Terms and Acronyms Used in Security+
Term |
Acronym |
| Triple Digital Encryption Standard | 3DES |
| Authentication, Authorization and Accounting | AAA |
| Access Control List | ACL |
| Advanced Encryption Standard | AES |
| Advanced Encryption Standards 256-bit | AES256 |
| Authentication Header | AH |
| Annualized Loss Expectancy | ALE |
| Access Point | AP |
| Application Programming Interface | API |
| Advanced Persistent Threat | APT |
| Annualized Rate of Occurrence | ARO |
| Address Resolution Protocol | ARP |
| Address Space Layout Randomization | ASLR |
| Application Service Provider | ASP |
| Acceptable Use Policy | AUP |
| Antivirus | AV |
| Business Availability Center | BAC |
| Business Continuity Planning | BCP |
| Business Impact Analysis | BIA |
| Basic Input/Output System | BIOS |
| Business Partners Agreement | BPA |
| Bridge Protocol Data Unit | BPDU |
| Bring Your Own Device | BYOD |
| Certificate Authority | CA |
| Common Access Card | CAC |
| Controller Area Network | CAN |
| Completely Automated Public Turing test to tell Computers and Humans Apart | CAPTCHA |
| Corrective Action Report | CAR |
| Counter-mode/CBC-MAC Protocol | CCMP |
| Closed-Circuit Television | CCTV |
| Computer Emergency Response Team | CERT |
| Cipher Feedback | CFB |
| Challenge Handshake Authentication Protocol | CHAP |
| Chief Information Officer | CIO |
| Computer Incident Response Team | CIRT |
| Content Management System | CMS |
| Continuity Of Operation Planning | COOP |
| Contingency Planning | CP |
| Cyclical Redundancy Check | CRC |
| Certificate Revocation List | CRL |
| Customer Relationship Management | CRM |
| Chief Security Officer | CSO |
| Cloud Service Provider | CSP |
| Certificate Signing Request | CSR |
| Cross-Site Request Forgery | CSRF |
| Channel Service Unit | CSU |
| Chief Technology Officer | CTO |
| Discretionary Access Control | DAC |
| Database Administrator | DBA |
| Distributed Denial of Service | DDoS |
| Data Execution Prevention | DEP |
| Digital Encryption Standard | DES |
| Dynamic Host Configuration Protocol | DHCP |
| Data-Handling Electronics | DHE |
| Diffie-Hellman Ephemeral | DHE |
| Dynamic Link Library | DLL |
| Data Loss Prevention | DLP |
| Demilitarized Zone | DMZ |
| Destination Network Address Transaction | DNAT |
| Domain Name Service (Server) | DNS |
| Denial of Service | DoS |
| Disaster Recovery Plan | DRP |
| Digital Signature Algorithm | DSA |
| Digital Subscriber Line | DSL |
| Data Service Unit | DSU |
| Extensible Authentication Protocol | EAP |
| Elliptic Curve Cryptography | ECC |
| Elliptic Curve Diffie-Hellman Exchange | ECDHE |
| Elliptic Curve Digital Signature Algorithm | ECDSA |
| Encrypted File System | EFS |
| Electromagnetic Interference | EMI |
| Enterprise Resource Planning | ERP |
| Electronic Serial Number | ESN |
| Encapsulated Security Payload | ESP |
| File system Access Control List | FACL |
| Full Disk Encryption | FDE |
| Fully Qualified Domain Name | FQDN |
| False Rejection Rate | FRR |
| File Transfer Protocol | FTP |
| Secured File Transfer Protocol | FTPS |
| Galois Counter Mode | GCM |
| GNU Privacy Guard | GPG |
| Group Policy Object | GPO |
| Global Positioning System | GPS |
| Graphic Processing Unit | GPU |
| Generic Routing Encapsulation | GRE |
| High Availability | HA |
| Hard Disk Drive | HDD |
| Host-based Intrusion Detection System | HIDS |
