Acronym | Term | Wikipedia |
---|---|---|
3DES | Triple-Data Encryption Standard |
wikipedia |
AAA | Authentication Authorization Accounting |
wikipedia |
ABAC | Attribute-based Access Control |
wikipedia |
ACL | Access Control List |
wikipedia |
AD | Active Directory |
wikipedia |
AES | Advanced Encryption Standard |
wikipedia |
AH | Authentication Header, see IPsec |
wikipedia |
ALE | Annualized Loss Expectancy |
wikipedia |
AP | Access Point |
wikipedia |
APT | Advanced Persistent Threat |
wikipedia |
ARO | Annualized Rate of Occurrence |
wikipedia |
ARP | Address Resolution Protocol |
wikipedia |
AS | Authentication Server |
wikipedia |
AUP | Acceptable Use Policy |
wikipedia |
AV | Asset Value |
wikipedia |
BCP | Business Continuity Planning |
wikipedia |
BIA | Business Impact Analysis, compare with PIA |
wikipedia |
BIOS | Basic Input/Output System |
wikipedia |
BPA | Business Partners Agreement |
wikipedia |
BYOD | Bring Your Own Device |
wikipedia |
CA | Certificate Authority |
wikipedia |
CAC | Common Access Card |
wikipedia |
CASB | Cloud Access Security Broker |
wikipedia |
CBC | Cipher Block Chaining |
wikipedia |
CCMP | Counter Mode with Cipher Block Chaining Message Authentication Code Protocol |
wikipedia |
CCTV | Closed-Circuit Television |
wikipedia |
CER | Canonical Encoding Rules |
wikipedia |
CHAP | Challenge Handshake Authentication Protocol |
wikipedia |
CIA | Confidentiality, Integrity and Availability |
wikipedia |
CIRT | Cyber-Incident Response Team |
wikipedia |
COO | Continuity of Operations |
wikipedia |
COPE | Corporate-Owned, Personally Enabled |
wikipedia |
CRL | Certificate Revocation List |
wikipedia |
CSR | Certificate Signing Request |
wikipedia |
CTM | Counter Mode |
wikipedia |
CYOD | Choose Your Own Device |
wikipedia |
DAC | Discretionary Access Control |
wikipedia |
DCS | Distributed Control System |
wikipedia |
DDoS | Distributed Denial-of-Service |
wikipedia |
DEP | Data Execution Prevention |
wikipedia |
DER | Distinguished Encoding Rules |
wikipedia |
DES | Data Encryption Standard |
wikipedia |
DHCP | Dynamic Host Configuration Protocol |
wikipedia |
DIG | Domain Information Groper |
wikipedia |
DLP | Data Loss Prevention |
wikipedia |
DMZ | Demilitarized Zone |
wikipedia |
DNS | Domain Name System |
wikipedia |
DNSSEC | Domain Name System Security Extensions |
wikipedia |
DoS | Denial-of-Service |
wikipedia |
DRP | Disaster Recovery Plan (IT) |
wikipedia |
DSA | Digital Signature Algorithm |
wikipedia |
DV | Domain Validation (Certificate) |
wikipedia |
EAL | Evaluation Assurance Level |
wikipedia |
EAP | Extensible Authentication Protocol |
wikipedia |
EAP-FAST | EAP-Flexible Authentication via Secure Tunneling |
wikipedia |
EAP-TLS | Extensible Authentication Protocol-Transport Layer Security |
wikipedia |
EAP-TTLS | Extensible Authentication Protocol-Tunneled Transport Layer Security |
wikipedia |
ECB | Electronic Codebook |
wikipedia |
ECC | Elliptic Curve Cryptography |
wikipedia |
EF | Exposure Factor |
wikipedia |
EISA | Enterprise Information Security Architecture |
wikipedia |
EMI | Electromagnetic Interference |
wikipedia |
EMP | Electromagnetic Pulse |
wikipedia |
ESD | Electrostatic Discharge |
wikipedia |
