Print Options

Font size:

← Back to notecard set|Easy Notecards home page

To print: Ctrl+PPrint as notecards

CompTIA Security+ SY0-401 Acronyms

1.

3DES

Triple Digital Encryption Standard

2.

AAA

Authentication, Authorization, and Accounting

3.

ACL

Access Control List

4.

AES

Advanced Encryption Standard

5.

AES256

Advanced Encryption Standards 256bit

6.

AH

Authentication Header

7.

ALE

Annualized Loss Expectancy

8.

AP

Access Point

9.

API

Application Programming Interface

10.

ASP

Application Service Provider

11.

ARO

Annualized Rate of Occurrence

12.

ARP

Address Resolution Protocol

13.

AUP

Acceptable Use Policy

14.

BAC

Business Availability Center

15.

BCP

Business Continuity Planning

16.

BIA

Business Impact Analysis

17.

BIOS

Basic Input / Output System

18.

BPA

Business Partners Agreement

19.

BYOD

Bring Your Own Device

20.

CA

Certificate Authority

21.

CAC

Common Access Card

22.

CAN

Controller Area Network

23.

CAPTCHA

Completely Automated Public Turning Test to Tell

24.

Computers

and Humans Apart

25.

CAR

Corrective Action Report

26.

CCMP

CounterMode/CBCMac Protocol

27.

CCTV

Closedcircuit television

28.

CERT

Computer Emergency Response Team

29.

CHAP

Challenge Handshake Authentication Protocol

30.

CIO

Chief Information Officer

31.

CIRT

Computer Incident Response Team

32.

COOP

Continuity of Operation Planning

33.

CP

Contingency Planning

34.

CRC

Cyclical Redundancy Check

35.

CRL

Certification Revocation List

36.

CSR

Control Status Register

37.

CSU

Channel Service Unit

38.

CTO

Chief Technology Officer

39.

DAC

Discretionary Access Control

40.

DBADatabase

Administrator

41.

DDOS

Distributed Denial of Service

42.

DEP

Data Execution Prevention

43.

DES

Digital Encryption Standard

44.

DHCP

Dynamic Host Configuration Protocol

45.

DHE

DataHandling Electronics

46.

DHE

DiffieHellman Ephemeral

47.

DLL

Dynamic Link Library

48.

DLP

Data Loss Prevention

49.

DMZ

Demilitarized Zone

50.

DNAT

Destination Network Address Transaction

51.

DNS

Domain Name Service (Server)

52.

DOS

Denial of Service

53.

DRP

Disaster Recovery Plan

54.

DSA

Digital Signature Algorithm

55.

DSL

Digital Subscriber line

56.

DSU

Data Service Unit

57.

EAP

Extensible Authentication Protocol

58.

ECC

Elliptic Curve Cryptography

59.

ECDHE

Elliptic Curve DiffieHellman Ephemeral

60.

EFS

Encrypted File System

61.

EMI

Electromagnetic Interference

62.

ESN

Electronic Serial Number

63.

ESP

Encapsulated Security Payload

64.

FACL

File System Access Control List

65.

FDEFull

Disk Encryption

66.

FTP

File Transfer Protocol

67.

FTPS

Secured File Transfer Protocol

68.

GPG

Global Property Guide

69.

GPO

Group Policy Object

70.

GPS

Global Positioning System

71.

GPU

Graphic Processing Unit

72.

GRE

Generic Routing Encapsulation

73.

HDD

Hard Disk Drive

74.

HIDS

Host Based Intrusion Detection System

75.

HIPS

Host Based Intrusion Prevention System

76.

HMAC

Hashed Message Authentication Code

77.

HOTP

HMAC based One Time Password

78.

HSM

Hardware Security Module

79.

HTTP

Hypertext Transfer Protocol

80.

HTTPS

Hypertext Transfer Protocol over SSL

81.

HVAC

Heating, Ventilation Air Conditioning

82.

IaaS

Infrastructure as a Service

83.

ICMP

Internet Control Message Protocol

84.

ID

Identification

85.

IDS

Intrusion Detection System

86.

IKE

Internet Key Exchange

87.

IM

Instant messaging

88.

IMAP4

Internet Message Access Protocol v4

89.

IP

Internet Protocol

90.

IPSEC

Internet Protocol Security

91.

IRIncident

Response

92.

IRC

Internet Relay Chat

93.

IRP

Incident Response Procedure

94.

ISA

Interconnection Security Agreement

95.

ISP

Internet Service Provider

96.

ISSO

Information Systems Security Officer

97.

ITCP

IT Contingency Plan

98.

IV

Initialization Vector

99.

JBODJust

a Bunch of Disks

100.

KDC

Key Distribution Center

101.

L2TP

Layer 2 Tunneling Protocol

102.

LAN

Local Area Network

103.

LDAP

Lightweight Directory Access Protocol

104.

LEAP

Lightweight Extensible Authentication Protocol

105.

MaaS

Monitoring as a Service

106.

MAC

Mandatory Access Control / Media Access Control

107.

MAC

Message Authentication Code

108.

MAN

Metropolitan Area Network

109.

MBR

Master Boot Record

110.

MD5

Message Digest 5

111.

MOU

Memorandum of Understanding

112.

MPLS

MultiProtocol Layer Switch

113.

MSCHAP

Microsoft Challenge Handshake Authentication Protocol

114.

MTBF

Mean Time Between Failures

115.

