back to top
16.1 C
Kathmandu
Wednesday, October 30, 2024
spot_img

Cyber Security Acronyms

AES                         Advanced Encryption Standard

API                          Application Programming Interface

APT                         Advanced Persistent Threat

- Advertisement -

AV                           Antivirus

BYOD                      Bring Your Own Device

CAPTCHA               Completely Automated Public Turing test to tell Computers and Humans Apart

CISO                       Chief Information Security Officer

CSRF                       Cross-Site Request Forgery

CVE                        Common Vulnerabilities and Exposures

DDoS                      Distributed Denial of Service

DLP                         Data Loss Prevention

DMZ                        Demilitarized Zone

DNS                        Domain Name System

DoS                        Denial of Service

DRM                        Digital Rights Management

EDR                        Endpoint Detection and Response

FTP                         File Transfer Protocol

GDPR                      General Data Protection Regulation

HIDS                       Host-based Intrusion Detection System

HTTP                       Hypertext Transfer Protocol

HTTPS               Hypertext Transfer Protocol Secure

IDS                         Intrusion Detection System

IoT                         Internet of Things

IPS                         Intrusion Prevention System

IPsec                       Internet Protocol Security

ISO                         International Organization for Standardization

IT                           Information Technology

LAN                         Local Area Network

LDAP                       Lightweight Directory Access Protocol

MAC                        Media Access Control

MDM                       Mobile Device Management

MFA                        Multi-Factor Authentication

MITM                      Man-in-the-Middle

MSSP                      Managed Security Service Provider

NAC                        Network Access Control

NAT                         Network Address Translation

NIST                       National Institute of Standards and

Technology

OSINT                     Open Source Intelligence

OTP                         One-Time Password

PGP                         Pretty Good Privacy

PII                          Personally Identifiable Information

PKI                         Personal Key Infrastructure

RAT                       Remote Access Trojan

RCE                       Remote Code Execution

RDP                       Remote Desktop Protocol

SaaS                     Software as a Service

SIEM                     Security Information and Event

Management

SOC                     Security Operations Center

SSH                     Secure Shell

SSL                      Secure Sockets Layer

SSL/TLS              Secure Sockets Layer/Transport

Layer Security

TCP/IP                 Transmission Control Protocol/ Internet Protocol

UTM                    Unified Threat Management

VAPT                    Vulnerability Assessment and

Penetration Testing

VLAN                   Virtual Local Area Network

VPN                     Virtual Private Network

WAF                     Web Application Firewall

WEP                     Wired Equivalent Privacy

WPA                     Wi-Fi Protected Access

XSS                     Cross-Site Scripting

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

" "

" "

Virinchi College

- Advertisement -spot_img

Latest Articles

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
Best Wordpress Adblock Detecting Plugin | CHP Adblock