The following is a list of acronyms that appear on the CompTIA Security+ exam. I've made a flashcard set on quizlet to go with these: https://quizlet.com/_919uvm?x=1jqt&i=2z4u5u​
3DES - Triple Digital Encryption Standard
AAA - Authentication, Authorization, and Accounting
ABAC - Attribute-based Access Control
ACE - Access Control Entry
ACL - Access Control List
AES - Advanced Encryption Standard
AES256 - Advanced Encryption Standard 256bit
AH - Authentication Header
ALE - Annualized Loss Expectancy
AP - Access Point
API - Application Programming Interface
APT - Advanced Persistent Threat
ARO - Annualized Rate of Occurrence
ARP - Address Resolution Protocol
ASLR - Address Space Layout Randomization
ASP - Application Service Provider
AUP - Acceptable Use Policy
AV - AntiVirus
AV - Asset Value
BAC - Business Availability Center
BCP - Business Continuity Planning
BIA - Business Impact Analysis
BIOS - Basic Input/Output System
BPA - Business Partners Agreement
BPDU - Bridge Protocol Data Unit
BYOD - Bring Your Own Device
CA - Certificate Authority
CAC - Common Access Card
CAN - Controller Area Network
CAPTCHA - Completely Automated Public Turing Test to Tell Computers and Humans Apart
CAR - Corrective Action Report
CBC - Cipher Block Chaining
CCMP - Counter-Mode / CBC-Mac Protocol
CCTV - Closed Circuit Television
CER - Canonical Encoding Rules
CER - Certificate
CER - Cross-Over Error Rate
CERT - Computer Emergency Response Team
CFB - Cipher Feedback
CHAP - Challenge Handshake Authentication Protocol
CIO - Chief Information Officer
CIRT - Computer Incident Response Team
CMS - Content Management Systems
CoOP - Continuity of Operations Plan
COPE - Corporate Owned, Personally Enabled
CP - Contingency Planning
CRC - Cyclical Redundancy Check
CRL - Certificate Revocation List
CSIRT - Computer Security Incident Response Team
CSO - Chief Security Officer
CSP - Cloud Service Provider
CSR - Certificate Signing Request
CSRF - Cross-Site Request Forgery
CSU - Channel Service Unit
CTM - Counter-Mode
CTO - Chief Technology Officer
CTR - Counter
CYOD - Choose Your Own Device
DAC - Discretionary Access Control
DACL - Discretionary Access Control List
DBA - Database Administrator
DCL - Data Control Language
DDoS - Distributed Denial of Service
DEP - Data Execution Prevention
DER - Distinguished Encoding Rules
DES - Digital Encryption Standard
DFIR - Digital Forensics and Investigation Response
DHCP - Dynamic Host Configuration Protocol
DHE - Data-Handling Electronics
DHE - Diffie-Hellman Ephemeral
DIT - Directory Information Tree
DLL - Dynamic Link Library
DLP - Data Loss Prevention
DMZ - Dimilitarized Zone
DNAT - Destination Network Address Transaction
DNS - Domain Name Service/Server/System
DoS - Denial of Service
DRP - Disaster Recovery Plan
DSA - Digital Signature Algorithm
DSL - Digital Subscriber Line
DSU - Data Service Unit
EAP - Extensible Authentication Protocol
ECB - Electronic Code Book
ECC - Elliptical Curve Cryptography
ECDHE - Elliptical Curve Diffie-Hellman Ephemeral
ECDSA - Elliptical Curve Digital Signature Algorithm
EFS - Encrypted File System
EMI - Electromagnetic Interference
EMP - Electromagnetic Pulse
ERP - Enterprise Resource Planning
ESN - Electronic Serial Number
ESP - Encapsulated Security Payload
EF - Exposure Factor
FACL - File System Access Control List
FAR - False Acceptance Rate
FDE - Full Disk Encryption
FRR - False Rejection Rate
FTP - File Transfer Protocol
FTPS - Secured Filed Transfer Protocol
GCM - Galois Counter Mode
GPG - GNU Privacy Guard
GPO - Group Policy Object
GPS - Global Positioning Unit
