AES | Advanced Encryption Standard |
| 4 | AES256 | Advanced Encryption Standard 256 bit |
| 5 | AH | Authentication Header |
| 6 | ALE | Annual or Annualized Loss Expectancy |
| 7 | ARO | Annualized Rate of Occurrence |
| 8 | ARP | Address Resolution Protocol |
| 9 | AUP | Acceptable Use Policy |
| 10 | BIOS | Basic Input/Output System |
| 11 | BOTS | Network Robots |
| 12 | CA | Certificate Authority |
| 13 | CAN | Controller Area Network |
| 14 | CCTV | Closed-Circuit Television |
| 15 | CHAP | Challenge Handshake Authentication Protocol |
| 16 | CRL | Certification Revocation List |
| 17 | DAC | Discretionary Access Control |
| 18 | DDoS | Distributed Denial of Service |
| 19 | DES | Digital Encryption Standard |
| 20 | DHCP | Dynamic Host Configuration Protocol |
| 21 | DLL | Dynamic Link Library |
| 22 | DMZ | Demilitarized Zone |
| 23 | DNS | Domain Name Service (Server) |
| 24 | DoS | Denial of Service |
| 25 | EAP | Extensible Authentication Protocol |
| 26 | ECC | Elliptic Curve Cryptography |
| 27 | FTP | File Transfer Protocol |
| 28 | GRE | Generic Routing Encapsulation |
| 29 | H-IDS | Host-based Intrusion Detection System |
| 30 | H-IPS | Host-based Intrusion Prevention System |
| 31 | HTTP | Hypertext Transfer Protocol |
| 32 | HTTPS | Hypertext Transfer Protocol over SSL |
| 33 | HVAC | Heating, Ventilation, and Air Conditioning |
| 34 | ICMP | Internet Control Message Protocol |
| 35 | ID | Identification, or Intrusion Detection |
| 36 | IM | Instant Messaging |
| 37 | IMAP4 | Internet Message Access Protocol v4 |
| 38 | IP | Internet Protocol |
| 39 | IPSec | Internet Protocol Security |
| 40 | IRC | Internet Relay Chat |
| 41 | ISP | Internet Service Provider |
| 42 | KDC | Key Distribution Center |
| 43 | L2TP | Layer 2 Tunneling Protocol |
| 44 | LANMAN | Local Area Network Manager |
| 45 | LDAP | Lightweight Directory Access Protocol |
| 46 | MAC | Mandatory Access Control |
| 47 | MAC | Media Access Control |
| 48 | MAC | Message Authentication Code |
| 49 | MAN | Metropolitan Area Network |
| 50 | MD5 | Message Digest 5 |
| 51 | MSCHAP | Microsoft Challenge Handshake Authentication Protocol |
| 52 | MTU | Maximum Transmission Unit |
| 53 | NAC | Network Access Control |
| 54 | NAT | Network Address Translation |
| 55 | N-IDS | Network-Based Intrusion Detection System |
| 56 | N-IPS | Network-Based Intrusion Prevention System |
| 57 | NOS | Network Operating System |
| 58 | NTFS | New Technology File System |
| 59 | NTLM | New Technology LAN Manager |
| 60 | NTP | Network Time Protocol |
| 61 | OS | Operating system |
| 62 | OVAL | Open Vulnerability and Assessment Language |
| 63 | PAP | Password Authentication Protocol |
| 64 | PAT | Port Address Translation |
| 65 | PBX | Private Branch Exchange |
| 66 | PGP | Pretty Good Privacy |
| 67 | PII | Personally Identifiable Information |
| 68 | PKI | Public Key Infrastructure |
| 69 | PPP | Point-to-Point Protocol |
| 70 | PPTP | Point-to-Point Tunneling Protocol |
| 71 | RAD | Rapid Application Development |
| 72 | RADIUS | Remote Authentication Dial-In User Service |
| 73 | RAID | Redundant Array of Inexpensive Disks |
| 74 | RAS | Remote Access Server |
| 75 | RBAC | Role-Based Access Control |
| 76 | RBAC | Rule-Based Access Control |
| 77 | RSA | Rivest, Shamir, and Adleman |
| 78 | S/MIME | Secure Multipurpose Internet Mail Extensions |
| 79 | SCSI | Small Computer System Interface |
| 80 | SHA | Secure Hashing Algorithm or Secure Hash Algorithm |
| 81 | SHTTP | Secure Hypertext Transfer Protocol |
| 82 | SLA | Service-Level Agreement |
| 83 | SLE | Single loss expectancy |
| 84 | SMTP | Simple Mail Transfer Protocol |
| 85 | SNMP | Simple Network Management Protocol |
| 86 | SPIM | Spam over Internet Messaging |
| 87 | SSH | Secure Shell |
| 88 | SSL | Secure Sockets Layer |
| 89 | SSO | Single Sign-On |
| 90 | STP | Shielded Twisted Pair |
| 91 | TACACS | Terminal Access Controller Access Control System |
| 92 | TCP/IP | Transmission Control Protocol/Internet Protocol |
| 93 | TKIP | Temporal Key Integrity Protocol |
| 94 | TKIP | Temporal Key Interchange Protocol |
| 95 | TLS | Transport Layer Security |
| 96 | TPM | Trusted Platform Module |
| 97 | UPS | Uninterruptable Power Supply |
| 98 | URL | Universal Resource Locator or Uniform Resource Locator |
| 99 | USB | Universal Serial Bus |
| 100 | UTP | Unshielded Twisted Pair |
| 101 | VLAN | Virtual Local Area Network |
| 102 | VoIP | Voice Over IP |
| 103 | VPN | Virtual Private Network |
| 104 | WEP | Wired Equivalent Privacy |
| 105 | WPA | Wi-Fi Protected Access |


Pingback: Cyber Security and Cyber Forensics - Interview Questions - Tech Hyme