HomeAcronym Glossary

Acronym Glossary

#

3DES (Triple Digital Encryption Standard)

*aaS

BPaaS (Business Process as a Service)
CaaS (Communication as a Service)
CaaS (Compute as a Service)
DaaS (Desktop as a Service)
DBaaS (Database as a Service)
DRaaS (Disaster Recovery as a Service)
IaaS (Infrastructure as a Service)
IDaaS (Identity as a Service)
MaaS (Mobility as a Service)
MaaS (Monitoring as a Service)
NaaS (Network as a Service)
PaaS (Platform as a Service)
SaaS (Software as a Service)
SECaaS (Security as a Service)

A

A Record (Address Record)
AAAA Record (Quad-Address Record)
AAA Protocol (Authentication, Authorization, Accounting)
AAAA Protocol (Authentication, Authorization, Accounting, and Auditing)
ABAC (Attribute-Based Access Control)
ACD (Automatic Call Distributor)
ACL (Access Control List)
ACPI (Advanced Configuration and Power Interface)
AD (Active Directory)
ADK (Assessment and Deployment Kit)
ADSL (Asymmetric Digital Subscriber Line)
AES (Advanced Encryption Standard)
AES256 (Advanced Encryption Standard 256bit)
AFP (Apple Filing Protocol)
AFRM (Accelerated Financial Reporting Management)
AGP (Accelerated Graphics Port)
AH (Authentication Header)
AIT (Advanced Intelligent Tape)
AJAX (Asynchronous JavaScript and XML)
ALE (Annualized Loss Expectancy)
ALU (Arithmetic Logic Unit)
AMD-V (AMD Virtualization)
AMQP (Advanced Message Queuing Protocol)
ANSI (American National Standards Institute)
ANT (Adaptive Network Topology)
AP (Access Point)
AP (Accounts Payable)
APAC (Asia Pacific)
APC (Angle Polished Connector)
API (Application Programming Interface)
APIPA (Automatic Private IP Addressing)
APK (Android Application Package)
APM (Advanced Power Management)
APM (Application Performance Management)
APT (Advanced Package Tool)
APT (Advanced Persistent Threat)
AR (Augmented Reality)
ARM (Advanced RISC Machine)
ARO (Annualized Rate of Occurrence)
ARP (Address Resolution Protocol)
AS (Autonomous System)
ASCII (American Standard Code for Information Interchange)
ASIC (Application-Specific Integrated Circuit)
ASLR (Address Space Layout Randomization)
ASP (Active Server Page)
ASP (Application Service Provider)
ASR (Automated System Recovery)
ATM (Asynchronous Transfer Mode)
ATS (Automatic Transfer Switch)
AUP (Acceptable Use Policy)
AUTO-MDIX (Automatic Medium-Dependent Interface Crossover)
AV (Antivirus)
AV (Asset Value)
AWG (American Wire Gauge)

B

BAC (Business Availability Center)
BASH (Bourne Again Shell)
BBWC (Battery-Backed Write Cache)
BCP (Business Continuity Planning)
BEC (Business Email Compromise)
BERT (Bit-Error Rate Tester)
BGP (Border Gateway Protocol)
BIA (Burned-In Address)
BIA (Business Impact Analysis)
BIND (Berkley Internet Name Domain)
BIOS (Basic Input Output System)
BLE (Bluetooth Low Energy)
BLOB (Binary Large Object)
BMP (Bitmap File Format)
BMR (Bare-Metal Restore)
BNC (Bayonet Niell-Concelman Connector)
BOOTP (Bootstrap Protocol)
BORSCHT (Telecommunications Functions)
BPA (Business Partners Agreement)
BPDU (Bridge Protocol Data Unit)
BRI (Basic Rate Interface)
BRS (Backup Rotation Scheme)
BSB (Back-Side Bus)
BSoD (Blue Screen of Death)
BSSID (Basic Service Set Identifier)
BYOD (Bring Your Own Device)

