2S2D |
Double-Sided Double-Density |
|
2VPCP |
Two-Version Priority Ceiling Protocol |
|
3DES |
Triple Data Encryption Standard |
|
3DESE |
Triple Data Encryption Standard Encryption |
|
3DESEP |
Triple Data Encryption Standard Encryption Protocol |
|
AA |
Awaiting Activation |
|
AA |
Auto-Answer |
|
AAA |
Authentication, Authorization, and Accountability |
|
AAAA |
Authentication, Authorization, Auditing, and Accounting |
|
AAI |
Authentication and Authorization Infrastructure |
|
AAIP |
Authentication and Authorization Infrastructure Project |
|
AAL |
Access Activity Log |
|
AAPR |
Advanced ARJ (Archived by Robert Jung) Password Recovery |
|
ABP |
AdBlock Plus |
|
ABS |
Anti-Blockier-System |
|
ABS |
Active Battery Security |
|
ABU |
Analog Backup |
|
AC |
Access Control |
|
ACCE |
Advanced Configurable Crypto Environment |
|
ACE |
Assured Computing Environment (VMware) |
|
ACE |
Access Control Entry |
|
ACES |
Army Communication Encryption System |
|
ACF |
Access Control File |
|
ACFA |
Access-Control Framework Access |
|
ACFT |
Advanced Computer Forensic Techniques |
|
ACFTT |
Advanced Computer Forensic Techniques Training |
|
acid |
Analysis Console for Incident Databases |
|
ACID |
Anti-Copying In Design |
|
ACIT |
Advanced Countermeasures for Insider Threats |
|
ACMP |
Access Control Management Program |
|
ACPI |
Advanced Configuration and Power Interface |
|
ACRU |
Active Confirmed Registered User |
|
ACS |
Accredited Certification Scheme |
|
ACS |
Authenticated Content Signing |
|
ACS |
Access Control System出入控制系统 |
|
ACT |
Access Coordination Team |
|
ACU |
Access Control Unit |
|
ADFT |
Advanced Digital Forensic Techniques |
|
ADG |
Advanced Data Guardian |
|
ADHOC |
Associated Destructive Hackers Of Columbia |
|
ADK |
Additional Decryption Key |
|
ADMS |
Advanced Distributed Monitoring System |
|
ADPSO |
Automatic Data Processing Security Officer |
|
ADPSP |
Automatic Data Processing Security Plan |
|
ADPSSO |
Automatic Data Processing System Security Officer |
|
ADSS |
Access Decision Support Services |
|
ADT |
Ant Detection Technology |
|
ADT |
Advanced Development Tool |
|
AERN |
Advanced EAS (Emergency Alert System) Relay Network |
|
AES |
Advanced Encryption Standard |
|
AESD |
Advanced Encryption Standard Development |
|
AESDE |
Advanced Encryption Standard Development Effort |
|
AET |
Advanced Encryption Technology |
|
AFD |
Auto Format Decode |
|
AFEKMS |
Air Force Electronic Key Management System |
|
AFKMS |
Air Force Key Management System |
|
AFS |
American Filing System |
|
AFSS |
AuthenTec Fingerprint Security System |
|
AGDLP |
Account, Global, Domain, Local, Permissions |
|
AHS |
Advanced Habbo Security |
|
AIP |
Application Integrity Policy |
|
AISECPOL |
Assimilation of Integral SECurity POLicies |
|
AITS |
Advanced Interface for Tactical Security |
|
AIV |
Artificially Intelligent Virus |
|
AKM |
Automated Key Management |
|
AKMC |
Automated Key Management Center |
|
AKMS |
Automated Key Management System |
|
ANDF |
Architectural Neutral Distribution Format |
|
ANR |
Automatic Network Replenishment |
|
ANTS |
A New Trojan Scanner |
|
APAP |
Army Privacy Act Program |
|
APARS |
Auto Permissioning, Authorization, and Reporting System |
|
APAS |
Automated Prior Authorization System |
|
APF |
Advance Policy Firewall |
|
APG |
Automated Password Generator |
|
APKI |
Architecture for Public Key Infrastructure |
|
APKS |
All Pairwise Key Scheme |
|
app |
Application Peering Protocol |
|
APP |
Application Portability Profile |
|
app |
Application Program Package |
|
APP |
Application Transport Parameter |
|
APP |
Application Program Processor |
|
APP |
Application Marker |
|
APP |
Application Programming Platform |
|
APP |
Application-specific functions |
|
APP |
Application Program |
|
APP |
Application |
|
APP |
Applications Programme Department |
|
APT |
Anti-Piracy Technology |
|
APWG |
Anti-Phishing Working Group |
|
ARC |
Authenticated Request Code |
|
ARIA |
Acceptable Risk, Incorrect Acceptance |
|
ARO |
Annualized Rate of Occurrence |
|
ARS |
Autonomously Replicating Sequence |
|
ASA |
Adaptive Security Appliance |
|
ASA |
After Security Advisory |
|
ASA |
Adaptive Security Algorithm |
|
ASA |
Automatic System Access |
|
ASAC |
Application Security Attack Components |
|
ASAP |
Application System Authorization Process |
|
ASDA |
Application Security Design Assessment |
|
ASIC |
Australian Securities & Investments Commission |
|
ASIO |
Australian Security Intelligence Organization |
|
ASIS |
American Society for Industrial Security |
|
ASIS |
Application Software Installation Server |
|
ASKMM |
Advanced Standard Key Management Module |
|
ASLC |
Application Security Life Cycle |
|
ASPECT |
Automated Security Protocol Examination and Checking Tool |
|
ASPI |
Advanced SCSI (Small Computer System Interface) Programming Interface |
|
ASVS |
Application Security Verification Standard |
|
ATA |
Advanced Technology Attachment |
|
ATO |
Authority to Operate |
|
AU |
Authenticated User |
|
AU |
Authorized User |
|
AUP |
Acceptible Use Policy |
|
AUS |
Anonymous Undeniable Signature |
|
AV |
Anti-Virus |
|
AV |
Access violation |
|
AVC |
Access Vector Cache |
|
AVC |
AntiVirus Comparatives |
|
AVERT |
Anti-Virus Emergency Response Team |
|
AVG |
Anti-Virus Group |
|
AVG |
Anti-Viral Guard |
|
AVI |
Audio Video Interleave |
|
AVP |
Anti-Virus Protection |
|
AVPE |
Anti-Virus Policy Enforcement |
|
AVS |
Anti-Virus Station |
|
AVS |
Access Verification Service |
|
AVZ |
AntiVirus by Oleg Zaitsev |
|
B |
Breach |
|
BBWC |
Battery-Backed Write Cache |
|
