200+ Network Security Abbreviations You Need To Remember

Network Security Abbreviations TechhymeNetwork Security Abbreviations Techhyme

Network security is a broad term that covers a multitude of technologies, devices and processes.

In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies.

The below mentioned abbreviations comprises short forms of multiple important technologies that come under one of the most frequently asked topics in many exams.

1 3DES Triple data encryption standard
2 AAA Authentication, authorization, and accounting
3 ACD Automatic call distributor
4 ACK Acknowledgment
5 ACL Access control list
6 ADS Alternate data streams
7 AES Advanced Encryption Standard
8 AH Authentication Header
9 ALE Annualized loss expectancy
10 ANSI American National Standards Institute
11 AP Access point
12 API Application programming interface
13 APT Advanced persistent threat
14 ARO Annualized rate of occurrence
15 ARP Address Resolution Protocol
16 ASAv Adaptive Security Virtual Appliance
17 ATM Asynchronous transfer mode
18 AUP Acceptable use policy
19 AV Asset value
20 B2B Business to business
21 B2C Business to consumer
22 BBB Better Business Bureau
23 BCP Business continuity planning
24 BGP Border Gateway Protocol
25 BIOS Basic input/output system
26 BYOD Bring Your Own Device
27 C2C Consumer to consumer
28 CA Certificate authority
29 CAP Certification and Accreditation Professional
30 CAUCE Coalition Against Unsolicited Commercial Email
31 CCC CERT Coordination Center
32 CCNA Cisco Certified Network Associate
33 CCPA California Consumer Privacy Act
34 CERT Computer Emergency Response Team
35 CFE Certified Fraud Examiner
36 CGI Common Gateway Interface
37 C-I-A Confidentiality, Integrity, and Availability
38 CIDR Classless inter-domain routing
39 CISA Certified Information Systems Auditor
40 CISM Certified Information Security Manager
41 CISSP Certified Information System Security Professional
42 CLI Command line interface
43 CMIP Common management information protocol
44 COPPA Children’s Online Privacy Protection Act
45 CPE Customer premise equipment
46 CPU Central processing unit
47 CRC Cyclic redundancy check
48 CSI Computer Security Institute
49 CTI Computer telephony integration
50 DBMS Database management system
51 DCOM Distributed component object model
52 DDoS Distributed denial of service
53 DD-WRT DresDren-Wireless Router
54 DES Data Encryption Standard
55 devfs Device file system
56 DHCP Dynamic host configuration protocol
57 DLLs Dynamic link libraries
58 DLP Data leakage prevention
59 DMZ Demilitarized zone
60 DNS Domain name system
61 DoS Denial of service
62 DPI Deep packet inspection
63 DRP Disaster recovery plan
64 DSL Digital subscriber line
65 DSS Digital signature standard
66 DSU Data service unit
67 ECC Elliptical curve cryptography
68 EDI Electronic data interchange
69 EF Exposure factor
70 EHR Electronic health record
71 EIDE Enhanced integrated development environment
72 EIGRP Enhanced Interior Gateway Routing Protocol
73 EPHI Electronic protected health information
74 EPIC Electronic Privacy Information Center
75 ESD Electrostatic discharge
76 ESP Encapsulating security payload
77 EU European Union
78 EULA End-user license agreement
79 FACTA Fair and Accurate Credit Transactions Act
80 FAR False acceptance rate
81 FBI Federal Bureau of Investigation
82 FCC Federal Communications Corporation
83 FDIC Federal Deposit Insurance Corporation
84 FEP Front-end processor
85 FERPA Family Educational Rights and Privacy Act
86 FIPS Federal Information Processing Standards
87 FQDN Fully qualified domain names
88 FRCP Federal Rules of Civil Procedure
89 FRR False rejection rate
90 FTC Federal Trade Commission
91 FTP File transfer protocol
92 GDRP General data protection regulation
93 GIAC Global Information Assurance Certification
94 GLBA Gramm-Leach-Bliley Act
95 GLBP Gateway load balancing protocol
96 GRC Governance, risk, and compliance
97 GUI Graphical user interface
98 HIDS Host-based intrusion detection system
99 HIPAA Health Insurance Portability and Accountability Act
100 HIPS Host-based intrusion prevention system
101 HITECH Health Information Technology for Economic and Clinical Health
102 HSRP Hot standby router protocol
103 HTML Hypertext markup language
104 HTTP Hypertext transfer protocol
105 HTTPS HTTP over secure socket layer
106 HVAC Heating, ventilation, and cooling
107 IAB Internet Activities Board
108 IAM Identity and access management
109 IANA Internet Assigned Numbers Authority
110 ICMP Internet control message protocol
111 ICS Industrial control system
112 IDEA International data encryption algorithm
113 IDPS Intrustion detection and prevention system
114 IDS Intrusion detection system
115 IEEE Institute of Electrical and Electronics Engineers
116 IEMI Intentional electromagnetic interference
117 IETF Internet Engineering Task Force
118 IGMP Internet group management protocol
119 IGRP Interior Gateway Routing Protocol
120 IKE Internet key exchange
121 IKEv2 Internet key exchange v2
122 IM Instant messaging
123 IMS IP Multimedia Subsystem
124 InfoSec Information security
125 IoT Internet of Things
126 IP Internet Protocol
127 IPS Intrusion prevention system
128 IPSec IP Security
129 IPv4 Internet protocol version 4
130 IPv6 Internet protocol version 6
131 IPX/SPX Internetwork Packet Exchange/Sequenced Packet Exchange
132 IRC Internet relay chat
133 IRS Internal Revenue Service
134 (ISC)2 International Information System Security Certification Consortium
135 ISDN Integrated Services Digital Network