C

CA (Certificate Authority)
CAB (Change Advisory Board)
CAC (Common Access Card)
CAD (Computer Aided Design)
CAL (Client Access Licenses)
CAM (Content-Addressable Memory)
CAM (Computer Aided Manufacturing)
CAN (Campus Area Network)
CAN (Controller Area Network)
CAPEX (Capital Expenditure)
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
CAR (Corrective Action Report)
CARP (Common Address Redundancy Protocol)
CAS (Central Authentication Service)
CAS (Column Address Strobe)
CAS (Content Addressable Storage)
CASB (Cloud Access Security Broker)
CAT (Category Ethernet Cables)
CBC (Cipher Block Chaining)
CCMP (Counter Mode Cipher Block Chaining Message Authentication Code Protocol)
CCTV (Closed-Circuit Television)
CD (Compact Disc)
CDFS (Compact Disc File System)
CDMA (Code-Division Multiple Access)
CDP (Cisco Discovery Protocol)
CDP (Continuous Data Protection)
CD-ROM (Compact Disk Read-Only Memory)
CER (Certificate)
CER (Cross-Over Error Rate)
CERT (Computer Emergency Response Team)
CFB (Cipher Feedback)
CGI (Common Gateway Interface)
CHAP (Challenge-Handshake Authentication Protocol)
CIA (Confidentiality, Integrity, Availability)
CIANA (Confidentiality, Integrity, Availability, Nonrepudiation, Authentication)
CI/CD (Continuous Integration/Continuous Deployment)
CID (Chassis Intrusion Detection)
CIDR (Classless Inter-Domain Routing)
CIFS (Common Internet File System)
CIIS (Client Integration Implementation Service)
CIO (Chief Information Officer)
CIRT (Computer Incident Response Team)
CIS (Center for Internet Security)
CISO (Chief Information Security Officer)
CLI (Command Line Interface)
CLR (Common Language Runtime)
CM (Configuration Management)
CMDB (Configuration Management Database)
CMOS (Complementary Metal-Oxide-Semiconductor)
CMP (Cloud Management Platform)
CMS (Content Management System)
CNA (Converged Network Adapter)
CNAME Record (Canonical Name Record)
COBIT (Control Objectives for Information and Related Technology)
COLO (Co-location)
COM (Component Object Model)
COOP (Continuity of Operations Plan)
COPE (Corporate Owned, Personally Enabled)
CoS (Class of Service)
CP (Contingency Plan)
CPE (Customer-Premises Equipment)
CPU (Central Processing Unit)
CRAM-MD5 (Challenge-Response Authentication Mechanism-Message Digest 5)
CRC (Cyclic Redundancy Check)
CRL (Certificate Revocation List)
CRM (Customer Relations Management)
CRU (Customer Replaceable Unit)
CSA (Cloud Systems Administrator)
CSC (Common Short Code)
CSIRT (Computer Security Incident Response Team)
CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)
CSMA/CD (Carrier Sense Multiple Access/Collision Detection)
CSO (Chief Security Officer)
CSP (Cloud Service Provider)
CSP (Cryptographic Service Provider)
CSR (Certificate Signing Request)
CSRF (Cross-Site Request Forgery)
CSS (Cascading Style Sheets)
CSU (Channel Service Unit)
CTI (Cyber Threat Intelligence)
CTM (Counter-Mode)
CTO (Chief Technology Officer)
CTR (Counter)
CUPS (Common Unix Printing System)
CVE (Common Vulnerabilities and Exposures)
CVW (Collaborative Virtual Workspace)
CWDM (Coarse Wavelength Division Multiplexing)
CYOD (Choose Your Own Device)
CySA (Cybersecurity Analyst)

D

DAC (Discretionary Access Control)
DAD (Duplicate Address Detection)
DAS (Direct Attached Storage)
dB (Decibel)
DBA (Database Administrator)
DBMS (Database Management System)
DC (Domain Controller)
DCO (Device Configuration Overlay)
DCS (Distributed Computer System)
DDL (Data Definition Language)
DDNS (Dynamic Domain Name System)
DDoS (Distributed Denial of Service)
DDR (Double Data Rate)
DEP (Data Execution Prevention)
DER (Distinguished Encoding Rules)
DES (Data Encryption Standard)
DFIR (Digital Forensics and Investigation Response)
DFS (Distributed File System)
DGA (Domain Generation Algorithm)
DHCP (Dynamic Host Configuration Protocol)
DHE (Data-Handling Electronics)
DHE (Diffie-Hellman Ephemeral)
DID (Defense-in-Depth)
DIG (Domain Information Groper)
DIMM (Dual In-Line Memory Module)
DISM (Deployment Image Servicing and Management)
DKIM (DomainKeys Identified Mail)
DLC (Data Link Control)
DLL (Dynamic-Link Library)
DLP (Data Loss Prevention)
DLR (Device Level Ring)
DLT (Digital Linear Tape)
DMA (Direct Memory Access)
DML (Data Manipulation Language)
DMS (Document Management System)
DMVPN (Dynamic Multipoint Virtual Private Network)
DMZ (Demilitarized Zone)
DN (Distinguished Name)
DNAME Record (Delegation Name Record)
DNAT (Destination Network Address Translation)
DNS (Domain Name System)
DOCSIS (Data Over Cable Service Interface Specification)
DOM (Document Object Model)
DOS (Disk Operating System)
DoS (Denial of Service Attack)
DDoS (Distributed Denial of Service)
DPI (Deep Packet Inspection)
DR (Designated Router)
DRAC (Dell Remote Access Controller)
DRAM (Dynamic Random Access Memory)
DRM (Digital Rights Management)
DRP (Disaster Recovery Plan)
DRY (Don’t Repeat Yourself)
DSA (Distributed Services Architecture)
DSA (Digital Signature Algorithm)
DSCP (Differentiated Services Code Point)
DSL (Digital Subscriber Line)
DSRM (Directory Services Restore Mode)
DSSS (Direct Sequence Spread Spectrum)
DSU (Data Service Unit)
DTE (Data Terminal Equipment)
DTLS (Datagram Transport Layer Security)
DTP (Dynamic Trunking Protocol)
DTX (Discontinuous Transmission)
DVD (Digital Versatile Disc)
DVI (Digital Visual Interface)
DVRP (Distance-Vector Routing Protocol)
DWDM (Dense Wavelength Division Multiplexing)