BCCM |
Business Continuity Consultancy and Management |
|
BCH |
Bose, Chaudhuri, Hocquengum |
|
BCI |
Business Continuity Institute |
|
BEF |
Browser Exploitation Framework |
|
BEK |
Bulk Encryption Key |
|
BI |
Business Interruption |
|
BIS |
Boot Integrity Service |
|
BISF |
Business Information Security Firewall |
|
BITNET |
Because It is Time NETwork |
|
BKE |
Bilateral Key Exchange |
|
BKL |
Big Kernel Lock |
|
BOS |
Best of Security |
|
BPE |
Byte pair encoding |
|
BPI |
Baseline Privacy Interface |
|
BSG |
Belonging Security Goal |
|
BSP |
Best Security Practices |
|
BT |
Back Trace |
|
BUDR |
Back-Up and Disaster Recovery |
|
BWF |
Barbed Wire Fence |
|
CA |
Certificate Authority |
|
CA |
Conditional Access |
|
CAA |
Collusion Attack Algorithm |
|
CAAR |
Computer Assisted Accreditation Reporting |
|
CAAS |
Common Authentication and Authorization Service |
|
CACI |
Controlling Access to Computer Information |
|
CACRL |
Custodian Authorization Custody Receipt Listing |
|
CAG |
Citrix Access Gateway |
|
CAL |
Client Access License |
|
CALEA |
Communications Assistance for Law Enforcement Act |
|
CALS |
Consolidated Accreditation and Licensure Survey |
|
CAMEO |
Computer-Aided Management of Emergency Operations System |
|
CAPI |
Cryptography Application Programming Interface |
|
CAS |
CPE (Customer Premise Equipment) Alert Signal |
|
CAS |
Central Authentication Service |
|
CAS |
Conditional Access System |
|
CASS |
Computer Automated Security System |
|
CASS |
Certification and Accreditation Support System |
|
CAT |
Crisis Action Team |
|
CAU |
Control Access Unit |
|
CAVE |
Cellular Authentication and Voice Encryption Algorithm |
|
CBL |
Composite Blocking List |
|
CC |
Common Core |
|
CC |
Common Criteria |
|
CC |
Command Code |
|
CCA |
Chosen Ciphertext Attack |
|
CCC |
Card Capabilities Container |
|
CCI |
Controlled Cryptographic Item |
|
CCIRC |
Canadian Cyber Incident Response Centre |
|
CCLE |
CheckPoint Certified Licensing Expert |
|
CCMP |
Cipher Block Chaining Message Authentication Code Protocol |
|
CCNA |
Cisco Certified Network Administrator |
|
CCP |
Cryptography Centralized Policy |
|
CCR |
Commitment, Concurrency and Recovery |
|
CCRA |
Common Criteria Recognition Arrangement |
|
CCS |
Coded Character Set |
|
CCS |
Certified Coding Specialist |
|
CCSP |
Cisco Certified Security Professional |
|
CCTL |
Common Criteria Testing Laboratory |
|
CD-ROM XA |
Compact Disc Read-Only Memory eXtended Architecture |
|
CDID |
Cross Divisional Identification |
|
CDP |
Continuous Data Protection |
|
CDS |
Certified Digital Signing |
|
CDSA |
Common Data Security Architecture |
|
CDSSO |
Cross-Domain Single Sign-On |
|
CE |
Communication Encryption |
|
CEH |
Certified Ethical Hacker |
|
CERT |
Computer Emergency Response Team |
|
CEV |
Controlled Environment Vault |
|
CF |
Compact Flash |
|
CFC |
Call for Comments |
|
CFP |
Computers, Freedom, and Privacy |
|
CFS |
Cryptographic File System |
|
CGI |
Common Gateway Interface |
|
CHA |
Concentric Hemispherical Analyzer |
|
CHAP |
Challenge Handshake Authentication Protocol (ATM) |
|
CHFT |
Computer Hacking Forensic Training |
|
CIA |
Confidentiality, Integrity and Availability |
|
CID |
Card Identification Digit |
|
CIP |
Complete Internet Protection |
|
CIP |
Critical Infrastructure Protection (US) |
|
CIRC |
Cross-Interleaved Reed-Solomon Code |
|
CIRC |
Computer Incident Response Capability |
|
CIS |
Center for Internet Security |
|
CISM |
Certified Information Security Manager |
|
CISO |
Chief Information Security Officer |
|
CISP |
Cardholder Information Security Program |
|
CISPA |
Cyber-Intelligence Sharing and Protection Act |
|
CISSP |
Certified Information Systems Security Professional |
|
CK |
Crypto Key |
|
CK |
Clear Key |
|
CKDS |
Cryptographic Key Data Set |
|
CL |
Counter Lock |
|
CLASP |
Comprehensive, Lightweight Application Security Process |
|
CLSID |
Computer Licence Security ID |
|
CM |
Codebook Mapping |
|
CM |
Cryptological Mathematics |
|
CMA |
Control and Monitoring Agent |
|
CMC |
Certificate Management protocol using CMS |
|
CME |
Cellular Message Encryption |
|
CMEA |
Cellular Message Encryption Algorithm |
|
CMK |
Complete Match Key |
|
CMMI |
Capability Maturity Model Integrated |
|
CMPPA |
Computer Matching and Privacy Protection Act of 1988 |
|
CMS |
Classic Mole Style |
|
CMS |
Cryptographic Message Syntax |
|
cms |
Certificate Management Services |
|
CMW |
Compartmented Mode Workstation |
|
CNS |
Computer and Network Security |
|
COAST |
Computer Operations Audit and Security Tools |
|
COAX |
Coaxial |
|
COMDEX |
Computer Dealers Exposition |
|
COMPASS |
COMPuter ASSurance Conference |
|
COMPUSEC |
Computer Security |
|
COMSEC |
Communications Security (military) |
|
COOP |
Continuity of Operations |
|
COOP |
Continuity of Operations Procedure |
|
COOP |
Continuity of Operations Program |
|
COOP |
Continuity of Operations Project |
|
coop |
Continuity of Operations Policy |
|
COPS |
Computer Oracle and Password System |
|
COW |
Computer On Wheels |
|
CP |
Compact Policy |
|
CP |
Copy Protected |
|
CP |
Code Page |
|
CPA |
Chosen-Plaintext Attack |
|
CPC |
Cyberarmy Privacy Commission |
|
CPL |
Current Privilege Level |
|
CPLD |
Complex Programmable Logic Device |
|
CPRM |
Content Protection for Recordable Media |
|
CPS |
Current Protection Subdomain |
|
CPSA |
Content Protection System Architecture |
|
CPW |
Check Password |
|
CRACK |
Challenge Response for Authenticated Cryptographic Keys |
|
CRAM |
Challenge-Response Authentication Mechanism |
|
CRAP |
Challenge Response Authentication Program |
