Acronyms
The following is a list of acronyms that appear on the CompTIA Security+ exam. I've made a flashcard set on quizlet to go with these: https://quizlet.com/_919uvm?x=1jqt&i=2z4u5u
  • 3DES - Triple Digital Encryption Standard
  • AAA - Authentication, Authorization, and Accounting
  • ABAC - Attribute-based Access Control
  • ACE - Access Control Entry
  • ACL - Access Control List
  • AES - Advanced Encryption Standard
  • AES256 - Advanced Encryption Standard 256bit
  • AH - Authentication Header
  • ALE - Annualized Loss Expectancy
  • AP - Access Point
  • API - Application Programming Interface
  • APT - Advanced Persistent Threat
  • ARO - Annualized Rate of Occurrence
  • ARP - Address Resolution Protocol
  • ASLR - Address Space Layout Randomization
  • ASP - Application Service Provider
  • AUP - Acceptable Use Policy
  • AV - AntiVirus
  • AV - Asset Value
  • BAC - Business Availability Center
  • BCP - Business Continuity Planning
  • BIA - Business Impact Analysis
  • BIOS - Basic Input/Output System
  • BPA - Business Partners Agreement
  • BPDU - Bridge Protocol Data Unit
  • BYOD - Bring Your Own Device
  • CA - Certificate Authority
  • CAC - Common Access Card
  • CAN - Controller Area Network
  • CAPTCHA - Completely Automated Public Turing Test to Tell Computers and Humans Apart
  • CAR - Corrective Action Report
  • CBC - Cipher Block Chaining
  • CCMP - Counter-Mode / CBC-Mac Protocol
  • CCTV - Closed Circuit Television
  • CER - Canonical Encoding Rules
  • CER - Certificate
  • CER - Cross-Over Error Rate
  • CERT - Computer Emergency Response Team
  • CFB - Cipher Feedback
  • CHAP - Challenge Handshake Authentication Protocol
  • CIO - Chief Information Officer
  • CIRT - Computer Incident Response Team
  • CMS - Content Management Systems
  • CoOP - Continuity of Operations Plan
  • COPE - Corporate Owned, Personally Enabled
  • CP - Contingency Planning
  • CRC - Cyclical Redundancy Check
  • CRL - Certificate Revocation List
  • CSIRT - Computer Security Incident Response Team
  • CSO - Chief Security Officer
  • CSP - Cloud Service Provider
  • CSR - Certificate Signing Request
  • CSRF - Cross-Site Request Forgery
  • CSU - Channel Service Unit
  • CTM - Counter-Mode
  • CTO - Chief Technology Officer
  • CTR - Counter
  • CYOD - Choose Your Own Device
  • DAC - Discretionary Access Control
  • DACL - Discretionary Access Control List
  • DBA - Database Administrator
  • DCL - Data Control Language
  • DDoS - Distributed Denial of Service
  • DEP - Data Execution Prevention
  • DER - Distinguished Encoding Rules
  • DES - Digital Encryption Standard
  • DFIR - Digital Forensics and Investigation Response
  • DHCP - Dynamic Host Configuration Protocol
  • DHE - Data-Handling Electronics
  • DHE - Diffie-Hellman Ephemeral
  • DIT - Directory Information Tree
  • DLL - Dynamic Link Library
  • DLP - Data Loss Prevention
  • DMZ - Dimilitarized Zone
  • DNAT - Destination Network Address Transaction
  • DNS - Domain Name Service/Server/System
  • DoS - Denial of Service
  • DRP - Disaster Recovery Plan
  • DSA - Digital Signature Algorithm
  • DSL - Digital Subscriber Line
  • DSU - Data Service Unit
  • EAP - Extensible Authentication Protocol
  • ECB - Electronic Code Book
  • ECC - Elliptical Curve Cryptography
  • ECDHE - Elliptical Curve Diffie-Hellman Ephemeral
  • ECDSA - Elliptical Curve Digital Signature Algorithm
  • EFS - Encrypted File System
  • EMI - Electromagnetic Interference
  • EMP - Electromagnetic Pulse
  • ERP - Enterprise Resource Planning
  • ESN - Electronic Serial Number
  • ESP - Encapsulated Security Payload
  • EF - Exposure Factor
  • FACL - File System Access Control List
  • FAR - False Acceptance Rate
  • FDE - Full Disk Encryption
  • FRR - False Rejection Rate
  • FTP - File Transfer Protocol
  • FTPS - Secured Filed Transfer Protocol
  • GCM - Galois Counter Mode
  • GPG - GNU Privacy Guard
  • GPO - Group Policy Object
  • GPS - Global Positioning Unit