E

E1 (E-Carrier Level 1)
EAL (Evaluation Assurance Level)
EAP (Extensible Authentication Protocol)
EAS (Enterprise Application Software)
EBCDIC (Extended Binary Coded Decimal Interchange Code)
ECAB (Emergency Change Advisory Board)
ECB (Electronic Codebook)
ECC (Elliptic-Curve Cryptography)
ECC (Error Correction Code)
ECC RAM (Error Correcting Code Random Access Memory)
ECDHE (Elliptic-Curve Diffie-Hellman Ephemeral)
ECDSA (Elliptic-Curve Digital Signature Algorithm)
ECM (Enterprise Content Management)
ECMA (European Computer Manufacturers Association)
EDGE (Enhanced Data Rates for GSM Evolution)
EDNS (Extension Mechanisms for DNS)
EDR (Endpoint Detection and Response)
EEPROM (Electrically Erasable Programmable Read-Only Memory)
EF (Exposure Factor)
EFI (Extensible Firmware Interface)
EFS (Encrypting File System)
EGP (Exterior Gateway Protocol)
EIA (Electronic Industries Alliance)
EIGRP (Enhanced Interior Gateway Routing Protocol)
EMEA (Europe Middle East Asia)
EMET (Enhanced Mitigation Experience Toolkit)
EMI (Electromagnetic Interference)
EMP (Electromagnetic Pulse)
eMMC (Embedded MultiMediaCard)
EOF (End of File)
EOL (End of Life)
EPEL (Extra Packages for Enterprise Linux)
EPROM (Erasable Programmable Read-Only Memory)
ERD (Emergency Repair Disk)
ERP (Enterprise Resource Planning)
ESD (Electrostatic Discharge)
ESI (Electronically Stored Information)
ESN (Electronic Serial Number)
ESP (Encapsulation Security Payload)
ESS (Extended Service Set)
ESSID (Extended Service Set Identifier)
EUI (Extended Unique Identifier)
EULA (End User License Agreement)

F

FACL (File System Access Control List)
FAR (False Acceptance Rate)
FAT (File Allocation Table)
FCC (Federal Communications Commission)
FC (Fibre Channel)
FCP (Fibre Channel Protocol)
FCoE (Fibre Channel over Ethernet)
FCIP (Fibre Channel over IP)
FCS (Frame Check Sequence)
FDM (Frequency Division Multiplexing)
FDE (Full Disk Encryption)
FHSS (Frequency Hopping Spread Spectrum)
FIM (Federated Identity Management)
FIM (File Integrity Monitoring)
FIPS (Federal Information Processing Standard)
FISMA (Federal Information Security Management Act)
FM (Frequency Modulation)
FOCI (Foreign Ownership, Control, or Influence)
FOSS (Free And Open-Source Software)
FPU (Floating-Point Unit)
FQDN (Fully Qualified Domain Name)
FRR (False Rejection Rate)
FRU (Field Replaceable Unit)
FSB (Front-Side Bus)
FSS (File System Storage)
FTK (Forensic Tool Kit)
FTP (File Transfer Protocol)
FTPS (File Transfer Protocol Secure Sockets Layer)

G

GAPP (Generally Accepted Privacy Principles)
GB (Gigabyte)
GBIC (Gigabit Interface Converter)
GCC (GNU Compiler Collection)
GCM (Galois/Counter Mode)
GDI (Graphics Device Interface)
GFS (Grandfather Father Son)
GIF (Graphic Intechange Format)
GLBP (Gateway Load Balancing Protocol)
GPG (GNU Privacy Guard)
GPIO (General Purpose Input Output)
GPO (Group Policy Object)
GPS (Global Positioning System)
GPT (GUID Partition Table)
GPU (Graphics Processing Unit)
GRE (Generic Routing Encapsulation)
GRUB (GNU Grand Unified Bootloader)
GSM (Global System for Mobile Communications)
GUI (Graphical User Interface)
GUID (Globally Unique Identifier)

H

HA (High Availability)
HAV (Hardware-Assisted Virtualization)
HBA (Host Bus Adapter)
HBID (Host Based Intrusion Detection)
HBSS (Host Based Security System)
HCL (Hardware Compatibility List)
HDD (Hard Disk Drive)
HDFS (Hadoop Distributed File System)
HDLC (High-Level Data Link Control)
HDMI (High-Definition Multimedia Interface)
HFC (Hybrid Fiber-Coaxial)
HIG (Human Interface Guidelines)
HIDS (Host-Based Intrusion Detection System)
HIPS (Host-Based Intrusion Prevention System)
HMAC (Hashed Message Authentication Code)
HOTP (HMAC-Based One-Time Password)
HPA (Host Protected Areas)
HR (Human Resources)
HREF (Hypertext Reference)
HRP (Hybrid Routing Protocol)
HSM (Hardware Security Module)
HSPA (High-Speed Packet Access)
HSRP (Hot Standby Router Protocol)
HT (High-Throughput)
HTML (Hypertext Markup Language)
HTT (Hyper-Threading Technology)
HTTP (Hypertext Transfer Protocol)
HTTPd (Hypertext Transfer Protocol daemon)
HTTPS (Hypertext Transfer Protocol Secure)
HZ (Hertz)