| Host-based Intrusion Prevention System | HIPS |
| Hashed Message Authentication Code | HMAC |
| HMAC-based One Time Password | HOTP |
| Hardware Security Module | HSM |
| Hot Standby Router Protocol | HSRP |
| Hypertext Markup Language | HTML |
| Hypertext Transfer Protocol | HTTP |
| Hypertext Transfer Protocol over SSL | HTTPS |
| Heating, Ventilation and Air Conditioning | HVAC |
| Infrastructure as a Service | IaaS |
| Internet Control Message Protocol | ICMP |
| Industrial Control Systems | ICS |
| Identification | ID |
| International Data Encryption Algorithm | IDEA |
| Intermediate Distribution Frame | IDF |
| Identity Provider | IdP |
| Intrusion Detection System | IDS |
| Internet Key Exchange | IKE |
| Instant Messaging | IM |
| Internet Message Access Protocol v4 | IMAP4 |
| Internet of Things | IoT |
| Internet Protocol | IP |
| Internet Protocol Security | IPSec |
| Incident Response | IR |
| Internet Relay Chat | IRC |
| Incident Response Procedure | IRP |
| Interconnection Security Agreement | ISA |
| Internet Service Provider | ISP |
| Information Systems Security Officer | ISSO |
| IT Contingency Plan | ITCP |
| Initialization Vector | IV |
| Just a Bunch Of Disks | JBOD |
| Key Distribution Center | KDC |
| Key Encryption Key | KEK |
| Layer 2 Tunneling Protocol | L2TP |
| Local Area Network | LAN |
| Lightweight Directory Access Protocol | LDAP |
| Lightweight Extensible Authentication Protocol | LEAP |
| Monitoring as a Service | MaaS |
| Mandatory Access Control or Media Access Control | MAC |
| Message Authentication Code | MAC |
| Metropolitan Area Network | MAN |
| Master Boot Record | MBR |
| Message Digest 5 | MD5 |
| Main Distribution Frame | MDF |
| Man-In-The-Middle | MITM |
| Memorandum Of Understanding | MOU |
| Multi-Protocol Layer Switch | MPLS |
| Microsoft Challenge Handshake Authentication Protocol | MSCHAP |
| Mean Time Between Failures | MTBF |
| Mean Time To Recover | MTTR |
| Mean Time To Failure | MTTF |
| Maximum Transmission Unit | MTU |
| Network Access Control | NAC |
| Network Address Translation | NAT |
| Non-Disclosure Agreement | NDA |
| Near Field Communication | NFC |
| Network-based Intrusion Detection System | NIDS |
| Network-based Intrusion Prevention System | NIPS |
| National Institute of Standards and Technology | NIST |
| Network Operating System | NOS |
| New Technology File System | NTFS |
| New Technology LANMAN | NTLM |
| Network Time Protocol | NTP |
| Open Authorization | OAUTH |
| Online Certificate Status Protocol | OCSP |
| Open License Agreement | OLA |
| Operating System | OS |
| Open Vulnerability Assessment Language | OVAL |
| Peer to Peer | P2P |
| Proxy Auto Configuration | PAC |
| Pluggable Authentication Modules | PAM |
| Password Authentication Protocol | PAP |
| Port Address Translation | PAT |
| Password-Based Key Derivation Function 2 | PBKDF2 |
| Private Branch Exchange | PBX |
| Packet Capture | PCAP |
| Protected Extensible Authentication Protocol | PEAP |
| Personal Electronic Device | PED |
| Perfect Forward Secrecy | PFS |
| Pretty Good Privacy | PGP |
| Personally Identifiable Information | PII |
| Personal Identity Verification | PIV |
| Public Key Infrastructure | PKI |
| Plain Old Telephone Service | POTS |
| Point-to-Point Protocol | PPP |
| Point-to-Point Tunneling Protocol | PPTP |
| Pre-Shared Key | PSK |
| Pan-Tilt-Zoom | PTZ |
