100+ Computer and Network Security Abbreviations


The term computer security and information security covers a wide array of activities in an organization/network. It includes not only the products, but also the processes used to prevent unauthorized access to, modification of, and deletion of information.

Suggested Read:

Below is the list of all computer security related abbreviations that you should know:

S.No. Acronym Definition
1 3DES Triple Digital Encryption Standard
2 ACL Access Control List
3 AES Advanced Encryption Standard
4 AES256 Advanced Encryption Standard 256 bit
5 AH Authentication Header
6 ALE Annual or Annualized Loss Expectancy
7 ARO Annualized Rate of Occurrence
8 ARP Address Resolution Protocol
9 AUP Acceptable Use Policy
10 BIOS Basic Input/Output System
11 BOTS Network Robots
12 CA Certificate Authority
13 CAN Controller Area Network
14 CCTV Closed-Circuit Television
15 CHAP Challenge Handshake Authentication Protocol
16 CRL Certification Revocation List
17 DAC Discretionary Access Control
18 DDoS Distributed Denial of Service
19 DES Digital Encryption Standard
20 DHCP Dynamic Host Configuration Protocol
21 DLL Dynamic Link Library
22 DMZ Demilitarized Zone
23 DNS Domain Name Service (Server)
24 DoS Denial of Service
25 EAP Extensible Authentication Protocol
26 ECC Elliptic Curve Cryptography
27 FTP File Transfer Protocol
28 GRE Generic Routing Encapsulation
29 H-IDS Host-based Intrusion Detection System
30 H-IPS Host-based Intrusion Prevention System
31 HTTP Hypertext Transfer Protocol
32 HTTPS Hypertext Transfer Protocol over SSL
33 HVAC Heating, Ventilation, and Air Conditioning
34 ICMP Internet Control Message Protocol
35 ID Identification, or Intrusion Detection
36 IM Instant Messaging
37 IMAP4 Internet Message Access Protocol v4
38 IP Internet Protocol
39 IPSec Internet Protocol Security
40 IRC Internet Relay Chat
41 ISP Internet Service Provider
42 KDC Key Distribution Center
43 L2TP Layer 2 Tunneling Protocol
44 LANMAN Local Area Network Manager
45 LDAP Lightweight Directory Access Protocol
46 MAC Mandatory Access Control
47 MAC Media Access Control
48 MAC Message Authentication Code
49 MAN Metropolitan Area Network
50 MD5 Message Digest 5
51 MSCHAP Microsoft Challenge Handshake Authentication Protocol
52 MTU Maximum Transmission Unit
53 NAC Network Access Control
54 NAT Network Address Translation
55 N-IDS Network-Based Intrusion Detection System
56 N-IPS Network-Based Intrusion Prevention System
57 NOS Network Operating System
58 NTFS New Technology File System
59 NTLM New Technology LAN Manager
60 NTP Network Time Protocol
61 OS Operating system
62 OVAL Open Vulnerability and Assessment Language
63 PAP Password Authentication Protocol
64 PAT Port Address Translation
65 PBX Private Branch Exchange
66 PGP Pretty Good Privacy
67 PII Personally Identifiable Information
68 PKI Public Key Infrastructure
69 PPP Point-to-Point Protocol
70 PPTP Point-to-Point Tunneling Protocol
71 RAD Rapid Application Development
72 RADIUS Remote Authentication Dial-In User Service
73 RAID Redundant Array of Inexpensive Disks
74 RAS Remote Access Server
75 RBAC Role-Based Access Control
76 RBAC Rule-Based Access Control
77 RSA Rivest, Shamir, and Adleman
78 S/MIME Secure Multipurpose Internet Mail Extensions
79 SCSI Small Computer System Interface
80 SHA Secure Hashing Algorithm or Secure Hash Algorithm
81 SHTTP Secure Hypertext Transfer Protocol
82 SLA Service-Level Agreement
83 SLE Single loss expectancy
84 SMTP Simple Mail Transfer Protocol
85 SNMP Simple Network Management Protocol
86 SPIM Spam over Internet Messaging
87 SSH Secure Shell
88 SSL Secure Sockets Layer
89 SSO Single Sign-On
90 STP Shielded Twisted Pair
91 TACACS Terminal Access Controller Access Control System
92 TCP/IP Transmission Control Protocol/Internet Protocol
93 TKIP Temporal Key Integrity Protocol
94 TKIP Temporal Key Interchange Protocol
95 TLS Transport Layer Security
96 TPM Trusted Platform Module
97 UPS Uninterruptable Power Supply
98 URL Universal Resource Locator or Uniform Resource Locator
99 USB Universal Serial Bus
100 UTP Unshielded Twisted Pair
101 VLAN Virtual Local Area Network
102 VoIP Voice Over IP
103 VPN Virtual Private Network
104 WEP Wired Equivalent Privacy
105 WPA Wi-Fi Protected Access
You may also like:

Related Posts

Leave a Reply