I

IAB (Internet Architecture Board)
IANA (Internet Assigned Numbers Authority)
IBSS (Independent Basic Service Set)
ICA (Independent Computer Architecture)
ICANN (Internet Corporation for Assigned Names and Numbers)
ICMP (Internet Control Message Protocol)
ICO (Icon File Format)
ICS (Internet Connection Sharing)
ICS (Industrial Control Systems)
ID (Identification)
IDE (Integrated Development Environment)
IDEA (International Data Encryption Algorithm)
IDF (Intermediate Distribution Frame)
IDP (Identity Provider)
IDS (Intrusion Detection System)
IEEE (Institute of Electrical and Electronic Engineers)
IFCP (Internet Fibre Channel Protocol)
IGMP (Internet Group Management Protocol)
IGP (Interior Gateway Protocol)
IGRP (Interior Gateway Routing Protocol)
IIS (Internet Information Services)
IKE (Internet Key Exchange)
ILO (Integrated Lights Out)
IM (Instant Message)
IMAP (Internet Message Access Protocol)
IMEI (International Mobile Equipment Identity)
IMG (Image File Format)
IMSI (International Mobile Subscriber Identity)
InterNIC (Internet Network Information Center)
IO (Input Output)
IOC (Indicator of Compromise)
IOPS (Input/Output Operations Per Second)
IOT (Internet of Things)
IP (Internet Protocol)
IPC (Instructions Per Cycle)
IPv4 (Internet Protocol version 4)
IPv6 (Internet Protocol version 6)
IPAM (IP Address Management)
IPMI (Intelligent Platform Management Interface)
IPP (Internet Printing Protocol)
IPS (Intrusion Prevention System)
IPSEC (Internet Protocol Security)
IPX (Internetwork Packet Exchange)
IQN (Initiator Qualified Name)
IR (Incident Response)
IR (Infrared)
IRC (Internet Relay Chat)
IRM (Information Rights Management)
IRP (Incident Response Plan)
ISA (Interconnection Security Agreement)
ISAC (Information Sharing and Analysis Communities)
ISAKMP (Internet Security Association and Key Management Protocol)
iSCSI (Internet Small Computer Systems Interface)
ISDN (Integrated Services Digital Network)
IS-IS (Intermediate System to Intermediate System)
ISL (Cisco Inter-Switch Link)
ISNS (Internet Storage Name Service)
ISO (International Organization for Standardization)
ISOC (Internet Society)
ISP (Internet Service Provider)
ISSO (Information Systems Security Officer)
IT (Information Technology)
ITCP (IT Contingency Plan)
ITIL (Information Technology Infrastructure Library)
ITS (Intelligent Transport System)
ITU (International Telecommunications Union)
IV (Initialization Vector)
IVT (Intel Virtualization Technology)

J

JBOD (Just a Bunch of Disks)
JDP (Juniper Discovery Protocol)
JPEG (Joint Photographic Experts Group)
JS (JavaScript)
JSON (JavaScript Object Notation)

K

KB (Kilobyte)
KDC (Key Distribution Center)
KDE (K Desktop Environment)
KEK (Key Encryption Key)
KMS (Key Management System)
KPA (Known-Plaintext Attack)
KVM (Kernel Based Virtual Machine)
KVM (Keyboard Video Mouse)

L

L2TP (Layer 2 Tunneling Protocol)
LAA (Locally Administered Address)
LACP (Link Aggregation Control Protocol)
LAN (Local Area Network)
LC (Local Connector)
LCD (Liquid Crystal Display)
LDAP (Lightweight Directory Access Protocol)
LEAP (Lightweight Extensible Authentication Protocol)
LEC (Local Exchange Connector)
LED (Light Emitting Diode)
LGA (Land Grid Array)
LI (Lawful Interception)
LILO (Linux Loader)
LKGC (Last Known Good Configuration)
LLC (Logical Link Control)
LLDP (Link Layer Discovery Protocol)
LOB (Line of Business)
LOM (Lights Out Management)
LPD (Line Printer Daemon Protocol)
LPR (Line Printer Remote Protocol)
LSA (Latent Semantic Analysis)
LSA (Link-State Advertisements)
LSI (Latent Semantic Indexing)
LSRP (Link-State Routing Protocol)
LTE (Long Term Evolution)
LTI (Light Touch Installation)
LTO (Linear Tape-Open)
LTSC (Long-Term Service Control)
LUKS (Linux Unified Key Setup)
LUN (Logical Unit Number)
LWAPP (Light Weight Access Point Protocol)
LVM (Logical Volume Management)