136 ISO International Organization for Standardization
137 ISP Internet service provider
138 ISS Internet security systems
139 IT Information technology
140 ITIL Information Technology Infrastructure Library
141 ITRC Identity Theft Resource Center
142 IVR Interactive voice response
143 LAN Local area network
144 LCD Liquid Crystal Display
145 LDAP Lightweight directory access protocol
146 L2F Layer 2 forwarding
147 L2TP Layer 2 tunneling protocol
148 MAC Mandatory access code. (Also Media Access Control.)
149 MAN Metropolitan area network
150 MD5 Message Digest 5
151 MitM Man-in-the-middle
152 modem Modulator DEModulator
153 MPLS Multi-protocol label switching
154 MPPE Microsoft point-to-point encryption
155 MTBF Mean time between failures
156 MTTF Mean time to failure
157 MTU Maximum transmission unit
158 NAC Network access control
159 NAS Network access server
160 NAT Network access translation
161 NII National Information Infrastructure
162 NAT-PT Network address translation–protocol translation
163 NetBEUI NetBios extended user interface
164 NFIC National Fraud Information Center
165 NGFV Next-generation firewall virtual
166 NGFW Next-generation firewall
167 NGIPS Next-generation intrusion prevention system
168 NIC Network interface card
169 NIDS Network intrusion detection system
170 NIPS Network intrusion prevention system
171 NIST National Institute of Standards and Technology
172 NMS Network management system
173 NNTP Network news transfer protocol
174 NPAS Network policy and access services
175 NSA National Security Agency
176 NTFS New technology file system
177 OBM Out-of-band management
178 OC Optical carrier
179 OpenVPN Open source virtual private network
180 Open WRT Open Wireless Router
181 OS Operating system
182 OSI Open systems interconnection
183 OSPF Open Shortest Path First
184 OWASP Open Web Application Security Project
185 P2P Person to person
186 PAT Port address translation
187 PBX Private branch exchange
188 PC Personal computer
189 PCI Payment Card Industry
190 PCI DSS Payment Card Industry Data Security Standard
191 PGP Pretty good privacy
192 PHI Protected health information
193 PII Personally identifiable information
194 PKI Public key infrastructure
195 PNAC Port-based network access (admission) control
196 POP Post Office Protocol
197 PPP Point-to-point protocol
198 PPTP Point-to-point tunneling protocol
199 PRNG Pseudo random number generator
200 QoS Quality of service
201 RADIUS Remote authentication dial-in user service
202 RAID Redundant array of independent disks
203 RAM Random access memory
204 RAS Remote access server
205 RBAC Role-based access system
206 RDC Remote desktop connection
207 RDP Remote desktop protocol
208 RDS Remote desktop services
209 RFC Request for comments
210 RFID Radio-frequency identification
211 RIP Routing Information Protocol
212 RIR Regional Internet registry
213 ROI Return on investment
214 RRAS Routing and remote access service
215 RSA Rivest, Shamir, and Adleman (algorithm)
216 SAN Storage area network
217 SANCP Security analyst network connection profiler
218 SANS SysAdmin, Audit, Network, Security
219 SAP Service access point
220 SCSI Small computer system interface
221 SDD Software Design Document
222 SED Static-electric discharge
223 SEM Security event management
224 SEO Search engine optimization
225 SET Secure electronic transaction
226 SGC Server-gated cryptography
227 SHA Secure hash algorithm
228 S-HTTP Secure HTTP
229 SIEM Security information and event management
230 SIM Security information management
231 SIRT Security incident response team
232 SLA Service level agreement
233 SLE Single loss expectancy
234 SMAC Social, mobile, analytics and cloud
235 SMFA Specific management functional area
236 SMTP Simple mail transfer protocol
237 SNA Systems network architecture
238 SNMP Simple network management protocol
239 SOHO Small office/home office
240 SOX Sarbanes-Oxley Act of 2002 (also Sarbox)
241 SQL Structured Query Language
242 SSA Social Security Administration
243 SSCP Systems Security Certified Practitioner
244 SSH Secure shell
245 SSID Service set identifier
246 SSL Secure sockets layer
247 SSL/TLS Secure sockets layer/transport layer security
248 SSO Single sign-on
249 STP Shielded twisted cable
250 STIG Security Technical Implementation Guide
251 SYN Synchronize
252 SYN/ACK Synchronization acknowledged
253 TACACS Terminal Access Controller Access-Control System
254 TCP Transmission Control Protocol
255 TCP/IP Transmission Control Protocol/Internet Protocol
256 TCSEC Trusted computer system evaluation criteria
257 TFTP Trivial file transfer protocol
258 TLS Transport Layer Security
259 TNI Trusted network interpretation
260 TPM Trusted platform module
261 UDP User datagram protocol
262 UNIX Uniplexed Information and Computer Systems
263 UPS Uninterruptible power supply
264 URL Uniform resource locator
265 USB Universal serial bus
266 UTM Unified threat management
267 UTP Unshielded twisted cable
268 VLAN Virtual local area network
269 VOIP Voice over Internet Protocol
270 VPN Virtual private network
271 VRRP Virtual router redundancy protocol
272 WAN Wide area network
273 WANv Wide area network virtual
274 VPN Virtual private network
275 WAP Wireless accent point
276 WebGUI Web-based graphical user interface
277 WLAN Wireless local area network
278 WNIC Wireless network interface card
279 WORM Write-once read-many
280 W3C World Wide Web Consortium
281 WWW World Wide Web
282 XXS Cross-site scripting

Related Articles:

You may also like:

Related Posts