ESP | Encapsulating Security Payload, see IPsec |
wikipedia |
EV | Extended Validation (Certificate) |
wikipedia |
FAR | False Acceptance Rate |
wikipedia |
FC | Fibre Channel |
wikipedia |
FDE | Full Disk Encryption |
wikipedia |
FRR | False Rejection Rate |
wikipedia |
FTP | File Transfer Protocol |
wikipedia |
FTPS | File Transfer Protocol Secure |
wikipedia |
GCM | Galois/Counter Mode |
wikipedia |
GPO | Group Policy Object |
wikipedia |
GPS | Global Positioning System |
wikipedia |
HA | High Availability |
wikipedia |
HIDS | Host-based Intrusion Detection System |
wikipedia |
HIPAA | Health Insurance Portability and Accountability Act |
wikipedia |
HIPS | Host-based Intrusion Prevention System |
wikipedia |
HMAC | Hash-based Message Authentication Code |
wikipedia |
HOTP | HMAC-based One-Time Password |
wikipedia |
HSM | Hardware Security Module. compare with TPM |
wikipedia |
HTTPS | Hypertext Transfer Protocol Secure |
wikipedia |
HVAC | Heating, Ventilation, and Air Conditioning |
wikipedia |
IaaS | lnfrastructure as a Service |
wikipedia |
ICMP | Internet Control Message Protocol |
wikipedia |
ICS | Industrial Control System |
wikipedia |
IDS | Intrusion Detection System |
wikipedia |
IEEE 802.1x | An authentication protocol used in wired and wireless networks |
wikipedia |
IETF | Internet Engineering Task Force |
wikipedia |
IGMP | Internet Group Management Protocol (IPv4) |
wikipedia |
IMAP4 | Internet Message Access Protocol version 4 |
wikipedia |
IMS | Identity Management System |
wikipedia |
IoT | Internet of Things |
wikipedia |
IP | Internet Protocol |
wikipedia |
IPS | Intrusion Prevention System |
wikipedia |
IPsec | Internet Protocol Security |
wikipedia |
IRP | Incident Response Plan |
wikipedia |
ISA | Interconnection Security Agreement |
nist |
iSCSI | Internet Small Computer Systems Interface |
wikipedia |
IV | Initialization Vector |
wikipedia |
KDC | Key Distribution Center |
wikipedia |
L2TP | Layer 2 Tunneling Protocol |
wikipedia |
LDAP | Lightweight Directory Access Protocol, port 389 |
wikipedia |
LDAPS | Lightweight Directory Access Protocol Secure, port 636 |
wikipedia |
LEAP | Lightweight Extensible Authentication Protocol |
wikipedia |
MAC | Mandatory Access Control |
wikipedia |
MAC | Media Access Control |
wikipedia |
MAC | Message Authentication Code, see also HMAC |
wikipedia |
MAM | Mobile Application Management |
wikipedia |
MD5 | Message Digest 5 |
wikipedia |
MDM | Mobile Device Management |
wikipedia |
MFD | Multi-Function Devices |
wikipedia |
MIME | Multipurpose Internet Mail Extension |
wikipedia |
MITM | Man-In-The-Middle |
wikipedia |
MLD | Multicast Listener Discovery (IPv6) |
wikipedia |
MMS | Multimedia Messaging Service |
wikipedia |
MOA | Memorandum of Agreement |
wikipedia |
MOU | Memorandum of Understanding |
wikipedia |
MS-CHAPv2 | Microsoft Challenge Handshake Authentication Protocol version 2 |
wikipedia |
MTBF | Mean Time Between Failure |
wikipedia |
MTTF | Mean Time To Failure |
wikipedia |
MTTR | Mean Time To Recover |
wikipedia |
NaaS | Network-as-a-Service |
wikipedia |
NAC | Network Access Control |
wikipedia |
NAS | Network Attached Storage |
wikipedia |
NAT | Network Address Translation |