M

MAC (Mandatory Access Control)
MAC (Media Access Control)
MAC (Message Authentication Code)
MAEC (Malware Attribute Enumeration and Characterization)
MAD (Maximum Allowable Downtime)
MAK (Multiple Activation Key)
MAN (Metropolitan Area Network)
MAU (Multistation Access Unit)
MB (Megabyte)
MBR (Master Boot Record)
MCU (Multipoint Control Unit)
MD5 (Message-Digest 5)
MD (Markdown File Format)
MDF (Main Distribution Frame)
MDF (Master Data File)
MDI (Medium Dependent Interface)
MDIX (Media Dependent Interface Crossover)
MDM (Mobile Device Management)
MDN (Mozilla Developer Network)
MDOP (Microsoft Desktop Optimization Pack)
MFA (Multi-Factor Authentication)
MFD (Multi-Function Device)
MGCP (Media Gateway Control Protocol)
MIB (Management Information Base)
MIDI (Musical Instrument Digital Interface)
MIME (Multipurpose Internet Mail Extensions)
MIMO (Multiple Input Multiple Output)
MISP (Malware Information Sharing Project)
MITB (Man-in-the-Browser Attack)
MITM (Man-In-The-Middle Attack)
MLA (Master License Agreement/Multilateral Agreement)
MMC (Microsoft Management Console)
MMF (Multi-Mode Fiber)
MMS (Multimedia Message Service)
MOA (Memorandum of Agreement)
MOU (Memorandum of Understanding)
MOTD (Message of the Day)
MPIO (Multipath Input/Output)
MPLS (Multiprotocol Label Switching)
MRTG (Multi Router Traffic Grapher)
MSA (Master Service Agreement)
MSA (Message Submission Agent)
MSC (Mobile Switching Center)
MS-CHAP (Microsoft Challenge-Handshake Authentication Protocol)
MSDN (Microsoft Developer Network)
MSP (Managed Service Provider)
MTA (Mail Transfer Agent)
MTBF (Mean Time Between Failures)
MTD (Maximum Tolerable Downtime)
MTO (Maximum Tolerable Outage)
MT-RJ (Mechanical Transfer-Registered Jack)
MTTF (Mean Time to Failure)
MTTR (Mean Time To Recovery)
MTU (Maximum Transmission Unit)
MU-MIMO (Multiple User Multiple Input Multiple Output)
MUA (Mail User Agent)
MX Record (Mail Exchanger Record)

N

NAC (Network Access Control)
NAC (Network Admission Control)
NAS (Network Attached Storage)
NAT (Network Address Translation)
NAXSI (Nginx Anti XSS & SQL Injection)
NCP (Network Control Protocol)
NDA (Non-Disclosure Agreement)
NDP (Neighbor Discovery Protocol)
NDR (Non-Delivery Receipt)
NEMA (National Electronic Manufacturers Association)
NetBEUI (Network Basic Input/Output Extended User Interface)
NetBIOS (Network Basic Input Output System)
NetBT (NetBIOS over TCP/IP)
NFC (Near-Field Communication)
NFS (Network File System)
NFV (Network Function Virtualization)
NGAC (Next Generation Access Control)
NGFW (Next-Generation Firewall)
NIC (Network Interface Controller)
NID (Network Interface Device)
NIDS (Network Intrusion Detection System)
NIPS (Network Intrusion Prevention System)
NIS (Network Information Service)
NIST (National Institute of Standards and Technology)
NIU (Network Interface Unit)
NLB (Network Load Balancing)
NM (Nanometer)
NNTP (Network News Transfer Protocol)
NOC (Network Operations Center)
NOS (Network Operating System)
NPIV (N_Port ID Virtualization)
NS Record (Name Server Record)
NTFS (New Technology File System)
NTLM (New Technology LAN Manager)
NTP (Network Time Protocol)
NVD (National Vulnerability Database)
NVMe (Non-Volatile Memory Express)
NX Bit (No-Execute Bit)

O

OAUTH (Open Authorization)
OC (Optical Carrier)
OCR (Optical Character Recognition)
OCSP (Online Certificate Status Protocol)
ODBC (Open Database Connectivity)
OEM (Original Equipment Manufacturer)
OID (Object Identifier)
OLA (Operational Level Agreement)
OLT (Optical Line Terminal)
OOB (Out-of-Band)
OOP (Object Oriented Programming)
OpEx (Operating Expenditure)
OS (Operating System)
OSI (Open Systems Interconnection)
OSINT (Open-Source Intelligence)
OSPF (Open Shortest Path First)
OSSIM (Open Source Security Information Management)
OTA (Over The Air)
OTDR (Optical Time-Domain Reflectometer)
OTP (One-Time Password)
OU (Organizational Unit)
OUI (Organizationally Unique Identifier)
OV (Order of Volatility)
OVA (Open Virtualization Appliance)
OVAL (Open Vulnerability Assessment Language)
OVF (Open Virtualization Format)
OWASP (Open Web Application Security Project)