|
CRHF |
Collision-Resistant Hash Function |
|
CRL |
Certificate Revocation List |
|
CRR |
Cyber Resilience Review |
|
CRS |
Carrier Router System |
|
CRS |
Certificate Retrieval System |
|
CRV |
Connectivity, Reliability, and Value |
|
CS |
Coding Scheme |
|
CS |
Case Sensitive |
|
CSA |
Cisco Security Agent |
|
CSAC |
Cross Signature Assurance Criterion |
|
CSAC |
Computer Security Advisory Committee |
|
CSAD |
Computer Security Awareness Day |
|
CSC |
Computer Software Component |
|
CSC |
Card Security Code |
|
CSCI |
Computer Systems Center Incorporated |
|
CSDII |
Cross-Sector Digital Identity Initiative |
|
CSIRC |
Computer Security Incident Response Capability |
|
CSIRT |
Computer Security Incident Response Team |
|
CSIS |
Canadian Security Intelligence Service |
|
CSM |
Cryptographic Services Module |
|
CSO |
Computer Security Officer |
|
CSP |
Certificate Service Provider |
|
CSP |
Computer Security Plan |
|
CSR |
Certificate Signing Request |
|
CSRF |
Cross-Site Request Forgery |
|
CSS |
Client Security Software |
|
CSVC |
Computer System Validation Compliance |
|
CSVN |
Consistent SubVersioN |
|
CT |
Cipher Text |
|
CTL |
Certificate Trust List |
|
CTVS |
Cap Token Verification Service |
|
CUSIP |
Committee of Uniform Security Identification Procedures |
|
CVE |
Common Vulnerabilities and Exposures |
|
CVI |
Cyber Viral Implant |
|
CVP |
Content Vector Protocol |
|
CVTP |
Certified Vaulting Technology Professional |
|
CVV |
Creditcard Verification Value |
|
CVV |
Card Verification Value |
|
DACS |
Distributed Access Control System |
|
DASD |
Direct Access Storage Device |
|
DBDP |
Disk Based Data Protection |
|
DBM |
DataBase Maintenance |
|
DC |
Double Check (valve used to protect water supplies) |
|
DCC |
Distributed Checksum Clearinghouse |
|
DCHT |
Development Capricorns Hack Team |
|
DCMS |
Distributed Certificate Management System |
|
DCOM |
Distributed Component Object Model |
|
DCP |
Defense Continuity Program |
|
DCP |
Data Compression Protocol |
|
DCS |
Device Control String |
|
DCS |
Disaster Control Squad |
|
DDOS |
Distributed Denial of Service |
|
DDRM |
Dynamic Digital Right Management |
|
DEA |
Data Encryption Algorithm |
|
DeCSS |
Decrypt Content Scrambling System |
|
DES |
Data Encryption Standard |
|
DES-CBC |
Data Encryption Standard-Cipher Block Chaining |
|
DES/CBC |
Data Encryption Standard/Cipher Block Chaining |
|
DESCBC |
Data Encryption Standard/Cipher Block Chaining |
|
DH |
Diffie-Hellman |
|
DHK |
Diffie Hellman Knowledge |
|
DHS |
Deceptive Header Screening |
|
DITSCAP |
Defense Information Technology Security Certification and Accreditation Program |
|
DJ |
Dumpster Jockey |
|
DKG |
Decryption Key Generator |
|
DL |
Download Link |
|
dL |
Download Last |
|
DL |
Download |
|
DLD |
Default Logging Destination |
|
DLF |
Definable Logging Format |
|
DLM |
Dynamic Link Module |
|
DLP |
Data Leak Prevention |
|
DLP |
Data Loss Prevention |
|
DLT |
Direct Linear Transformation |
|
DMCA |
Digital Millenium Copyright Act |
|
DML |
Display Message Log |
|
DMTC |
Disaster Management Training Course |
|
DMV |
Document Macro Virus |
|
DNSBL |
Domain Name Server Block List |
|
DNSSEC |
Domain Name System Security Extensions |
|
DNT |
Do Not Track |
|
DOD |
United States Department of Defense |
|
DOG |
Disaster Operations Group |
|
DOI |
Domain Of Interpretation |
|
DOS |
Denial Of Service |
|
DOWS |
Duck Operated Warning System |
|
DP |
Data Privacy |
|
DP |
Diverse Protection |
|
DPA |
Data Privacy Algorithm |
|
DPA |
Dynamic PolyAlphabetic |
|
DPNSS |
Digital Private Network Signalling System |
|
DPSWG |
Digital Privacy and Security Working Group |
|
DPU |
Data Protection Unit |
|
DRAM |
Dynamic Random Access Memory (dee-ram) (computing) |
|
DRAR |
Data Recovery And Repair |
|
DRM |
Disaster Recovery Management |
|
DRM |
Digital Rights Management |
|
DSA |
Digital Signature Algorithm |
|
DSC |
Digital Security Controls |
|
DSCA |
Dynamic Security Control Architecture |
|
DSK |
Down-Stream Key |
|
DSK |
Directory Style Key |
|
DSL |
Days Since Login |
|
DSLAM |
Digital Subscriber Line Access Multiplexer (Module) |
|
DSMP |
Data and Safety Monitoring Plans |
|
DSS |
Digital Signature Standard |
|
DSS |
Data Security Standard |
|
DST |
Distributed Spam Trap |
|
DST |
Digital Signature Transponder |
|
DT |
Deletion Tracking |
|
DT |
Don't Trust |
|
DTO |
Denial To Operate |
|
DUKPT |
Derived Unique Key Per Transaction |
|
DVP |
Dynamic Virus Protection |
|
DVP |
Digital Voice Privacy |
|
DWH |
Deep and Wide Hash |
|
E |
Encryption |
|
E3 |
End-to-End Encryption |
|
EA |
Extended Attribute |
|
EAD |
Encoded Archival Description |
|
EAL |
Evaluation Assurance Level |
|
EAP |
Electronic Authentication Partnership |
|
EBB |
Encoder Breakout Board |
|
EBS |
Enterprise Backup Solution |
|
EBSI |
Enhanced Backup Solutions Initiative |
|
EC |
Embedded Communication |
|
EC |
Encryption Control |
|
ECA |
External Certificate Authority |
|
ECC |
Electronic Check Conversion |
|
ECC |
Elliptic Curve Cryptography |
|
ECCO |
Emergency Computer Crisis Organization |
|
ECDL |
Elliptic Curve Discrete Logarithm |
|
ECES |
Elliptic Curve Encryption Scheme |
|
ECL |
Encoder Control List |
|
ECL |
Exit Control List |
|
ECMEA |
Enhanced Cellular Message Encryption Algorithm |
|
ECP |
Encryption Control Protocol |
|
ECPA |
Electronic Communications Privacy Act 1986 |
|
ECS |
Encryption Control System |
|
ED |
Encryption Device |
|
EDAC |
Evidence-Based Design Accreditation and Certification |
|
EDES |
Electronic Document Encryption System |
|
EDESP |