GRE - Generic Routing Encapsulation
HA - High Availability
HDD - Hard Disk Drive
HIDS - Host-based Intrusion Detection System
HIPS - Host-based Intrusion Prevention System
HMAC - Hashed Message Authentication Code
HOTP - HMAC-based One-Time Password
HSM - Hardware Security Module
HTML - Hypertext Markup Language
HTTP - Hypertext Transfer Protocol
HTTPS - Hypertext Transfer Protocol over SSL/TLS
HVAC - Heating, Ventilation, and Air Conditioning
IaaS - Infrastructure as a Service
ICMP - Internet Control Message Protocol
ICS - Industrial Control Systems
ID - Identification
IDEA - International Data Encryption Algorithm
IDF - intermediate Distribution Frame
IDP - Identity Provider
IDS - Intrusion Detection System
IEEE - Institute of Electrical and Electronic Engineers
IIS - Internet Information System
IKE - Internet Key Exchange
IM - Instant Messaging
IMAP4 - Internet Message Access Protocol v4
IoT - Internet of Things
IP - Internet Protocol
IPSec - Internet Protocol Security
IR - Incident Response
IR - Infrared
IRC - Internet Relay Chat
IRP - Incident Response Plan
ISA - Interconnection Security Agreement
ISP - Internet Service Provider
ISSO - Information Systems Security Officer
ITCP - IT Contingency Plan
IV - Initialization Vector
KDC - Key Distribution Center
KEK - Key Encryption Key
L2TP - Layer 2 Tunneling Protocol
LAN - Local Area Network
LDAP - Lightweight Directory Access Protocol
LEAP - Lightweight Extensible Authentication Protocol
MaaS - Monitoring as a Service
MAC - Mandatory Access Control
MAC - Media Access Control
MAC - Message Authentication Code
MAN - Metropolitan Area Network
MBR - Master Boot Record
MD5 - Message Digest 5
MDF - Main Distribution Frame
MDM - Mobile Device Management
MFA - Multi-Factor Authentication
MFD - Multi-Function Device
MitM - Man-in-the-Middle
MMS - Multimedia Message Service
MOA - Memorandum of Agreement
MOU - Memorandum of Understanding
MPLS - Multi-Protocol Label Switching
MSCHAP - Microsoft Challenge Handshake Authentication Protocol
MSP - Managed Service Provider
MTBF - Mean Time Between Failures
MTTF - Mean Time to Failures
MTTR - Mean Time to Recover/Repair/Restore
MTU - Maximum Transmission Unit
NAC - Network Access Control
NAT - Network Address Translation
NDA - Non-Disclosure Agreement
NFC - Near Field Communication
NGAC - Next Generation Access Control
NIDS - Network-Based Intrusion Detection System
NIPS - Network-Based Intrusion Prevention System
NIST - National Institute of Standards & Technology
NTFS - New Technology File System
NTLM - New Technology LAN Manager
NTP - Network Time Protocol
OAUTH - Open Authorization
OCSP - Online Certificate Status Protocol
OID - Object Identifier
OS - Operating System
OTA - Over the Air
OVAL - Open Vulnerability Assessment Language
P12 - PKCS #12
P2P - Peer to Peer
PaaS - Platform as a Service
PAC - Proxy Auto Configuration
PAM - Pluggable Authentication Modules
PAP - Password Authentication Protocol
PAT - Port Address Translation
PBKDF2 - Password-Based Key Derivation Function 2
PBX - Private Branch Exchange
PCAP - Packet Capture
PEAP - Protected Extensible Authentication protocol
PED - Personal Electronic Device
PEM - Privacy-enhanced Electronic Mail
PFS - Perfect Forward Secrecy
PFX - Personal Exchange Format
PGP - Pretty Good Privacy
PHI - Personal Health Information
PII - Personally Identifiable Information
PIV - Personal Identity Verification
PKI - Public Key Infrastructure
POODLE - Padding Oracle on Downgrade Legacy Encryption
POP - Post Office Protocol
POTS - Plain Old Telephone Service