P

PKCS12 (Public Key Cryptography Standard #12)
P2P (Peer-to-Peer)
P2P (Physical to Physical)
P2V (Physical to Virtual)
PAC (Proxy Auto Configuration)
PAE (Physical Address Extension)
PAM (Pluggable Authentication Module)
PAN (Personal Area Network)
PAP (Password Authentication Protocol)
PAT (Port Address Translation)
PATA (Parallel Advanced Technology Attachment)
PBKDF2 (Password-Based Key Derivation Function 2)
PBX (Private Branch Exchange)
PC (Personal Computer)
PCA (Principal Component Analysis)
PCAP (Packet Capture)
PCB (Printed Circuit Board)
PCI (Payment Card Industry)
PCI (Peripheral Component Interconnect)
PCIe (Peripheral Component Interconnect Express)
PCI-X (Peripheral Component Interconnect Extended)
PCL (Printer Command Language)
PCM (Phase-Change Memory)
PCS (Private Cloud Space)
PDF (Portable Document Format)
PDoS (Permanent Denial-of-Service)
PDU (Power Distribution Unit)
PDU (Protocol Data Units)
PEAP (Protected Extensible Authentication Protocol)
PED (Personal Electronic Device)
PEM (Privacy-Enhanced Mail)
PFS (Perfect Forward Secrecy)
PFX (Personal Exchange Format)
PGA (Pin Grid Array)
PGP (Pretty Good Privacy)
PHI (Personal Health Information)
PHI (Protected Health Information)
PHP (Personal Home Page: Hypertext Preprocessor)
PIA (Privacy Impact Assessment)
PID (Process ID)
PII (Personal Identifiable Information)
PIM (Personal Information Manager)
PIN (Personal Identifiable Number)
PIT (Point-in-Time)
PIV (Personal Identity Verification)
PKI (Public Key Infrastructure)
PLC (Power-Line Communication)
PNG (Portable Network Graphic)
PoE (Power Over Ethernet)
PoLP (Principle of Least Privilege)
POODLE (Padding Oracle on Downgrade Legacy Encryption)
POP (Post Office Protocol)
POS (Point of Sale)
POST (Power-On Self-Test)
POTS (Plain Old Telephone Service)
PPA (Personal Package Archive)
PPP (Point-to-Point Protocol)
PPPoA (Point-to-Point Protocol over ATM)
PPPoE (Point-to-Point Protocol over Ethernet)
PPTP (Point-to-Point Tunneling Protocol)
PRI (Primary Rate Interface)
PRL (Preferred Roaming List)
PROM (Programmable Read-Only Memory)
PSK (Pre-Shared Key)
PSTN (Public Switched Telephone Network)
PSU (Power Supply Unit)
PTA (Privacy Threshold Analysis)
PTR Record (Pointer Record)
PTY (Pseudoterminal)
PTZ (Pan-Tilt-Zoom)
PUA (Privileged User Agreement)
PUA (Potentially Unwanted Application)
PUE (Power Usage Effectiveness)
PVC (Permanent Virtual Circuit)
PXE (Preboot Execution Environment)

Q

QA (Quality Assurance)
QoS (Quality of Service)
QRC (Quick Response Code)
QSFP (Quad Small Form Factor Pluggable)

R

RA (Recovery Agent)
RA (Registration Authority)
RACI (Responsible, Accountable, Consulted and Informed)
RAD (Rapid Application Development)
RADIUS (Remote Authentication Dial-In User Service)
RAID (Redundant Array of Independent Disks)
RAM (Random Access Memory)
RAP (Rogue Access Point)
RARP (Reverse Address Resolution Protocol)
RAS (Remote Access Service)
RAT (Remote Access Trojan)
RBAC (Role-Based Access Control)
RBAC (Rule-Based Access Control)
RC4 (Rivest Cipher version 4)
RC5 (Rivest Cipher version 5)
RCE (Remote Code Execution)
RDIMM (Registered Memory)
RDMA (Remote Direct Memory Access)
RDP (Remote Desktop Protocol)
ReFS (Resilient File System)
REST (Representational State Transfer)
RF (Radio Frequency)
RFB (Remote Frame Buffer)
RFI (Radio-Frequency Interference)
RFID (Radio Frequency Identification)
RFP (Request for Proposal)
RG (Radio Guide)
RIP (Routing Information Protocol)
RIPng (Routing Information Protocol next generation)
RIPEMD (RACE Integrity Primitives Evaluation Message Digest)
RIR (Regional Internet Registry)
RIS (Remote Installation Service)
RISC (Reduced Instruction Set Computer)
RJ (Registered Jack)
RMF (Risk Management Framework)
RNA (Retrospective Network Analysis)
ROI (Return on Investment)
ROM (Read-Only Memory)
RPC (Remote Procedure Call)
RPM (RPM Package Manager)
RPO (Recovery Point Objective)
RR (Resource Record)
RRAS (Routing And Remote Access Service)
RSA (Rivest-Shamir-Adelman)
RSH (Remote Shell)
RSI (Repetitive Strain Injury)
RSS (Really Simple Syndication)
RSTP (Rapid Spanning Tree Protocol)
RTC (Real-Time Clock)
RTBH (Remotely Triggered Black Hole)
RTO (Recovery Time Objective)
RTOS (Real-Time Operating System)
RTP (Real-Time Transport Protocol)
RTT (Round Trip Time)
RTSP (Real-Time Streaming Protocol)