| Recovery Agent | RA |
| Registration Authority | RA |
| Rapid Application Development | RAD |
| Remote Authentication Dial-In User Server | RADIUS |
| Redundant Array of Inexpensive Disks | RAID |
| Remote Access Server | RAS |
| Role-Based Access Control | RBAC |
| Rule-Based Access Control | RBAC |
| RSA Variable Key Size Encryption Algorithm | RC4 |
| Remote Desktop Protocol | RDP |
| Integrity Primitives Evaluation Message Digest | RIPEMD RACE |
| Return On Investment | ROI |
| Recovery Point Objective | RPO |
| Rivest, Shamir and Adleman | RSA |
| Remote Triggered Black Hole | RTBH |
| Recovery Time Objective | RTO |
| Real-time Transport Protocol | RTP |
| Secure/Multipurpose Internet Mail Extensions | S/MIME |
| Security Assertions Markup Language | SAML |
| Software as a Service | SaaS |
| Storage Area Network | SAN |
| System Control and Data Acquisition | SCADA |
| Security Content Automation Protocol | SCAP |
| Simple Certificate Enrollment Protocol | SCEP |
| Small Computer System Interface | SCSI |
| Software Development Life Cycle | SDLC |
| Software Development Life Cycle Methodology | SDLM |
| Structured Exception Handler | SEH |
| Secure Hashing Algorithm | SHA |
| Secured File Transfer Protocol | SFTP |
| Secure Hypertext Transfer Protocol | SHTTP |
| Security Information and Event Management | SIEM |
| Subscriber Identity Module | SIM |
| Service Level Agreement | SLA |
| Single Loss Expectancy | SLE |
| Short Message Service | SMS |
| Simple Mail Transfer Protocol | SMTP |
| Simple Mail Transfer Protocol Secure | SMTPS |
| Simple Network Management Protocol | SNMP |
| Simple Object Access Protocol | SOAP |
| Synchronous Optical Network Technologies | SONET |
| Spam over Internet Messaging | SPIM |
| Structured Query Language | SQL |
| Solid State Drive | SSD |
| Secure Shell | SSH |
| Secure Sockets Layer | SSL |
| Single Sign-On | SSO |
| Shielded Twisted Pair or Spanning Tree Protocol | STP |
| Terminal Access Controller Access Control System Plus | TACACS+ |
| Transmission Control Protocol/Internet Protocol | TCP/IP |
| Trivial File Transfer Protocol | TFTP |
| Ticket Granting Ticket | TGT |
| Temporal Key Integrity Protocol | TKIP |
| Transport Layer Security | TLS |
| Time-based One-Time Password | TOTP |
| Trusted Platform Module | TPM |
| Transaction Signature | TSIG |
| User Acceptance Testing | UAT |
| Unified Extensible Firmware Interface | UEFI |
| User Datagram Protocol | UDP |
| Uninterruptable Power Supply | UPS |
| Uniform Resource Identifier | URI |
| L Universal Resource Locator | UR |
| Universal Serial Bus | USB |
| Unified Threat Management | UTM |
| Unshielded Twisted Pair | UTP |
| Virtualization Desktop Infrastructure | VDI |
| Virtual Local Area Network | VLAN |
| Variable Length Subnet Masking | VLSM |
| Virtual Machine | VM |
| Voice over IP | VoIP |
| Virtual Private Network | VPN |
| Video Teleconferencing | VTC |
| Web-Application Firewall | WAF |
| Wireless Access Point | WAP |
| Wired Equivalent Privacy | WEP |
| Wireless Intrusion Detection System | WIDS |
| Wireless Intrusion Prevention System | WIPS |
| WiFi Protected Access | WPA |
| WiFi Protected Access 2 | WPA2 |
| WiFi Protected Setup | WPS |
| Wireless TLS | WTLS |
| Extensible Markup Language | XML |
| Cross-Site Request Forgery | XSRF |
| Cross-Site Scripting | XSS |
References
CompTIA Security+ Certification Exam Objectives