Endorsed Data Encryption Standard Product |
|
EDESPL |
Endorsed Data Encryption Standard Products List |
|
EDS |
Emergency Disaster Services |
|
EED |
Encryption and Encapsulation Device |
|
EEE |
End-To-End Encryption |
|
EEPROM |
Electrically Erasable Programmable Read-Only Memory |
|
EES |
Escrow(ed) Encryption Standard |
|
EFF |
Electronic Frontier Foundation |
|
EFS |
Encrypting File System |
|
EIA |
Entry Identification and Access |
|
EIGRP |
Enhanced Interior Gateway Routing Protocol |
|
EKG |
Encryption Key Generator |
|
EKM |
Electronic Key Management |
|
EKMC |
Electronic Key Management Center |
|
EKMP |
Electronic Key Management Protocol |
|
EKMS |
Electronic Key Management System |
|
EKOR |
Trojan Backdoor.Sdbot.AQ computer virus |
|
EL |
Encryption Licensing |
|
ELS |
Equidistant Letter Sequence |
|
EM64T |
Extended Memory 64-bit Technology |
|
EMACS |
Editor MACroS |
|
EMS |
Electronic Media Sanitization |
|
ENDEX |
End of Exercise |
|
ENISA |
European Network and Information Security Agency |
|
EPD |
Equipment Protective Device |
|
EPE |
Enhanced Privacy and Encryption |
|
EPI |
Electronic Privacy Information |
|
EPIC |
Electronic Privacy Information Center |
|
EPOC |
Enhanced Protection of Content |
|
EPON |
Ethernet Passive Optical Network |
|
EQ |
Estimation-Quantization (type of coder) |
|
ES |
Encryption Scheme |
|
ESA |
Excessive Selective Access |
|
ESD |
Electronic Secure Delivery |
|
ESD |
Event Summary Data |
|
ESP |
Encapsulating Security Payload |
|
ESS |
Emergency Shutdown System |
|
ET |
Extended Technology |
|
EULA |
End User License Agreement (usually in reference to software) |
|
EUSM |
External User Security Model |
|
EUSM |
End-User Spam Management |
|
FA |
False Alarm |
|
FAAP |
False Alarm Analysis Program |
|
FAM |
File Alteration Monitor |
|
FAR |
False Alarm Rate |
|
FARP |
False Alarm Reduction Program |
|
FBE |
Function-Based Encryption |
|
FBI |
Fingerprint Biometric Identity |
|
FCC |
Full Cycle Checking |
|
FCFB |
Fire Classified Floor Box |
|
FDC |
Fault Design Criteria |
|
FDD |
Floppy Disk Drive |
|
FEBA |
Firewalls, Encryption, Backups, and Access |
|
FED |
File Encrypted Data |
|
FEK |
File Encryption Key |
|
FEMA |
Federal Emergency Mangement Agency |
|
FEP |
Forefront Endpoint Protection |
|
FHC |
Fairhaven Hacking Clan |
|
FIC |
Fidelis Interoperable Credential |
|
FOIA |
Freedom of Information Act |
|
FOIP |
Fax Over Internet Protocol |
|
FOSE |
Federal Office Systems Exposition |
|
FPK |
Fast Public Key |
|
FPKI |
Federal Public Key Infrastructure |
|
FPOC |
Fortezza PKI Operations Center |
|
FRAM |
Ferroelectric Random-Access Memory |
|
FSAV |
F-Secure Anti-virus |
|
FSS |
File System Safe |
|
FT |
Fully Trusted |
|
FUD |
Fully Undetected |
|
FUV |
Fordham University Virus |
|
FW |
Fire Wall |
|
FYI |
Filter Your Internet |
|
G4S |
Group 4 Securicor |
|
GABCS |
Government Advisory Board for CyberSecurity |
|
GACL |
Generic Access Control List |
|
GDI |
Graphics Device Interface |
|
GETS |
Government Emergency Telecommunications Service |
|
GIAC |
General Inquiry Access Code |
|
GIG |
Global Information Grid |
|
GINA |
Graphical Interface For Neural Applications |
|
GLESEC |
GLobal Electronic-SECurity |
|
GLT |
Ghetto LAN (Local Area Network) Thugs |
|
GNOME |
GNU Network Object Model Environment |
|
GPE |
Group Policy Editor |
|
GPEE |
General Purpose Encryption Equipment |
|
GPG |
GNU Privacy Guard |
|
GPIB |
General Purpose Interface Bus |
|
GPK |
Gerombolan Pengacau Keamanan (hackers) |
|
GRI |
Guarding Rights Indefinite |
|
GSI |
Grid Security Infrastructure |
|
GSP |
Guardian Service Processor |
|
GUID |
Globally Unique Identifier |
|
GWV |
Gnutella Worm Victim |
|
H |
Hoax |
|
HAC |
Hierarchical Access Control |
|
HAK |
Hacker Assault Kit |
|
HAL |
Hackers At Large |
|
HARS |
Homomorphic Authenticable Ring Signature |
|
HATS |
High Assurance Transformation System |
|
HBA |
Host-Based Authentication |
|
HC |
High Compression |
|
HDC |
Handle for Device Context |
|
HDCP |
High-bandwidth Digital Content Protection |
|
HEAD |
Hand-held Encryption Authentication Device |
|
HEPKI |
Higher Education Public Key Infrastructure |
|
HEX |
Hexadecimal (base 16) |
|
HIDS |
Host Intrusion Detection System |
|
HIP |
Hacking In Progress |
|
HIP |
Host Intrusion Prevention |
|
HIP |
Host Interface Program |
|
HIP |
Health Information Privacy |
|
HIPA |
Health Information Privacy Act of 1999 |
|
HIPAA |
Health Insurance Portability and Accountability Act of 1996 |
|
HIPS |
Host Intrusion Prevention System |
|
HLBR |
Hogwash Light BRidge security software |
|
HMAC |
Hash-Based Message Authentication Code |
|
HOST |
Hotel Operating Statistics |
|
HPA |
Host Protected Area |
|
HSM |
Hardware Security Module |
|
HSP |
Hidden Service Protocol |
|
HSS |
Hierarchical Secure System |
|
HT |
Hash table |
|
HTL |
Hack Tracking Log |
|
HTS |
Hack This Site |
|
https |
HyperText Transfer Protocol Secure |
|
HUGS |
Harness Ultra Guard System |
|
I |
Insecure |
|
IA |
Information Assurance |
|
IA |
Impersonation Attack |
|
IA |
Instant Access |
|
IA |
Identification Authentication |
|
IAAC |
Information Assurance Advisory Council |
|
IACE |
Information Assurance Courseware Evaluation |
|
IACR |
International Association for Cryptologic Research |
|
IAM |
Identity and Access Management |
|
IAO |
Information Assurance Officer |
|
IAP |
Information Assurance Program |
|
IAPC |
International Audit Protocol Consortium |
|
IASE |
Internet Application Security Environment |
|
IASE |
Information Assurance Support Environment |
|
IBE |