PPP - Point-to-Point Protocol
PPTP - Point-to-Point Tunneling Protocol
PRNG - Psuedo Random Number Generator
PSK - Pre-Shared Key
PTZ - Pan-Tilt-Zoom
RA - Recovery Agent
RA - Registration Authority
RAD - Rapid Application Development
RADIUS - Remote Authentication Dial-In User Server
RAID - Redundant Array of Inexpensive Disks
RAS - Remote Access Server
RAT - Remote Access Trojan
RBAC - Role-Based Access Control
RBAC - Rule-Based Access Control
RC4 - Rivest Cipher v4
RDP - Remote Desktop Protocol
RFID - Radio Frequency Identifier
RIPEMD - RACE Integrity Primitives Evaluation Message Digest
ROI - Return on Investment
RMF - Risk Management Framework
RPO - Recovery Point Objective
RSA - Rivest, Shamir, & Adleman
RTBH - Remotely Triggered Black Hole
RTO - Recovery Time Object
RTOS - Real-Time Operating Systems
RTP - Real-time Transport Protocol
S/MIME - Secure/Multipurpose Internet Mail Extensions
SaaS - Software as a Service
SAML - Security Assertions Markup Language
SAN - Storage Area Network
SAN - Subject Alternative Name
SCADA - System Control and Data Acquisition
SCAP - Security Content Automation Protocol
SCEP - Simple Certificate Enrollment Protocol
SCP - Secure Copy
SCSI - Small Computer System Interface
SDK - Software Development Kit
SDLC - Software Development Life Cycle
SDLM - Software Development Life Cycle Methodology
SDN - Software Defined Network
SED - Self-Encrypting Device
SEH - Structured Exception Handler
SFTP - Secured File Transfer Protocol
SHA - Secure Hashing Algorithm
SHTTP - Secure Hypertext Transfer Protocol
SIEM - Secure Information and Event Management
SIM - Subscriber Identity Module
SLA - Service Level Agreement
SLE - Single Loss Expectancy
SMB - Server Message Block
SMS - Short Message Service
SMTP - Simple Mail Transfer Protocol
SMTPS - Simple Mail Transfer Protocol Secure
SNMP - Simple Network Management Protocol
SOAP - Simple Object Access Protocol
SoC - System on a Chip
SPF - Sender Policy Framework
SPIM - Spam over Internet Messaging
SPoF - Single Point of Failure
SQL - Structured Query Language
SRTP - Secure Real-Time Protocol
SSD - Solid State Drive
SSH - Secure Shell
SSID - Service Set Identifier
SSL - Secure Sockets Layer
SSO - Single Sign-On
STP - Shielded Twisted Pair
TACACS+ - Terminal Access Controller Access Control System Plus
TCP/IP - Transmission Control Protocol/Internet Protocol
TGT - Ticket Granting Ticket
TKIP - Temporal Key Integrity Protocol
TLS - Transport Layer Security
TOTP - Time-based One-Time Password
TPM - Trusted Platform Module
TSIG - Transaction Signature
UAT - User Acceptance Testing
UAV - Unmanned Aerial Vehicle
UDP - User Datagram Protocol
UEFI - Unified Extensible Firmware Interface
UPS - Uninterruptable Power Supply
URI - Uniform Resource Identifier
URL - Universal Resource Locator
USB - Universal Serial Bus
USB OTG - USB On-the-Go
UTM - Unified Threat Management
UTP - Unshielded Twisted Pair
VDE - Virtual Desktop Environment
VDI - Virtual Desktop Infrastructure
VLAN - Virtual Local Area Network
VLSM - Variable Length Subnet Masking
VM - Virtual Machine
VoIP - Voice Over IP
VPN - Virtual Private Network
VTC - Video Teleconferencing
WAF - Web Application Firewall
WAP - Wireless Access Point
WEP - Wired Equivalent Privacy
WIDS - Wireless Intrusion Detection System
WIPS - Wireless Intrusion Prevention System
WORM - Write Once, Read Many
WPA - WiFi Protected Access
WPA2 - WiFi Protected Access 2
WPS - WiFi Protected Setup
WTLS - Wireless TLS
XML - Extensible Markup Language
XOR - Exclusive Or
XSRF - Cross-Site Request Forgery
XSS - Cross-Site Scripting