Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Security+ Acronyms Cheat Sheet

Security+ Acronyms Cheat Sheet



|Views: 1,629 |Likes:
Published by Steven Swafford
Security+ Acronyms Cheat Sheet
Security+ Acronyms Cheat Sheet

More info:

Published by: Steven Swafford on Sep 24, 2012
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





3DES Triple Digital Encryption StandardAAAAuthentication, Authorization, andAccountingACL Access Control ListAES Advanced Encryption StandardAES256Advanced Encryption Standards256bitAH Authentication HeaderALE Annualized Loss ExpectancyAP Access PointARO Annualized Rate of OccurrenceARP Address Resolution ProtocolAUP Acceptable Use PolicyBCP Business Continuity PlanningBIOS Basic Input / Output SystemBOTS Network RobotsCA Certificate AuthorityCAC Common Access CardCAN Controller Area NetworkCCMP Counter-Mode/CBC-Mac ProtocolCCTV Closed-circuit televisionCERT Computer Emergency Response TeamCHAPChallenge Handshake AuthenticationProtocolCIRT Computer Incident Response TeamCRC Cyclical Redundancy CheckCRL Certification Revocation ListDAC Discretionary Access ControlDDOS Distributed Denial of ServiceDEP Data Execution PreventionDES Digital Encryption StandardDHCP Dynamic Host Configuration ProtocolDLL Dynamic Link LibraryDLP Data Loss PreventionDMZ Demilitarized ZoneDNS Domain Name Service (Server)DOS Denial of ServiceDRP Disaster Recovery PlanDSA Digital Signature AlgorithmEAP Extensible Authentication ProtocolECC Elliptic Curve CryptographyEFS Encrypted File SystemEMI Electromagnetic InterferenceESP Encapsulated Security PayloadFTP File Transfer ProtocolGPU Graphic Processing UnitGRE Generic Routing EncapsulationHDD Hard Disk DriveHIDSHost Based Intrusion DetectionSystemHIPSHost Based Intrusion PreventionSystemHMAC Hashed Message Authentication CodeHSM Hardware Security ModuleHTTP Hypertext Transfer ProtocolHTTPS Hypertext Transfer Protocol (SSL)HVAC Heating, Ventilation Air ConditioningIaaS Infrastructure as a ServiceICMP Internet Control Message ProtocolID IdentificationIKE Internet Key ExchangeIM Instant messagingIMAP4 Internet Message Access Protocol v4IP Internet ProtocolIPSEC Internet Protocol SecurityIRC Internet Relay ChatISP Internet Service ProviderIV Initialization VectorKDC Key Distribution CenterL2TP Layer 2 Tunneling ProtocolLANMAN Local Area Network ManagerLDAP Lightweight Directory Access ProtocolLEAPLightweight Extensible AuthenticationProtocolMAC Mandatory Access Control / MediaAccess ControlMAC Message Authentication CodeMAN Metropolitan Area NetworkMBR Master Boot RecordMD5 Message Digest 5MSCHAPMicrosoft Challenge HandshakeAuthenticationProtocolMTU Maximum Transmission UnitNAC Network Access ControlNAT Network Address TranslationNIDSNetwork Based Intrusion DetectionSystemNIPSNetwork Based Intrusion PreventionSystemNISTNational Institute of Standards &TechnologyNOS Network Operating SystemNTFS New Technology File SystemNTLM New Technology LANMANNTP Network Time Protocol

Activity (3)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->