wikipedia |
NDA | Non-Disclosure Agreement |
wikipedia |
NFC | Near Field Communication |
wikipedia |
NIC | Network Interface Card |
wikipedia |
NIDS | Network-based Intrusion Detection System |
wikipedia |
NIPS | Network-based Intrusion Prevention System |
wikipedia |
NTLM | New Technology LAN Manager |
wikipedia |
NTP | Network Time Protocol, port 123 |
wikipedia |
OCSP | Online Certificate Status Protocol |
wikipedia |
OSI | Open Systems Interconnection 7-layer model |
wikipedia |
OTP | One-Time Password |
wikipedia |
PaaS | Platform as a Service |
wikipedia |
PAP | Password Authentication Protocol |
wikipedia |
PAT | Port Address Translation |
wikipedia |
PCI-DSS | Payment Card Industry Data Security Standard |
wikipedia |
PEAP | Protected Extensible Authentication Protocol |
wikipedia |
PEM | Privacy Enhanced Mail |
wikipedia |
PFS | Perfect Forward Secrecy |
wikipedia |
PFX | Personal Information Exchange |
wikipedia |
PGP | Pretty Good Privacy |
wikipedia |
PHI | Personal Health Information |
wikipedia |
PIA | Privacy Impact Assessment, compare with BIA |
wikipedia |
PII | Personally Identifiable Information |
wikipedia |
PIN | Personal Identification Number |
wikipedia |
PIV | Personal Identity Verification |
wikipedia |
PKCS | Public Key Cryptographic Standards |
wikipedia |
PKI | Public Key Infrastructure |
wikipedia |
POP3 | Post Office Protocol version 3, port 110 |
wikipedia |
PPP | Point-to-Point Protocol |
wikipedia |
PPTP | Point-to-Point Tunneling Protocol |
wikipedia |
PSK | Pre-shared key |
wikipedia |
RA | Registration Authority |
wikipedia |
RADIUS | Remote Authentication Dial-In User Service |
wikipedia |
RAID | Redundant Array of Inexpensive/Independent Disk |
wikipedia |
RAS | Remote Access Service |
wikipedia |
RAT | Remote Access Trojan |
wikipedia |
RAT | Remote Administration Tool |
wikipedia |
RC4 | Rivest Cipher 4 - symmetric stream cipher |
wikipedia |
RDP | Remote Desktop Protocol, port 3389 |
wikipedia |
RFI | Radio-Frequency Interference |
wikipedia |
RFID | Radio-Frequency Identification |
wikipedia |
RIPEMD | RACE Integrity Primitives Evaluation Message Digest |
wikipedia |
RMF | Risk Management Framework |
wikipedia |
Role-BAC | Role-based Access Control |
wikipedia |
ROT13 | Rotate by 13 places - substitution cipher |
wikipedia |
RPC | RPC Remote Procedure Call |
wikipedia |
RPO | Recovery Point Objective |
wikipedia |
RSA | Rivest, Shamir, and Adleman - asymmetric cipher |
wikipedia |
RSTP | Rapid Spanning Tree Protocol |
wikipedia |
RTO | Recovery Time Objective |
wikipedia |
RTOS | Real-Time Operating System |
wikipedia |
RTP | Real Time Protocol |
wikipedia |
Rule-BAC | Rule-based Access Control |
wikipedia |
S/MIME | Secure/Multipurpose Internet Mail Extensions |
wikipedia |
SaaS | Software as a Service |
wikipedia |
SAML | Security Assertion Markup Language |
wikipedia |
SAN | Storage Area Network |
wikipedia |
SAN | Subject Alternative Name (Certificate) |
wikipedia |
SCADA | Supervisory Control And Data Acquisition |
wikipedia |
SCP | Secure Copy Protocol |
wikipedia |
SDLC | Software Development Life Cycle |
wikipedia |
SDN | Software Defined Network |
wikipedia |
SED | Self-Encrypting Drive |
wikipedia |