Identity-Based Encryption |
|
IBTT |
Identity-Based Traitor Tracing |
|
IC |
Identification Code |
|
ICE |
Intrusion Countermeasures Electronics |
|
ICE |
Immigration and Customs Enforcement |
|
ICF |
Internet Connection Firewall |
|
ICM |
Integrated Cybercrime Management |
|
ICS |
Inexpensive Cloaking Script |
|
ICS |
Ideal Costa Scheme |
|
ICSA |
International Computer Security Association |
|
ICSF |
Institute for Computer Security and Forensics |
|
ICT |
Instant Center Tracking |
|
ICV |
Integrated Check Vector |
|
ID |
Intrusion Detection |
|
IDE |
Integrated Drive Electronics |
|
IDEA |
International Data Encryption Algorithm |
|
IDEAS |
Internet Design Engineering And Security |
|
IdM |
Identity Management |
|
IDMS |
Intrusion Detection Mitigation System |
|
IDP |
Intrusion Detection and Prevention |
|
IDPS |
Intrusion Detection and Prevention Service |
|
IDR |
Intelligent Disaster Recovery |
|
IDS |
Interface Domain Signature |
|
IDS |
Intrusion Detection System |
|
IDSC |
Intrusion Detection Systems Consortium |
|
IE |
Intelligent Encryption |
|
IE |
Internet Explorer |
|
IEEE |
Institute of Electrical and Electronics Engineers |
|
IEEE-CS |
Institute of Electrical and Electronics Engineers Computer Society |
|
IEEE-SA |
Institute of Electrical and Electronics Engineers - Standards Association |
|
IETF |
Intensional Existential Textuality Fanatics |
|
IF |
Information Foraging |
|
IFS |
Internet Fraud Screen |
|
IIS |
Insecure Infiltration System |
|
IIS |
Instant Insecure Server |
|
IJB |
Internet JunkBuster |
|
IKE |
Internet Key Encryption |
|
IKE |
Implicit Key Expiration |
|
IKEP |
Internet Key Encryption Protocol |
|
IKES |
Internet Key Encryption System |
|
IKG |
Internet Key Generator |
|
IKM |
Internet Key Management |
|
IKMP |
Internet Key Management Protocol |
|
IKP |
Internet-Keyed Payment |
|
ILE |
In-Line network Encryption |
|
ILRT |
Industry Loss Reduction Team |
|
ILS |
Internet Locator Server |
|
IM |
Instant Messenger |
|
IMP |
Identifying, Monitoring, and Protecting |
|
IMSS |
InterScan Messaging Security Suite |
|
INE |
Improved Network Encryption |
|
INES |
Improved Network Encryption Systems |
|
INSS |
Internal Network Security Sweep |
|
IOC |
Infrastructure Operating Center |
|
IP |
Ingress Protection |
|
IPC |
Internet Protection Community |
|
IPC |
Internet Privacy Coalition |
|
IPEM |
Internet Privacy Enhanced Mail |
|
IPES |
Improved Proposed Encryption Standard |
|
ipki |
Internet X.509 Public Key Infrastructure |
|
IPL |
Interim Parts Library |
|
IPO |
Input Process Output |
|
IPP |
Identity Preservation Program |
|
IPS |
Intrusion Prevention System |
|
IPsec |
Internet Protocol SECurity protocol |
|
IPV4 |
Internet Protocol Version 4 |
|
IPV6 |
Internet Protocol Version 6 |
|
IPWG |
Interactive Privacy Working Group |
|
IRF |
Inherited Rights and Filters |
|
IRIS |
Incident Resolution Information System |
|
ISA |
Internet Security and Acceleration Server |
|
ISA |
Internal Security Act |
|
ISAKMP |
Internet Security Association and Key Management Protocol |
|
ISAM |
Information Security Awareness Month |
|
ISAR |
Internet Security Assessment of Risks |
|
ISATP |
Information Security Awareness Training Program |
|
ISBG |
International Security Buyers Guide |
|
ISBK |
Improved Self-configured scheme for Boot-strapping Keys |
|
ISBS |
Information Security Breaches Survey |
|
ISC2 |
International Information Systems Security Certification Consortium, Inc. |
|
ISDP |
Information Sharing Data Protection |
|
ISIS |
Isis Stands For Integrated Security |
|
ISM |
Information Security Management |
|
ISMS |
Information Security Management System |
|
ISO |
Initial Sign-On |
|
ISP |
Internet Security Protocol |
|
ISSA |
Information Security for South Africa |
|
ISSA |
Information Systems Security Association |
|
ISSIP |
Information System Security Implementation Process |
|
ISSO |
Information Systems Security Officer |
|
ISTS |
Institute for Security Technology and Society |
|
IT |
Information Trickery |
|
ITC |
Information Trust Corporation |
|
ITH |
Item That's Hacked |
|
ITP |
Information Technology Probers |
|
ITSEC |
Information Technology Security Evaluation Criteria |
|
ITU |
International Telecommunication Union |
|
IWA |
Integrated Windows Authentication |
|
JCA |
Java Cryptography Architecture |
|
JCE |
Java Cryptography Extensions |
|
JCSR |
Japan Computer Security Research |
|
JCSV |
JCV/SV40 hybrid Virus |
|
JIAS |
Journal of Information Assurance and Security |
|
JITA |
Just In Time Authentication |
|
JKM |
Joint Key Management |
|
JKMI |
Joint Key Management Infrastructure |
|
JKMIWG |
Joint Key Management Infrastructure Working Group |
|
JKMP |
Joint Key Management Plan |
|
JKMS |
Joint Key Management System |
|
JMP1 |
Password Over-ride JuMPer number one |
|
JPG |
Joint Photographic Experts Group picture file |
|
K |
Key Generator |
|
K |
Key |
|
K |
Key/Black |
|
KA |
Key Address |
|
KAM |
Key Account Management |
|
KAMP |
Key Account Management Protocol |
|
KAMS |
Key Account Management System |
|
KC |
Key Conversion |
|
KC |
Key Code |
|
KCN |
Key Conversion Notice |
|
KCSA |
Key Control Self-Assessment |
|
KCT |
Key Conversion Time |
|
KD |
Key Define |
|
KD |
Key Data |
|
KDC |
Kerberos Key Distribution Center |
|
KDM |
Key Dependent Message |
|
KEA |
Key Exchange Algorithm |
|
KEA |
Known Exponent Attack |
|
KEK |
Key Encryption Key (COMSEC Key) |
|
KES |
Keyless Entry System |
|
KF |
Keyed File |
|
KG |
Key Generation |
|
KGU |
Crypto Generator Unit |
|
KHG |
Kernel Hackers' Guide |
|
KIF |
Key Interchange Format |
|
KIP |
