Network security is a broad term that covers a multitude of technologies, devices and processes.
In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies.
The below mentioned abbreviations comprises short forms of multiple important technologies that come under one of the most frequently asked topics in many exams.
1 | 3DES | Triple data encryption standard |
2 | AAA | Authentication, authorization, and accounting |
3 | ACD | Automatic call distributor |
4 | ACK | Acknowledgment |
5 | ACL | Access control list |
6 | ADS | Alternate data streams |
7 | AES | Advanced Encryption Standard |
8 | AH | Authentication Header |
9 | ALE | Annualized loss expectancy |
10 | ANSI | American National Standards Institute |
11 | AP | Access point |
12 | API | Application programming interface |
13 | APT | Advanced persistent threat |
14 | ARO | Annualized rate of occurrence |
15 | ARP | Address Resolution Protocol |
16 | ASAv | Adaptive Security Virtual Appliance |
17 | ATM | Asynchronous transfer mode |
18 | AUP | Acceptable use policy |
19 | AV | Asset value |
20 | B2B | Business to business |
21 | B2C | Business to consumer |
22 | BBB | Better Business Bureau |
23 | BCP | Business continuity planning |
24 | BGP | Border Gateway Protocol |
25 | BIOS | Basic input/output system |
26 | BYOD | Bring Your Own Device |
27 | C2C | Consumer to consumer |
28 | CA | Certificate authority |
29 | CAP | Certification and Accreditation Professional |
30 | CAUCE | Coalition Against Unsolicited Commercial Email |
31 | CCC | CERT Coordination Center |
32 | CCNA | Cisco Certified Network Associate |
33 | CCPA | California Consumer Privacy Act |
34 | CERT | Computer Emergency Response Team |
35 | CFE | Certified Fraud Examiner |
36 | CGI | Common Gateway Interface |
37 | C-I-A | Confidentiality, Integrity, and Availability |
38 | CIDR | Classless inter-domain routing |
39 | CISA | Certified Information Systems Auditor |
40 | CISM | Certified Information Security Manager |
41 | CISSP | Certified Information System Security Professional |
42 | CLI | Command line interface |
43 | CMIP | Common management information protocol |
44 | COPPA | Children’s Online Privacy Protection Act |
45 | CPE | Customer premise equipment |
46 | CPU | Central processing unit |
47 | CRC | Cyclic redundancy check |
48 | CSI | Computer Security Institute |
49 | CTI | Computer telephony integration |
50 | DBMS | Database management system |
51 | DCOM | Distributed component object model |
52 | DDoS | Distributed denial of service |
53 | DD-WRT | DresDren-Wireless Router |
54 | DES | Data Encryption Standard |
55 | devfs | Device file system |
56 | DHCP | Dynamic host configuration protocol |
57 | DLLs | Dynamic link libraries |
58 | DLP | Data leakage prevention |
59 | DMZ | Demilitarized zone |
60 | DNS | Domain name system |
61 | DoS | Denial of service |
62 | DPI | Deep packet inspection |
63 | DRP | Disaster recovery plan |
64 | DSL | Digital subscriber line |
65 | DSS | Digital signature standard |
66 | DSU | Data service unit |
67 | ECC | Elliptical curve cryptography |
68 | EDI | Electronic data interchange |
69 | EF | Exposure factor |
70 | EHR | Electronic health record |
71 | EIDE | Enhanced integrated development environment |
72 | EIGRP | Enhanced Interior Gateway Routing Protocol |
73 | EPHI | Electronic protected health information |
74 | EPIC | Electronic Privacy Information Center |
75 | ESD | Electrostatic discharge |
76 | ESP | Encapsulating security payload |
77 | EU | European Union |
78 | EULA | End-user license agreement |
79 | FACTA | Fair and Accurate Credit Transactions Act |
80 | FAR | False acceptance rate |
81 | FBI | Federal Bureau of Investigation |
82 | FCC | Federal Communications Corporation |
83 | FDIC | Federal Deposit Insurance Corporation |
84 | FEP | Front-end processor |
85 | FERPA | Family Educational Rights and Privacy Act |
86 | FIPS | Federal Information Processing Standards |
87 | FQDN | Fully qualified domain names |
88 | FRCP | Federal Rules of Civil Procedure |
89 | FRR | False rejection rate |
90 | FTC | Federal Trade Commission |
91 | FTP | File transfer protocol |
92 | GDRP | General data protection regulation |
93 | GIAC | Global Information Assurance Certification |
94 | GLBA | Gramm-Leach-Bliley Act |
95 | GLBP | Gateway load balancing protocol |
96 | GRC | Governance, risk, and compliance |
97 | GUI | Graphical user interface |
98 | HIDS | Host-based intrusion detection system |
99 | HIPAA | Health Insurance Portability and Accountability Act |