S

S/MIME (Secure/Multipurpose Internet Mail Extension)
SA (Security Association)
SABSA (Sherwood Applied Business Security Architecture)
SAM (Security Account Manager)
SAML (Security Assertion Markup Language)
SAN (Subject Alternative Name)
SAN (Storage Area Network)
SANS (System Administration, Networking, and Security Institute)
SAR (Segmentation and Reassembly)
SAS (Serial Attached SCSI)
SASS (Syntactically Awesome Style Sheets)
SAST (Static Application Security Testing)
SATA (Serial Advanced Technology Attachment)
SC (Subscriber Connector)
SCADA (Supervisory Control and Data Acquisition)
SCAP (Security Content Automation Protocol)
SCEP (Simple Certificate Enrollment Protocol)
SCP (Secure Copy Protocol)
SCP (Session Control Protocol)
SCSI (Small Computer Systems Interface)
SDH (Synchronous Digital Hierarchy)
SDLC (Software Development Life Cycle)
SDLM (Software Development Life Cycle Methodology)
SDK (Software Development Kit)
SDN (Software-Defined Networking)
SDP (Session Description Protocol)
SDRAM (Synchronous Dynamic Random Access Memory)
SDS (Safety Data Sheet)
SDSL (Symmetrical Digital Subscriber Line)
SED (Self-Encrypting Drive)
SEH (Structured Exception Handler)
SELinux (Security Enhanced Linux)
SEO (Site Engine Optimization)
SFC (System File Checker)
SFD (Start Frame Delimiter)
SFP (Small Form Factor Pluggable)
SFTP (Secure Shell File Transfer Protocol)
SGC (Server-Gated Cryptography)
SGCP (Simple Gateway Control Protocol)
SHA (Secure Hash Algorithm)
SHTTP (Secure Hypertext Transfer Protocol)
SID (Security Identifier)
SIEM (Security Information and Event Management)
SIM (Subscriber Identity Module)
SIP (Session Initiation Protocol)
SIPS (Session Initiation Protocol Secure)
SLA (Service-Level Agreement)
SLAAC (Stateless Address Auto-Configuration)
SLE (Single-Loss Expectancy)
SLIP (Serial Line Internet Protocol)
SMB (Server Message Block)
SME (Subject Matter Expert)
SMF (Single-Mode Fiber)
SMP (Symmetric Multiprocessing)
SMS (Short Message Service)
SMTP (Simple Mail Transfer Protocol)
SMTPS (Simple Mail Transfer Protocol Secure)
SNAT (Source Network Address Translation)
SNMP (Simple Network Management Protocol)
SNR (Signal-to-Noise Ratio)
SNTP (Simple Network Time Protocol)
SOA (Start of Authority)
SOAP (Simple Object Access Protocol)
SOC (Security Operations Center)
SOC (Service Organizations Control)
SoC (System on Chip)
SODIMM (Small Outline Dual In-Line Memory Module)
SOE (Standard Operating Environment)
SOHO (Small Office/Home Office Network)
SONET (Synchronous Optical Network)
SOP (Standard Operating Procedure)
SOW (Statement of Work)
SPB (Shortest Path Bridging)
SPF (Sender Policy Framework)
SPI (Stateful Packet Inspection)
SPICE (Simple Protocol for Independent Computing Environments)
SPIM (Spam over Internet Messaging)
SPoF (Single Point of Failure)
SPS (Standby Power Supply)
SQL (Structured Query Language)
SRAM (Static Random Access Memory)
SRTP (Secure Real-Time Transport Protocol)
SRV (Service Record)
SSD (Solid State Drive)
SSH (Secure Shell)
SSID (Service Set Identifier)
SSL (Secure Sockets Layer)
SSO (Single Sign-On)
SSP (System Security Plan)
ST (Straight Tip)
STIX (Structured Threat Information eXpression)
STP (Shielded Twisted Pair)
STP (Spanning Tree Protocol)
SUID (Set User ID)
SVC (Switched Virtual Circuit)
SYSLOG (System Log)

T

T1 (Terrestrial Carrier Level 1)
TA (Terminal Adapter)
TACAS (Terminal Access Controller Access-Control System)
TAP (Test Access Port)
TAR (Tape Archive)
TAXII (Trusted Automated eXchange of Intelligence Information)
TCO (Total Cost of Ownership)
TCP (Transmission Control Protocol)
TCP/IP (Internet Protocol Suite)
TDES (Triple Data Encryption Standard)
TDM (Time Division Multiplexing)
TDMA (Time-Division Multiple Access)
TDR (Time-Domain Reflectometer)
TEC (Threat Exposure Check)
TELCO (Telecommunications Company)
TFTP (Trivial File Transfer Protocol)
TGT (Ticket Granting Ticket)
TIA (Telecommunications Industry Association)
TIFF (Tagged Image File Format)
TIP (Threat Intelligence Platform)
TKIP (Temporal Key Integrity Protocol)
TLD (Top Level Domain)
TLP (Traffic Light Protocol)
TLS (Transport Layer Security)
TMS (Transportation Management System)
TOGAF (The Open Group Architecture Framework)
TOS (Type of Service)
TOTP (Time-Based One-Time Password)
TPM (Trusted Platform Module)
TSIG (Transaction Signature)
TTD (Technical Training Device)
TTL (Time to Live)
TTP (Tactics, Techniques, Procedures)
TTR (Time to Resolution)
TTY (Terminal Type)
TTLS (Tunneled Transport Layer Security)
TTP (Techniques, Tactics, and Procedures)
TWAIN (Technology Without An Interesting Name)
TXT Record (Text Record)