Key management for Internet Protocols |
|
KISS |
Keep Internet Security Simple |
|
KKDC |
Kerberos Key Distribution Center |
|
KL |
Key Length |
|
KM |
Key Management |
|
KMASE |
Key Management Application Service Element |
|
KMC |
Key Management Center |
|
KMD |
Key Management Device |
|
KMF |
Key Management Facility |
|
KMI |
Key Management Infrastructure |
|
KMID |
Key Management Identification |
|
KMIP |
Key Management Interoperability Protocol |
|
KMP |
Key Management Protocol |
|
KMPDU |
Key Management Protocol Data Unit |
|
KMSA |
Key Management System Agent |
|
KMSS |
Key Management Software Support |
|
KMSSA |
Key Management Software Support Agent |
|
KMU |
Key Management User |
|
KMUA |
Key Management User Agent |
|
KP |
Key Pulse |
|
KP |
Key Pair |
|
KPCM |
Key Privilege and Certificate Management |
|
KS |
Key Stage |
|
KS |
Key Sign |
|
KSK |
Key Signing Key |
|
KSSA |
Kurt Seifried Security Advisory |
|
KSU |
Key Service Unit |
|
KU |
Keyed Unique |
|
KV |
Key Variable |
|
KVL |
Key Variable Loader |
|
KVM |
Key Variable Management |
|
KVMP |
Key Variable Management Protocol |
|
KVMP |
Key Variable Management Plan |
|
KVMPR |
Key Variable Management Procedures |
|
KVMS |
Key Variable Management System |
|
LAN |
Local Area Network |
|
LB |
Lock Bit |
|
LCEAD |
Low-Cost Encryption and Authentication Device |
|
LCED |
Low-Cost Encryption Device |
|
LDAP |
Lightweight Directory Access Protocol (pronounced Ell-dap) |
|
LDIF |
LDAP (Lightweight Directory Access Protocol) Data Interchange Format |
|
LE |
Live Encoding |
|
LEDS |
Lightweight Easy Debugging Service |
|
LGPO |
Local Group Policy Object |
|
LIDS |
Linux Intrusion Detection System |
|
Liu |
Logged In User |
|
LLI |
Last Login Identification |
|
LO |
Log Out |
|
LOC |
Low Overhead Cipher |
|
LoH |
List Of Hashes |
|
LOSC |
Letter Of Security Cognizance |
|
LRC |
Longitudinal Redundancy Check |
|
LSASS |
Local Security Authority Subsystem Service |
|
LSM |
Linux Security Module |
|
LSO |
Local Shared Objects |
|
LSS |
Location Signature Sensor |
|
LUA |
Least-privileged User Account |
|
LUP |
Least User Privilege |
|
LVE |
Lightweight Virtual Environment |
|
LVQ |
Learning Vector Quantization |
|
LWS |
Light-Weight System |
|
LWS |
Link WorkStation |
|
LWST |
Lowest |
|
LZW |
Lempel-Ziv-Welch |
|
M/S |
Master/Session |
|
MAA |
Message Authentication Algorithm |
|
MAAM |
Modular Authentication and Authorization Middleware |
|
MAAWG |
Messaging Anti-Abuse Working Group |
|
MAC |
Message Authentication Code |
|
MACI |
Multiple-Access Cryptographic Interface |
|
MACID |
Medium Access Control IDentifier |
|
MACS |
Monitor And Control System |
|
MAIS |
Murdoch Authentication and Identification System |
|
MAPS |
Mail Abuse Protection System |
|
MASK |
Modified Advanced Standard Key |
|
MASKM |
Modified Advanced Standard Key Management |
|
MASKMM |
Modified Advanced Standard Key Management Module |
|
MB |
MegaBytes |
|
MBAE |
MalwareBytes Anti-Exploit |
|
MBAM |
Malware Bytes Anti-Malware |
|
MCFA |
Mirox Cyber Force Academy |
|
mCG |
Meta Certificate Group |
|
MCRC |
Malicious Code Research Center |
|
MD |
Mini-Disk |
|
MDC |
Modification Detection Code |
|
MDC |
Message Digest Cipher |
|
ME |
Message Encryption |
|
ME |
Malicious Environment |
|
MEA |
Message Encryption Algorithm |
|
MEK |
Message Encryption Key |
|
MEL |
MIME (Multipurpose Internet Mail Extensions) Encoding Library |
|
MESH |
Multimedia Embedded Security Hub |
|
MFA |
Multi-Factor Authentication |
|
MGE |
Multi Gauntlet Emulator |
|
MI |
Message Invader |
|
MIC |
Message Integrity Code |
|
MICR |
Magnetic Ink Character Recognition |
|
MIDAS |
Monitoring Intrusion Detection and Administration Server |
|
MIME |
Multipurpose Internet Mail Extensions |
|
MIPS |
Million Instructions Per Second |
|
MISK |
McGruff Internet Safety Kit |
|
MK |
Modular Key |
|
MKB |
Media Key Block |
|
MKM |
Modular Key Management |
|
MKMP |
Modular Key Management Protocol |
|
MLE |
Multiple Line Encryption |
|
MLES |
Multiple Line Encryption System |
|
MLR |
Master Lock Resettable |
|
MLS |
Multiple Licensing Service |
|
MLS |
Multi-Level Security |
|
MMDS |
Multichannel Multipoint Distribution Service |
|
MMH |
Multilinear Modular Hashing |
|
MNF |
Multi-Network Firewall |
|
MOD |
Methods Of Destruction |
|
MOLE |
Multichannel Occurrent Logger Evaluator |
|
MOP |
Means of Production |
|
MOSS |
MIME (Multi-purpose Internet Mail Extensions) Object Security Services |
|
MOST |
Michigan Online Security Training |
|
MP |
Message Protector |
|
MPC |
Multimedia Personal Computer |
|
MPD |
Microsoft Project Database |
|
MPL |
Minumum Pattern Length |
|
MS |
Malicious System |
|
MSA |
Multifunction Security Appliance |
|
MSFT |
Most Secure Firewall Tester |
|
MSS |
Managed Security Services |
|
MSSE |
Microsoft Security Essentials |
|
MSSK |
McGruff Safer Senior Kit |
|
MSV |
Magnetic Strip Verification |
|
MTBF |
Mean Time Between Failures |
|
MTIPS |
Managed Trusted Internet Protocol Service |
|
MTSO |
Mobile Telephone Switching Office |
|
MTTF |
Mean Time To Failure |
|
MYK |
Manage Your Keys |
|
NACL |
Named Access Control List |
|
NADS |
Network Anomaly Detection System |
|
NAM |
Numbered Access Module |
|
NAP |
Network Access Protection |
|
NAS |
Network Authentication Service |
|
NAUP |
Network Acceptable Use Policy |
|
NAV |
Norton Anti-Virus |
|
NBSP |
National Biometric Security Project |
|
NC |
No Check |
|
NCC |
No Cycle Checking |
|
NCER |
Non-Compliance Escalation Report |
|
NCF |
Neutral Code Format |
|
NCSA |
National Computer Security Association |
|
NCSAM |