100 | HIPS | Host-based intrusion prevention system |
101 | HITECH | Health Information Technology for Economic and Clinical Health |
102 | HSRP | Hot standby router protocol |
103 | HTML | Hypertext markup language |
104 | HTTP | Hypertext transfer protocol |
105 | HTTPS | HTTP over secure socket layer |
106 | HVAC | Heating, ventilation, and cooling |
107 | IAB | Internet Activities Board |
108 | IAM | Identity and access management |
109 | IANA | Internet Assigned Numbers Authority |
110 | ICMP | Internet control message protocol |
111 | ICS | Industrial control system |
112 | IDEA | International data encryption algorithm |
113 | IDPS | Intrustion detection and prevention system |
114 | IDS | Intrusion detection system |
115 | IEEE | Institute of Electrical and Electronics Engineers |
116 | IEMI | Intentional electromagnetic interference |
117 | IETF | Internet Engineering Task Force |
118 | IGMP | Internet group management protocol |
119 | IGRP | Interior Gateway Routing Protocol |
120 | IKE | Internet key exchange |
121 | IKEv2 | Internet key exchange v2 |
122 | IM | Instant messaging |
123 | IMS | IP Multimedia Subsystem |
124 | InfoSec | Information security |
125 | IoT | Internet of Things |
126 | IP | Internet Protocol |
127 | IPS | Intrusion prevention system |
128 | IPSec | IP Security |
129 | IPv4 | Internet protocol version 4 |
130 | IPv6 | Internet protocol version 6 |
131 | IPX/SPX | Internetwork Packet Exchange/Sequenced Packet Exchange |
132 | IRC | Internet relay chat |
133 | IRS | Internal Revenue Service |
134 | (ISC)2 | International Information System Security Certification Consortium |
135 | ISDN | Integrated Services Digital Network |
136 | ISO | International Organization for Standardization |
137 | ISP | Internet service provider |
138 | ISS | Internet security systems |
139 | IT | Information technology |
140 | ITIL | Information Technology Infrastructure Library |
141 | ITRC | Identity Theft Resource Center |
142 | IVR | Interactive voice response |
143 | LAN | Local area network |
144 | LCD | Liquid Crystal Display |
145 | LDAP | Lightweight directory access protocol |
146 | L2F | Layer 2 forwarding |
147 | L2TP | Layer 2 tunneling protocol |
148 | MAC | Mandatory access code. (Also Media Access Control.) |
149 | MAN | Metropolitan area network |
150 | MD5 | Message Digest 5 |
151 | MitM | Man-in-the-middle |
152 | modem | Modulator DEModulator |
153 | MPLS | Multi-protocol label switching |
154 | MPPE | Microsoft point-to-point encryption |
155 | MTBF | Mean time between failures |
156 | MTTF | Mean time to failure |
157 | MTU | Maximum transmission unit |
158 | NAC | Network access control |
159 | NAS | Network access server |
160 | NAT | Network access translation |
161 | NII | National Information Infrastructure |
162 | NAT-PT | Network address translation–protocol translation |
163 | NetBEUI | NetBios extended user interface |
164 | NFIC | National Fraud Information Center |
165 | NGFV | Next-generation firewall virtual |
166 | NGFW | Next-generation firewall |
167 | NGIPS | Next-generation intrusion prevention system |
168 | NIC | Network interface card |
169 | NIDS | Network intrusion detection system |
170 | NIPS | Network intrusion prevention system |
171 | NIST | National Institute of Standards and Technology |
172 | NMS | Network management system |
173 | NNTP | Network news transfer protocol |
174 | NPAS | Network policy and access services |
175 | NSA | National Security Agency |
176 | NTFS | New technology file system |
177 | OBM | Out-of-band management |
178 | OC | Optical carrier |
179 | OpenVPN | Open source virtual private network |
180 | Open WRT | Open Wireless Router |
181 | OS | Operating system |
182 | OSI | Open systems interconnection |
183 | OSPF | Open Shortest Path First |
184 | OWASP | Open Web Application Security Project |
185 | P2P | Person to person |
186 | PAT | Port address translation |
187 | PBX | Private branch exchange |
188 | PC | Personal computer |
189 | PCI | Payment Card Industry |
190 | PCI DSS | Payment Card Industry Data Security Standard |
191 | PGP | Pretty good privacy |
192 | PHI | Protected health information |
193 | PII | Personally identifiable information |
194 | PKI | Public key infrastructure |
195 | PNAC | Port-based network access (admission) control |
196 | POP | Post Office Protocol |
197 | PPP | Point-to-point protocol |
198 | PPTP | Point-to-point tunneling protocol |
199 | PRNG | Pseudo random number generator |