SFTP | Secure/SSH File Transfer Protocol |
wikipedia |
SHA | Secure Hash Algorithm |
wikipedia |
SIEM | Security Information and Event Management |
wikipedia |
SLA | Service Level Agreement |
wikipedia |
SLE | Single Loss Expectancy |
wikipedia |
SMS | Short Message Service |
wikipedia |
SMTP | Simple Mail Transfer Protocol |
wikipedia |
SNMPv3 | Simple Network Management Protocol version 3 |
wikipedia |
SoC | System on a Chip |
wikipedia |
SOC | Security Operations Center |
wikipedia |
SOHO | Small Office / Home Office |
wikipedia |
SOP | Standard Operating Procedure |
wikipedia |
SPI | Stateful Packet Inspection |
wikipedia |
SQL | Structured Query Language |
wikipedia |
SRTP | Secure Real-Time Transport Protocol |
wikipedia |
SSH | Secure Shell - TCP port 22 |
wikipedia |
SSID | Service Set Identifier |
wikipedia |
SSL | Secure Sockets Layer |
wikipedia |
SSO | Single Sign-On |
wikipedia |
STP | Spanning Tree Protocol |
wikipedia |
TACACS+ | Terminal Access Controller Access-Control System Plus |
wikipedia |
TCP | Transmission Control Protocol |
wikipedia |
TCP/IP | Transmission Control Protocol/Internet Protocol |
wikipedia |
TGT | Ticket-Granting Ticket |
wikipedia |
TKIP | Temporal Key Integrity Protocol |
wikipedia |
TLS | Transport Layer Security |
wikipedia |
TOTP | Time-based One-Time Password |
wikipedia |
TPM | Trusted Platform Module |
wikipedia |
UAVs | Unmanned Aerial Vehicles |
wikipedia |
UDP | User Datagram Protocol |
wikipedia |
UEFI | Unified Extensible Firmware Interface |
wikipedia |
UID | User Identifier |
wikipedia |
UPS | Uninterruptible Power Supply |
wikipedia |
USB OTG | Universal Serial Bus On-The-Go |
wikipedia |
UTM | Unified Threat Management |
wikipedia |
VDI/VDE | Virtual Desktop Infrastructure or Virtual Desktop Environment |
wikipedia |
VLAN | Virtual Local Area Network |
wikipedia |
VM | Virtual Machine |
wikipedia |
VMM | Virtual Machine Manager |
wikipedia |
VoIP | Voice over IP |
wikipedia |
VPN | Virtual Private Network |
wikipedia |
WAF | Web Application Firewall |
wikipedia |
WAP | Wireless Access Point |
wikipedia |
WEP | Wired Equivalent Privacy |
wikipedia |
WPA | Wi-Fi Protected Access |
wikipedia |
WPS | Wi-Fi Protected Setup |
wikipedia |
XML | Extensible Markup Language |
wikipedia |
XSRF | Cross-Site Request Forgery |
wikipedia |
XSS | Cross-Site Scripting |
wikipedia |
Port number | Service | Wikipedia |
---|---|---|
TCP 20 | FTP data transfer |
wikipedia |
TCP 21 | FTP control / command |
wikipedia |
TCP 22 | SSH Secure Shell , SFTP, SCP |
wikipedia |
TCP 23 | TELNET |
wikipedia |
TCP 25/587 | SMTP Simple Mail Transfer Protocol |
wikipedia |
TCP/UDP 49 | TACACS login host protocol |
wikipedia |
TCP/UDP 53 | DNS Domain Name System |
wikipedia |
UDP 67,68 | DHCP Dynamic Host Configuration Protocol |
wikipedia |
UDP 69 | TFTP trivial file transfer protocol |
wikipedia |
TCP 80 | HTTP |
wikipedia |
TCP 88 | KERBEROS authentication system |
wikipedia |
TCP 110 | POP3 Post Office Protocol v3 |
wikipedia |
TCP 119 | NNTP Network News Transfer Protocol |
wikipedia |
UDP 123 | NTP Network Time Protocol |
wikipedia |
TCP/UDP 135 | RPC Remote Procedure Call |
wikipedia |
TCP/UDP 137-139 | NetBIOS Network Basic I/O System |