National Cybersecurity Awareness Month |
|
NE |
Network Encryption |
|
NEK |
Network Encryption Key |
|
NES |
Network Encryption System |
|
NEU |
Network Encryption Unit |
|
NGFW |
Next Generation Firewall |
|
NI |
Not-Inside |
|
NIACAP |
National Information Assurance Certification and Accreditation Process |
|
NICI |
Novell International Cryptographic Infrastructure |
|
NID |
Network Intrusion Detection |
|
NIDS |
Network Intrusion Detection System |
|
NIM |
Not-Inside Message |
|
NINA |
Non-Intrusive Network Assessment |
|
NIS |
Norton Internet Security |
|
NISO |
National Information Standards Organization |
|
NIV |
No Information Verified |
|
NKM |
Navy Key Management |
|
NKMO |
Navy Key Management Officer |
|
NKMS |
Navy Key Management System |
|
NL |
New Lock |
|
NLA |
Network Log Analyzer |
|
NLE |
Network-Layer Encryption |
|
NLI |
Not Logged In |
|
NMH |
Non-linear Modular Hashing |
|
NMU |
Non-Maintainer Uploads |
|
NORA |
Non-Obvious Relationship Awareness |
|
NOSC |
Network Operations Security Center |
|
NOSSA |
Naval Ordnance Safety & Security Activity |
|
NP |
No Password |
|
NPCP |
New Priority Ceiling Protocol |
|
NPF |
Norton Personal Firewall |
|
NPP |
National Privacy Principles |
|
NRP |
Nominal Rate of Protection |
|
NSA |
National Security Agency |
|
NSA |
Network Security Administration |
|
NSIF |
National Security Industry Forum |
|
NSIS |
Nullsoft Scriptable Install System |
|
NSM |
Network Security Manager |
|
NSPK |
Needham-Schroeder Public-Key |
|
NSRL |
National Software Reference Library |
|
NSSA |
National Security Space Architecture |
|
NST |
Network Security Toolkit |
|
NSTIC |
National Strategy on Trusted Identities in Cyberspace |
|
NSTISSAM |
National Security Telecommunications and Information Systems Security Advisory Memorandum |
|
NT |
Not Trusted |
|
NTMG |
Network Threat Management Gateway |
|
NTR |
No Trusting Required |
|
Nu |
New User |
|
NUT |
N-Universal Transformation |
|
NV |
New Variant |
|
NVA |
Network Vulnerability Assessment |
|
NVH |
Network- Vs. Host-based intrusion detection |
|
NVT |
Network Vulnerability Tool |
|
NWS |
Non-Working Software |
|
NYB |
New York Boot virus |
|
OASIS |
Orbis Advanced Security Intruder System |
|
OATH |
Open AuTHentication |
|
OBB |
Orange Book Blog |
|
OCB |
Operational Cipher Block |
|
OcB |
Offset Code Book |
|
OCR |
Optical Character Recognition |
|
ODBE |
Original Dynamic Broadcast Encryption |
|
ODI |
Open Datalink Interface |
|
ODM |
Originally Detectable and Masked |
|
ODMR |
On-Demand Mail Relay |
|
OEC |
Offshore Engineered Component |
|
OEL |
Occupational Exposure Limit |
|
OFC |
Optical Fiber Communications |
|
OGSA-SEC-WG |
Open Grid Services Architecture Security Working Group |
|
OIAP |
Object-Independent Authorization Protocol |
|
OMP |
Online Media Protection |
|
ONC |
OpenNet Controller |
|
ONE |
Optimized Network Encryption |
|
ONVIF |
Open Network Video Interface Forum |
|
OOBA |
Out-Of-Band Authentication |
|
OPA |
Online Privacy Alliance |
|
OPPA |
Online Privacy Protection Act of 2003 |
|
OPSEC |
Open Platform for Secure Enterprise Connectivity |
|
OS |
Operating System |
|
OSD |
Open Source Definition |
|
OSE |
Open Security Exchange |
|
OSG |
Operational Security Guidelines |
|
OSN |
Operator Security Number |
|
OSP |
Operator Security Password |
|
OSSTMM |
Open Source Security Testing Methodology Manual |
|
OT |
Open Trapdoor |
|
OTAC |
One-Time Authorization Code |
|
OTAR |
Over-The-Air Rekeying |
|
OTKSL |
One Time Key Subsidy Lock |
|
OTP |
One Time Password |
|
OTX |
Object Tool eXtended |
|
OW |
Ominous Worms |
|
OWASP |
Open Web Application Security Project |
|
PA |
Privacy Act |
|
PABX |
private automatic branch exchange (telephone) |
|
PAD |
Private Alias Directory |
|
PADS |
Protected Archives Distribution System |
|
PAIN |
Privacy, Authentication, Integrity, and Non-repudiation |
|
PAL |
Personal Access List |
|
PAM |
Pluggable Authentication Modules |
|
PAP |
Password Authentication Protocol (ATM) |
|
PAPA |
Privacy, Accuracy, Property, Accessibility |
|
PAPB |
Payment Application Best Practices |
|
PAPI |
Public And Private Information |
|
PAR |
Privacy Act Release |
|
PARI |
Primary Access Rights Identifier |
|
PARS |
Privacy Act Release Statement |
|
PAS |
Protected Area System |
|
PAs |
Personal Access System |
|
PAS |
Privacy Act Statement |
|
PASR |
Preparatory Action and Security Research |
|
PASS |
Predicate Alteration Security System |
|
PAVA |
Public Address and Voice Alarm System |
|
PBA |
Pre-Boot Authentication |
|
PBC |
Potential Backup Cost |
|
PBE |
Password Based Encryption |
|
PBM |
Partition Boot Manager |
|
PBM |
Passwords by Mask |
|
PC |
Personal computer (host) |
|
PCEF |
Policy and Charging Enforcement Function |
|
PCI DSS |
Payment Card Industry Data Security Standard |
|
PCI SSC |
Payment Card Industry Security Standard Council |
|
PCIS |
Partnership for Critical Infrastructure Security |
|
PCP |
Priority Ceiling Protocol |
|
PCRF |
Policy and Charging Rules Function |
|
PCS |
Permanent Control Security |
|
PD |
Parallel Decode |
|
PE |
Privacy-Enhanced |
|
PED |
Programmable Encryption Device |
|
PEF |
Password Encrypted Format |
|
PEF |
Plain English Firewall |
|
PEM |
Privacy-Enhanced Mail |
|
PENS |
Portcullis Enterprise Network Security |
|
PES |
Proposed Encryption Standard |
|
PF |
Packet Filter |
|
PFS |
Perfect Forward Secrecy |
|
PG |
Privacy Guard |
|
PGP |
Pretty Good Privacy (encryption) |
|
PGPI |
Pretty Good Privacy for the Internet |
|
PHH |
Project Honeypots and Honeynets |
|
PHI |
Protected Health Information |
