Cyber Security Acronyms
Corrective Action Report
CAR
Counter-Mode/CBC-Mac Protocol
CCMP
Closed-circuit television
CCTV
Computer Emergency Response Team
CERT
Challenge Handshake Authentication Protocol
CHAP
Chief Information Officer
CIO
Computer Incident Response Team
CIRT
Continuity of Operation Planning
COOP
Contingency Planning
CP
Cyclical Redundancy Check
CRC
Certification Revocation List
CRL
Control Status Register
CSR
Channel Service Unit
CSU
Chief Technology Officer
CTO
Completely Automated Public Turing Test to Tell Computers and Humans Apart
CAPTCHA
Triple Digital Encryption Standard
3DES - symmetric-key block cipher, which applies the Data Encryption Standard (DES) cipher algorithm 3 times to each data block.
Authentication, Authorization, and Accounting
AAA - provides a way of identifying a user, typically by having the user enter a valid user name and valid password before access is granted (authentication);determines whether the user has the authority to issue such commands(authorization) ;is carried out by logging of session statistics and usage information and is used for authorization control, billing, trend analysis, resource utilization, and capacity planning activities (accounting)
Access Control List
ACL - is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects
Advanced Encryption Standard
AES
Advanced Encryption Standards 256bit
AES256
Authentication Header
AH
Annualized Loss Expectancy
ALE
Access Point
AP
Application Programming Interface
API
Annualized Rate of Occurrence
ARO
Address Resolution Protocol
ARP
Application Service Provider
ASP
Acceptable Use Policy
AUP
Business Availability Center
BAC
Business Continuity Planning
BCP
Business Impact Analysis
BIA
Basic Input / Output System
BIOS
Business Partners Agreement
BPA
Bring Your Own Device
BYOD
Certificate Authority
CA
Common Access Card
CAC
Controller Area Network
CAN
Discretionary Access Control
DAC
Database Administrator
DBA
Distributed Denial of Service
DDOS
Data Execution Prevention
DEP
Digital Encryption Standard
DES
Dynamic Host Configuration Protocol
DHCP
Diffie-Hellman Ephemeral
DHE
Data-Handling Electronics
DHE -
Dynamic Link Library
DLL
Data Loss Prevention
DLP
Demilitarized Zone
DMZ
Destination Network Address Transaction
DNAT
Domain Name Service (Server)
DNS
Denial of Service
DOS
Disaster Recovery Plan
DRP
Digital Signature Algorithm
DSA
Digital Subscriber line
DSL
Data Service Unit
DSU
Extensible Authentication Protocol
EAP
Elliptic Curve Cryptography
ECC
Elliptic Curve Diffie-Hellman Ephemeral
ECDHE
Encrypted File System
EFS
Electromagnetic Interference
EMI
Electronic Serial Number
ESN
Encapsulated Security Payload
ESP
File System Access Control List
FACL
Full Disk Encryption
FDE
File Transfer Protocol
FTP
File Transfer Protocol Secured
FTPS
Gnu Privacy Guard
GPG
Group Policy Object
GPO
Global Positioning System
GPS
Graphic Processing Unit
GPU
Generic Routing Encapsulation
GRE
Hard Disk Drive
HDD
Host Based Intrusion Detection System
HIDS
Host Based Intrusion Prevention System
HIPS
Hashed Message Authentication Code
HMAC
HMAC based One Time Password
HOTP
Hardware Security Module
HSM
HyperText Markup Language
HTML
Hypertext Transfer Protocol
HTTP
Hypertext Transfer Protocol over SSL
HTTPS
Heating, Ventilation Air Conditioning
HVAC
Internet Control Message Protocol
ICMP
Identification
ID
Intrusion Detection System
IDS
Internet Key Exchange
IKE
Instant messaging
IM
Internet Message Access Protocol v4
IMAP4
Internet Protocol
IP
Internet Protocol Security
IPSEC
Incident Response
IR
Internet Relay Chat
IRC
Incident Response Procedure
IRP
Interconnection Security Agreement
ISA
Internet Service Provider
ISP
Information Systems Security Officer
ISSO
IT Contingency Plan
ITCP
Initialization Vector
IV
Infrastructure as a Service
IaaS
Just a Bunch of Disks
JBOD
Key Distribution Center
KDC