MTTR

Mean Time to Recover

116.

MTTF

Mean Time to Failure

117.

MTU

Maximum Transmission Unit

118.

NAC

Network Access Control

119.

NAT

Network Address Translation

120.

NDA

NonDisclosure Agreement

121.

NFCNear

Field Communication

122.

NIDS

Network Based Intrusion Detection System

123.

NIPS

Network Based Intrusion Prevention System

124.

NIST

National Institute of Standards & Technology

125.

NOS

Network Operating System

126.

NTFS

New Technology File System

127.

NTLM

New Technology LANMAN

128.

NTP

Network Time Protocol

129.

OCSP

Online Certificate Status Protocol

130.

OLA

Open License Agreement

131.

OS

Operating System

132.

OVAL

Open Vulnerability Assessment Language

133.

P2P

Peer to Peer

134.

PACProxy

Auto Configuration

135.

PAM

Pluggable Authentication Modules

136.

PAP

Password Authentication Protocol

137.

PAT

Port Address Translation

138.

PBKDF2

Password Based Key Derivation Function 2

139.

PBX

Private Branch Exchange

140.

PCAP

Packet Capture

141.

PEAP

Protected Extensible Authentication Protocol

142.

PED

Personal Electronic Device

143.

PGP

Pretty Good Privacy

144.

PII

Personally Identifiable Information

145.

PIV

Personal Identity Verification

146.

PKI

Public Key Infrastructure

147.

POTS

Plain Old Telephone Service

148.

PPP

Pointtopoint Protocol

149.

PPTP

Point to Point Tunneling Protocol

150.

PSK

PreShared Key

151.

PTZ

PanTiltZoom

152.

RA

Recovery Agent

153.

RAD

Rapid application development

154.

RADIUS

Remote Authentication Dialin User Server

155.

RAID

Redundant Array of Inexpensive Disks

156.

RAS

Remote Access Server

157.

RBAC

Role Based Access Control

158.

RBAC

Rule Based Access Control

159.

RC4

RSA Variable Key Size Encryption Algorithm

160.

RIPEMD

RACE Integrity Primitives Evaluation Message Digest

161.

ROI

Return of Investment

162.

RPO

Recovery Point Objective

163.

RSA

Rivest, Shamir, & Adleman

164.

RTO

Recovery Time Objective

165.

RTP

RealTime Transport Protocol

166.

S/MIME

Secure / Multipurpose Internet Mail Extensions

167.

SAML

Security Assertions Markup Language

168.

SaaS

Software as a Service

169.

SAN

Storage Area Network

170.

SCADA

System Control and Data Acquisition

171.

SCAP

Security Content Automation Protocol

172.

SCEP

Simple Certificate Enrollment Protocol

173.

SCSI

Small Computer System Interface

174.

SDLC

Software Development Life Cycle

175.

SDLM

Software Development Life Cycle Methodology

176.

SEH

Structured Exception Handler

177.

SHA

Secure Hashing Algorithm

178.

SFTP

Secured File Transfer Protocol

179.

SHTTP

Secure Hypertext Transfer Protocol

180.

SIEM

Security Information and Event Management

181.

SIM

Subscriber Identity Module

182.

SLA

Service Level Agreement

183.

SLE

Single Loss Expectancy

184.

SMS

Short Message Service

185.

SMTP

Simple Mail Transfer Protocol

186.

SNMP

Simple Network Management Protocol

187.

SOAP

Simple Object Access Point

188.

SONET

Synchronous Optical Network Technologies

189.

SPIM

Spam over Internet Messaging

190.

SQL

Structured Query Language

191.

SSD

Solid State Drive

192.

SSH

Secure Shell

193.

SSL

Secure Sockets Layer

194.

SSO

Single Sign On

195.

STP

Shielded Twisted Pair

196.

TACACS+

Terminal Access Controller Access Control System

197.

TCP/IP

Transmission Control Protocol / Internet Protocol

198.

TGTTicket

Granting Ticket

199.

TKIP

Temporal Key Integrity Protocol

200.

TLS

Transport Layer Security

201.

TOTP

TimeBased OneTime Password

202.

TPM

Trusted Platform Module

203.

TSIG

Transaction Signature

204.

UAT

User Acceptance Testing

205.

UEFI

Unified Extensible Firmware Interface

206.

UDP

User Datagram Protocol

207.

UPS

Uninterruptable Power Supply

208.

URI

Uniform Resource Identifier

209.

URL

Universal Resource Locator

210.

USB

Universal Serial Bus

211.

UTM

Unified Threat Management

212.

UTP

Unshielded Twisted Pair

213.

VDI

Virtualization Desktop Infrastructure

214.

VLAN

Virtual Local Area Network

215.

VoIP

Voice over IP

216.

VPN

Virtual Private Network

217.

VTC

Video Teleconferencing

218.

WAF

WebApplication Firewall

219.

WAP

Wireless Access Point

220.

WEP

Wired Equivalent Privacy

221.

WIDS

Wireless Intrusion Detection System

222.

WIPS

Wireless Intrusion Prevention System

223.

WPA

Wireless Protected Access

224.

WPA2

WiFi Protected Access 2

225.

WPS

WiFi Protected Setup

226.

WTLS

Wireless TLS

227.

XML

Extensible Markup Language

228.

XSRF

CrossSite Request Forgery

229.

XSS

CrossSite Scripting