U

UAC (User Account Control)
UAT (User Acceptance Testing)
UAV (Unmanned Aerial Vehicle)
UC (Unified Communications)
UDP (User Datagram Protocol)
UEBA (User and Entity Behavior Analytics)
UEFI (Unified Extensible Firmware Interface)
UFS (Unix File System)
UI (User Interface)
UID (Unit Identification)
UNC (Universal Naming Convention)
UPC (Ultra Polished Connector)
UPnP (Universal Plug and Play)
UPS (Uninterruptible Power Supply)
URI (Uniform Resource Identifier)
URL (Uniform Resource Locator)
USB (Universal Serial Bus)
USB OTG (Universal Serial Bus On-The-Go)
USMT (User State Migration Tool)
UTA (Universal Target Adapter)
UTC (Coordinated Universal Time)
UTF (Unicode Transformation Format)
UTP (Unshielded Twisted Pair)
UTM (Unified Threat Management)
UUCP (Unix-to-Unix Copy)
UX (User Experience)

V

V2P (Virtual to Physical)
V2V (Virtual to Virtual)
VA (Volt-Amp)
VAMT (Volume Activation Management Toolkit)
VAS (Vulnerability Assessment System)
VCPU (Virtual CPU)
VDE (Virtual Desktop Environment)
VDI (Virtual Desktop Infrastructure)
VDSL (Variable Digital Subscriber Line)
VGA (Video Graphics Array)
VHD (Virtual Hard Disk)
VIP (Virtual IP Address)
VLAN (Virtual Local Area Network)
VLK (Volume License Key)
VLSM (Variable Length Subnet Masks)
VM (Virtual Machine)
VMDK (Virtual Machine Disk)
VMFS (Virtual Machine File System)
VNC (Virtual Network Computing)
VNIC (Virtual NIC)
VoIP (Voice over IP)
VPC (Virtual Private Cloud)
VPN (Virtual Private Network)
VR (Virtual Reality)
VRAM (Virtual RAM)
VRF (Virtual Routing and Forwarding)
VRM (Voltage Regulator Module)
VRR (Vulnerability Remediation Request)
VRRP (Virtual Router Redundancy Protocol)
VSAN (Virtual SAN)
VT (Virtualization Technology)
VTC (Video Teleconference)
VTL (Virtual Tape Library)
VTP (VLAN Trunking Protocol)
VXLAN (Virtual Extensible Local Area Network)

W

W3C (World Wide Web Consortium)
WADK (Windows Assessment and Deployment Kit)
WAF (Web Application Firewall)
WAN (Wide Area Network)
WANET (Wireless Ad Hoc Network)
WAP (Wireless Access Point)
WAT (Windows Assessment Toolkit)
WCD (Windows Configuration Designer)
WCMS (Web Content Management System)
WDM (Wavelength Division Multiplexing)
WDDM (Windows Display Driver Model)
WDS (Windows Deployment Services)
WEP (Wired Equivalent Privacy)
WiFi (Wireless Fidelity)
WICD (Windows Imaging and Configuration Designer)
WIDS (Wireless Intrusion Detection System)
WINPE (Windows Preinstallation Environment)
WINS (Windows Internet Naming Service)
WIPS (Wireless Intrusion Prevention System)
WLAN (Wireless Local Area Network)
WMF (Windows Metafile)
WMI (Windows Management Implementation)
WMS (Warehouse Management System)
WMN (Wireless Mesh Network)
WoL (Wake-on-LAN)
WORM (Write Once Read Many)
WPA (WiFi Protected Access)
WPS (WiFi Protected Setup)
WPT (Windows Performance Toolkit)
WSIM (Windows System Image Manager)
WSUS (Windows Software Update Services)
WTLS (Wireless Transport Layer Security)
WWAN (Wireless Wide Area Network)
WWN (World Wide Name)
WWNN (World Wide Node Name)
WWPN (World Wide Port Name)
WWUI (World Wide Unique Identifier)
WWW (World Wide Web)

X

XDSL (Extended Digital Subscriber Line)
XFS (Extent File System)
XGA (Extended Graphics Array)
XHTML (Extensible Hypertext Markup Language)
XML (Extensible Markup Language)
XOR (Exclusive Or)
XP (Cross Platform)
XPS (Open XML Paper Specification)
XRDP (XWindows Remote Desktop Protocol)
XSRF (Cross-Site Request Forgery)
XSS (Cross-Site Scripting)
XT (Crosstalk)

Y

YAML (Yet Another Markup Language)
YUM (Yellowdog Updater Modified)

Z

ZEROCONF (Zero Configuration Networking)
ZF (Zone File)
ZFS (Zettabyte File System)
ZIF (Zero Insertion Force)
ZT (Zone Transfer)
ZTI (Zero Touch Installation)