wikipedia |
TCP 143 | IMAP Internet Mail Access Protocol |
wikipedia |
UDP 161 | SNMP Simple Network Management Protocol |
wikipedia |
TCP/UDP 162 | SNMPTRAP Simple Network Management Protocol Trap |
wikipedia |
TCP 389 | LDAP |
wikipedia |
TCP 443 | HTTPS |
wikipedia |
TCP 445 | CIFS / SMB Server Message Block |
wikipedia |
TCP 465 | SMTPS Simple Mail Transfer Protocol over SSL/TLS |
wikipedia |
UDP 514 | Syslog |
wikipedia |
TCP 636 | LDAPS Lightweight Directory Access Protocol over TLS/SSL |
wikipedia |
TCP 860 | iSCSI internet Small Computer Systems Interface |
wikipedia |
TCP/UDP 989 | FTPS, FTP over TLS/SSL, data |
wikipedia |
TCP/UDP 990 | FTPS, FTP over TLS/SSL, control |
wikipedia |
TCP 993 | IMAPS4, Internet Message Access Protocol over TLS/SSL |
wikipedia |
TCP 995 | POP3S, Post Office Protocol 3 over TLS/SSL |
wikipedia |
TCP 1433 | MS-SQL Service |
wikipedia |
UDP 1701 | L2TP Layer 2 Tunneling Protocol |
wikipedia |
TCP 1723 | PPTP Point-to-Point Tunneling Protocol |
wikipedia |
UDP 1812/1813 | RADIUS |
wikipedia |
TCP/UDP 3389 | RDP Remote Desktop Protocol |
wikipedia |
TCP 3868 | Diameter |
wikipedia |
TCP 6514 | Syslog over TLS |
wikipedia |
Service | Port number | Wikipedia |
---|---|---|
FTP data transfer | TCP 20 |
wikipedia |
FTP control / command | TCP 21 |
wikipedia |
SSH Secure Shell , SFTP, SCP | TCP 22 |
wikipedia |
TELNET | TCP 23 |
wikipedia |
SMTP Simple Mail Transfer Protocol | TCP 25/587 |
wikipedia |
TACACS login host protocol | TCP/UDP 49 |
wikipedia |
DNS Domain Name System | TCP/UDP 53 |
wikipedia |
DHCP Dynamic Host Configuration Protocol | UDP 67,68 |
wikipedia |
TFTP trivial file transfer protocol | UDP 69 |
wikipedia |
HTTP | TCP 80 |
wikipedia |
KERBEROS authentication system | TCP 88 |
wikipedia |
POP3 Post Office Protocol v3 | TCP 110 |
wikipedia |
NNTP Network News Transfer Protocol | TCP 119 |
wikipedia |
NTP Network Time Protocol | UDP 123 |
wikipedia |
RPC Remote Procedure Call | TCP/UDP 135 |
wikipedia |
NetBIOS Network Basic I/O System | TCP/UDP 137-139 |
wikipedia |
IMAP Internet Mail Access Protocol | TCP 143 |
wikipedia |
SNMP Simple Network Management Protocol | UDP 161 |
wikipedia |
SNMPTRAP Simple Network Management Protocol Trap | TCP/UDP 162 |
wikipedia |
LDAP | TCP 389 |
wikipedia |
HTTPS | TCP 443 |
wikipedia |
CIFS / SMB Server Message Block | TCP 445 |
wikipedia |
SMTPS Simple Mail Transfer Protocol over SSL/TLS | TCP 465 |
wikipedia |
Syslog | UDP 514 |
wikipedia |
LDAPS Lightweight Directory Access Protocol over TLS/SSL | TCP 636 |
wikipedia |
iSCSI internet Small Computer Systems Interface | TCP 860 |
wikipedia |
FTPS, FTP over TLS/SSL, data | TCP/UDP 989 |
wikipedia |
FTPS, FTP over TLS/SSL, control | TCP/UDP 990 |
wikipedia |
IMAPS4, Internet Message Access Protocol over TLS/SSL | TCP 993 |
wikipedia |
POP3S, Post Office Protocol 3 over TLS/SSL | TCP 995 |
wikipedia |
MS-SQL Service | TCP 1433 |
wikipedia |
L2TP Layer 2 Tunneling Protocol | UDP 1701 |
wikipedia |
PPTP Point-to-Point Tunneling Protocol | TCP 1723 |
wikipedia |
RADIUS | UDP 1812/1813 |
wikipedia |
RDP Remote Desktop Protocol | TCP/UDP 3389 |
wikipedia |
Diameter | TCP 3868 |
wikipedia |
Syslog over TLS | TCP 6514 |
wikipedia |