  • GRE - Generic Routing Encapsulation
  • HA - High Availability
  • HDD - Hard Disk Drive
  • HIDS - Host-based Intrusion Detection System
  • HIPS - Host-based Intrusion Prevention System
  • HMAC - Hashed Message Authentication Code
  • HOTP - HMAC-based One-Time Password
  • HSM - Hardware Security Module
  • HTML - Hypertext Markup Language
  • HTTP - Hypertext Transfer Protocol
  • HTTPS - Hypertext Transfer Protocol over SSL/TLS
  • HVAC - Heating, Ventilation, and Air Conditioning
  • IaaS - Infrastructure as a Service
  • ICMP - Internet Control Message Protocol
  • ICS - Industrial Control Systems
  • ID - Identification
  • IDEA - International Data Encryption Algorithm
  • IDF - intermediate Distribution Frame
  • IDP - Identity Provider
  • IDS - Intrusion Detection System
  • IEEE - Institute of Electrical and Electronic Engineers
  • IIS - Internet Information System
  • IKE - Internet Key Exchange
  • IM - Instant Messaging
  • IMAP4 - Internet Message Access Protocol v4
  • IoT - Internet of Things
  • IP - Internet Protocol
  • IPSec - Internet Protocol Security
  • IR - Incident Response
  • IR - Infrared
  • IRC - Internet Relay Chat
  • IRP - Incident Response Plan
  • ISA - Interconnection Security Agreement
  • ISP - Internet Service Provider
  • ISSO - Information Systems Security Officer
  • ITCP - IT Contingency Plan
  • IV - Initialization Vector
  • KDC - Key Distribution Center
  • KEK - Key Encryption Key
  • L2TP - Layer 2 Tunneling Protocol
  • LAN - Local Area Network
  • LDAP - Lightweight Directory Access Protocol
  • LEAP - Lightweight Extensible Authentication Protocol
  • MaaS - Monitoring as a Service
  • MAC - Mandatory Access Control
  • MAC - Media Access Control
  • MAC - Message Authentication Code
  • MAN - Metropolitan Area Network
  • MBR - Master Boot Record
  • MD5 - Message Digest 5
  • MDF - Main Distribution Frame
  • MDM - Mobile Device Management
  • MFA - Multi-Factor Authentication
  • MFD - Multi-Function Device
  • MitM - Man-in-the-Middle
  • MMS - Multimedia Message Service
  • MOA - Memorandum of Agreement
  • MOU - Memorandum of Understanding
  • MPLS - Multi-Protocol Label Switching
  • MSCHAP - Microsoft Challenge Handshake Authentication Protocol
  • MSP - Managed Service Provider
  • MTBF - Mean Time Between Failures
  • MTTF - Mean Time to Failures
  • MTTR - Mean Time to Recover/Repair/Restore
  • MTU - Maximum Transmission Unit
  • NAC - Network Access Control
  • NAT - Network Address Translation
  • NDA - Non-Disclosure Agreement
  • NFC - Near Field Communication
  • NGAC - Next Generation Access Control
  • NIDS - Network-Based Intrusion Detection System
  • NIPS - Network-Based Intrusion Prevention System
  • NIST - National Institute of Standards & Technology
  • NTFS - New Technology File System
  • NTLM - New Technology LAN Manager
  • NTP - Network Time Protocol
  • OAUTH - Open Authorization
  • OCSP - Online Certificate Status Protocol
  • OID - Object Identifier
  • OS - Operating System
  • OTA - Over the Air
  • OVAL - Open Vulnerability Assessment Language
  • P12 - PKCS #12
  • P2P - Peer to Peer
  • PaaS - Platform as a Service
  • PAC - Proxy Auto Configuration
  • PAM - Pluggable Authentication Modules
  • PAP - Password Authentication Protocol
  • PAT - Port Address Translation
  • PBKDF2 - Password-Based Key Derivation Function 2
  • PBX - Private Branch Exchange
  • PCAP - Packet Capture
  • PEAP - Protected Extensible Authentication protocol
  • PED - Personal Electronic Device
  • PEM - Privacy-enhanced Electronic Mail
  • PFS - Perfect Forward Secrecy
  • PFX - Personal Exchange Format
  • PGP - Pretty Good Privacy
  • PHI - Personal Health Information
  • PII - Personally Identifiable Information
  • PIV - Personal Identity Verification
  • PKI - Public Key Infrastructure
  • POODLE - Padding Oracle on Downgrade Legacy Encryption
  • POP - Post Office Protocol
  • POTS - Plain Old Telephone Service
  • PPP - Point-to-Point Protocol