200 | QoS | Quality of service |
201 | RADIUS | Remote authentication dial-in user service |
202 | RAID | Redundant array of independent disks |
203 | RAM | Random access memory |
204 | RAS | Remote access server |
205 | RBAC | Role-based access system |
206 | RDC | Remote desktop connection |
207 | RDP | Remote desktop protocol |
208 | RDS | Remote desktop services |
209 | RFC | Request for comments |
210 | RFID | Radio-frequency identification |
211 | RIP | Routing Information Protocol |
212 | RIR | Regional Internet registry |
213 | ROI | Return on investment |
214 | RRAS | Routing and remote access service |
215 | RSA | Rivest, Shamir, and Adleman (algorithm) |
216 | SAN | Storage area network |
217 | SANCP | Security analyst network connection profiler |
218 | SANS | SysAdmin, Audit, Network, Security |
219 | SAP | Service access point |
220 | SCSI | Small computer system interface |
221 | SDD | Software Design Document |
222 | SED | Static-electric discharge |
223 | SEM | Security event management |
224 | SEO | Search engine optimization |
225 | SET | Secure electronic transaction |
226 | SGC | Server-gated cryptography |
227 | SHA | Secure hash algorithm |
228 | S-HTTP | Secure HTTP |
229 | SIEM | Security information and event management |
230 | SIM | Security information management |
231 | SIRT | Security incident response team |
232 | SLA | Service level agreement |
233 | SLE | Single loss expectancy |
234 | SMAC | Social, mobile, analytics and cloud |
235 | SMFA | Specific management functional area |
236 | SMTP | Simple mail transfer protocol |
237 | SNA | Systems network architecture |
238 | SNMP | Simple network management protocol |
239 | SOHO | Small office/home office |
240 | SOX | Sarbanes-Oxley Act of 2002 (also Sarbox) |
241 | SQL | Structured Query Language |
242 | SSA | Social Security Administration |
243 | SSCP | Systems Security Certified Practitioner |
244 | SSH | Secure shell |
245 | SSID | Service set identifier |
246 | SSL | Secure sockets layer |
247 | SSL/TLS | Secure sockets layer/transport layer security |
248 | SSO | Single sign-on |
249 | STP | Shielded twisted cable |
250 | STIG | Security Technical Implementation Guide |
251 | SYN | Synchronize |
252 | SYN/ACK | Synchronization acknowledged |
253 | TACACS | Terminal Access Controller Access-Control System |
254 | TCP | Transmission Control Protocol |
255 | TCP/IP | Transmission Control Protocol/Internet Protocol |
256 | TCSEC | Trusted computer system evaluation criteria |
257 | TFTP | Trivial file transfer protocol |
258 | TLS | Transport Layer Security |
259 | TNI | Trusted network interpretation |
260 | TPM | Trusted platform module |
261 | UDP | User datagram protocol |
262 | UNIX | Uniplexed Information and Computer Systems |
263 | UPS | Uninterruptible power supply |
264 | URL | Uniform resource locator |
265 | USB | Universal serial bus |
266 | UTM | Unified threat management |
267 | UTP | Unshielded twisted cable |
268 | VLAN | Virtual local area network |
269 | VOIP | Voice over Internet Protocol |
270 | VPN | Virtual private network |
271 | VRRP | Virtual router redundancy protocol |
272 | WAN | Wide area network |
273 | WANv | Wide area network virtual |
274 | VPN | Virtual private network |
275 | WAP | Wireless accent point |
276 | WebGUI | Web-based graphical user interface |
277 | WLAN | Wireless local area network |
278 | WNIC | Wireless network interface card |
279 | WORM | Write-once read-many |
280 | W3C | World Wide Web Consortium |
281 | WWW | World Wide Web |
282 | XXS | Cross-site scripting |
Related Articles:
- Computer – Some Important Abbreviations
- Network Related Abbreviations You Need To Know
- 150+ Computer Related Abbreviations Which You Need To Know
- 700+ Wireless Networking Abbreviations
- A to Z – Network Security Related Abbreviations and Terms
- 100+ Computer and Network Security Abbreviations
- Most Common Online Threats – Protecting Yourself from Digital Scams
- 10 Steps to Secure and Manage Your Passwords
- Gmail and Facebook Users Advised to Secure Their Accounts Immediately
- Pentagon’s Proactive Approach to Cybersecurity – Over 50,000 Vulnerability Reports Since 2016
- Windows Hardening – Key Points To Remember
- Top 10 Fundamental Questions for Network Security
- How to Remove x-powered-by in Apache/PHP for Enhanced Security
- 12 Point Checklist – PHP Security Best Practices
- Secure Programming Checklist – 2023 Compilation Guide
- The Ultimate Network Security Checklist – 2023 Complete Guide