  • PPTP - Point-to-Point Tunneling Protocol
  • PRNG - Psuedo Random Number Generator
  • PSK - Pre-Shared Key
  • PTZ - Pan-Tilt-Zoom
  • RA - Recovery Agent
  • RA - Registration Authority
  • RAD - Rapid Application Development
  • RADIUS - Remote Authentication Dial-In User Server
  • RAID - Redundant Array of Inexpensive Disks
  • RAS - Remote Access Server
  • RAT - Remote Access Trojan
  • RBAC - Role-Based Access Control
  • RBAC - Rule-Based Access Control
  • RC4 - Rivest Cipher v4
  • RDP - Remote Desktop Protocol
  • RFID - Radio Frequency Identifier
  • RIPEMD - RACE Integrity Primitives Evaluation Message Digest
  • ROI - Return on Investment
  • RMF - Risk Management Framework
  • RPO - Recovery Point Objective
  • RSA - Rivest, Shamir, & Adleman
  • RTBH - Remotely Triggered Black Hole
  • RTO - Recovery Time Object
  • RTOS - Real-Time Operating Systems
  • RTP - Real-time Transport Protocol
  • S/MIME - Secure/Multipurpose Internet Mail Extensions
  • SaaS - Software as a Service
  • SAML - Security Assertions Markup Language
  • SAN - Storage Area Network
  • SAN - Subject Alternative Name
  • SCADA - System Control and Data Acquisition
  • SCAP - Security Content Automation Protocol
  • SCEP - Simple Certificate Enrollment Protocol
  • SCP - Secure Copy
  • SCSI - Small Computer System Interface
  • SDK - Software Development Kit
  • SDLC - Software Development Life Cycle
  • SDLM - Software Development Life Cycle Methodology
  • SDN - Software Defined Network
  • SED - Self-Encrypting Device
  • SEH - Structured Exception Handler
  • SFTP - Secured File Transfer Protocol
  • SHA - Secure Hashing Algorithm
  • SHTTP - Secure Hypertext Transfer Protocol
  • SIEM - Secure Information and Event Management
  • SIM - Subscriber Identity Module
  • SLA - Service Level Agreement
  • SLE - Single Loss Expectancy
  • SMB - Server Message Block
  • SMS - Short Message Service
  • SMTP - Simple Mail Transfer Protocol
  • SMTPS - Simple Mail Transfer Protocol Secure
  • SNMP - Simple Network Management Protocol
  • SOAP - Simple Object Access Protocol
  • SoC - System on a Chip
  • SPF - Sender Policy Framework
  • SPIM - Spam over Internet Messaging
  • SPoF - Single Point of Failure
  • SQL - Structured Query Language
  • SRTP - Secure Real-Time Protocol
  • SSD - Solid State Drive
  • SSH - Secure Shell
  • SSID - Service Set Identifier
  • SSL - Secure Sockets Layer
  • SSO - Single Sign-On
  • STP - Shielded Twisted Pair
  • TACACS+ - Terminal Access Controller Access Control System Plus
  • TCP/IP - Transmission Control Protocol/Internet Protocol
  • TGT - Ticket Granting Ticket
  • TKIP - Temporal Key Integrity Protocol
  • TLS - Transport Layer Security
  • TOTP - Time-based One-Time Password
  • TPM - Trusted Platform Module
  • TSIG - Transaction Signature
  • UAT - User Acceptance Testing
  • UAV - Unmanned Aerial Vehicle
  • UDP - User Datagram Protocol
  • UEFI - Unified Extensible Firmware Interface
  • UPS - Uninterruptable Power Supply
  • URI - Uniform Resource Identifier
  • URL - Universal Resource Locator
  • USB - Universal Serial Bus
  • USB OTG - USB On-the-Go
  • UTM - Unified Threat Management
  • UTP - Unshielded Twisted Pair
  • VDE - Virtual Desktop Environment
  • VDI - Virtual Desktop Infrastructure
  • VLAN - Virtual Local Area Network
  • VLSM - Variable Length Subnet Masking
  • VM - Virtual Machine
  • VoIP - Voice Over IP
  • VPN - Virtual Private Network
  • VTC - Video Teleconferencing
  • WAF - Web Application Firewall
  • WAP - Wireless Access Point
  • WEP - Wired Equivalent Privacy
  • WIDS - Wireless Intrusion Detection System
  • WIPS - Wireless Intrusion Prevention System
  • WORM - Write Once, Read Many
  • WPA - WiFi Protected Access
  • WPA2 - WiFi Protected Access 2
  • WPS - WiFi Protected Setup
  • WTLS - Wireless TLS
  • XML - Extensible Markup Language
  • XOR - Exclusive Or
  • XSRF - Cross-Site Request Forgery
  • XSS - Cross-Site Scripting
Last modified 1yr ago
Copy link