|
PI |
Personal Information |
|
PIC |
Position Idependent Code |
|
PICS |
Personal Information Communication Storage |
|
PID |
Personal Identity Digit |
|
PIE |
Propagation Infection and Execution |
|
PIFI |
Personally Identifiable Financial Information |
|
PII |
Personally Identifiable Information |
|
PIM |
Personal Information Manual |
|
PIMS |
Personal Information Management System |
|
PIN |
Password Identification Notification |
|
PING |
Privacy Is Not Guaranteed |
|
PIPS |
Pre-Incident Planning System |
|
PIR |
Priority Information Report |
|
PITR |
Point-In-Time Recovery |
|
PIV |
Personal Identity Verification |
|
PIX |
Private Internet Exchange |
|
PK |
Public Key |
|
PK |
Primary Key |
|
PKA |
Public Key Algorithm |
|
PKA |
Public Key Authentication |
|
PKC |
Public Key Cryptography |
|
PKCS |
Public Key Cryptography Standard |
|
PKE |
Public Key Encryption |
|
PKES |
Public Key Enablement Service |
|
PKI |
Public Key Infrastructure (cryptography) |
|
PKIX |
Public Key Infrastructure for X.509 Certificates |
|
PKM |
Personal Knowledge Management |
|
PKM |
Private Key Management |
|
PKO |
Private Key Operation |
|
PKP |
Public Key Partners (A vendor) |
|
PKS |
Public Key System |
|
PKS |
Public Key Server |
|
PKU |
Public Key Unit |
|
PL |
Private Line |
|
PME |
Protection Mitigation and Enhancement |
|
PMS |
Possible Malicious Software |
|
PNE |
Password Never Expires |
|
PnP |
Plug aNd Play |
|
PNR |
Personal Name Record |
|
PPA |
Privacy Protection Act of 1980 |
|
PPE |
Prefix-Preserving Encryption |
|
PPI |
Protected Personal Information |
|
PPK |
Previous Page Key |
|
PPKC |
Probabilistic Public Key Cryptosystem |
|
PPP |
Point-to-Point Protocol |
|
PPP |
Protect Proper Patch |
|
PR |
Password Recovery |
|
PRK |
Password Recovery Key |
|
PRL |
Password Recovery List |
|
PSK |
Pre-Shared Key |
|
PSP |
Perfect Security Property |
|
PSS |
Probabilistic Signature Scheme |
|
PST |
Pipeline Security Technology |
|
PTC |
Polymorphic Tracking Code |
|
PTD |
Password Tracker Deluxe |
|
PTD |
Personal Trusted Device |
|
PTF |
Partition Trace File |
|
PTIN |
Postini Threat Identification Network |
|
PUK |
PIN (Personal Identification Number) Unlocking Key |
|
PUM |
Potentially Unwanted Modification |
|
PUP |
Potentially Unwanted Program |
|
PVG |
Protection of Vulnerable Groups |
|
PVV |
PIN (Personal Identification Number) Verification Value |
|
PWF |
PGP (Pretty-Good Privacy) WinFront |
|
PWK |
PassWord Key |
|
PWL |
Password List (Windows System File Extension .pwl) |
|
PWP |
Password Protected |
|
PWR |
PassWord Recovery |
|
QAL |
Query Answered Log |
|
QAV |
Qubux Anti-Virus |
|
QAZ |
Quick Access Zone |
|
QBP |
QuickBooks Password |
|
QCC |
Quantum Computation/Cryptography |
|
QCM |
Query Certificate Manager |
|
QHJ |
QL Hackers Journal |
|
QKD |
Quantum Key Distribution |
|
QKG |
Quantum Key Generation |
|
QOI |
Quality of Information |
|
QOP |
Quality Of Protection |
|
QPR |
Quicken Password Recovery |
|
QPRK |
Quicken Password Recovery Key |
|
QPSK |
aeronautical quadrature phase shift keying |
|
QQT |
Quick Qard Technology (France) |
|
QRT |
Quick Response Team |
|
QST |
Quality Security Training |
|
QVS |
Quick Verification System |
|
QXR |
Quick Access Recording |
|
QXS |
Quick Access |
|
R |
Reencoding |
|
R-UIM |
Removable-User Identity Module |
|
RA |
Review Access |
|
RA |
Registry Agent |
|
RA |
Registration Authority |
|
RAB |
Remote Alarm Box |
|
RAM |
random-access memory |
|
RAM |
Remote Authorization Mechanism |
|
RAN |
Registration Access Number |
|
RAT |
Remote Access Trojans (CERTs - Hacker Programs) |
|
RBAC |
Role-Based Access Control |
|
RBL |
Real-Time Block List |
|
RBRVS |
Resource-Based Relative Value Scale |
|
RBS |
Remote Backup Software |
|
RC |
Run Commands (UNIX) |
|
RC |
Ron's Cipher |
|
RC |
Rivest Cipher |
|
RCE |
Region Content Encryption |
|
RDC |
Random Data Compression |
|
RDE |
Randomized Data Encryption |
|
RDES |
Randomized Data Encryption Standard |
|
RDT |
Reliable Data Transfer |
|
REMSH |
REMote SHell |
|
REQ |
Requirement |
|
RES |
Revised Encoding Scheme |
|
RFH |
Request for Help |
|
RFID |
Radio Frequency Identification |
|
RFO |
Reason For Outage |
|
RFPA |
Right to Financial Privacy Act of 1978 |
|
RHCSS |
Red Hat Certified Security Specialist |
|
RIC |
Recognizable Interchangeable Combinations |
|
RID |
Remote Intrusion Detector |
|
RIMM |
RAMBUS In-Line Memory Module |
|
RIMS |
Remote Intelligent Monitoring System |
|
RIP |
Regulated Interaction Protocol |
|
RKE |
Remote Keyless Entry |
|
RKP |
Relative Key Position |
|
RKS |
Random Keys Scheme |
|
RKSS |
Random Key Spaces Scheme |
|
RLC |
Rebound Lockout and Compression |
|
RLE |
Run-Length Encoding |
|
RLN |
Release Lock Number |
|
RMF |
Reputation Management Framework |
|
RO |
Ring Out |
|
ROS |
Remote Operations Security |
|
ROT13 |
ROTate 13 encoding |
|
RPA |
Remote Password Authentication |
|
RPA |
Remote Patron Authentication |
|
RPC |
Region Protection Control |
|
RPCA |
Responsable du Plan de Continuité d'Activité |
|
RPG |
Real Private Group |
|
RPG |
Random Password Generator |
|
RPK |
Rapid Public Key |
|
RPKS |
Random Pairwise Keys Scheme |
|
RPL |
Requested Privilege Level |
|
RPO |
Recovery Point Objective |
|
RPSS |
Routing Policy System Security |
|
RPSS |
Reverse Proxy Security Servers |
|
RRD |
Resonant Reed Decoder |
|
RS |
Reed Solomon |
|
RSA |
Rivest-Shamir-Adleman |
|
RSAES-OAEP |
Rivest-Shamir-Adleman Encryption Scheme - Optimal Asymmetric Encryption Padding |
|
RSH |
Remote Shell |
|
RSTR |
Request Security Token Response |
|
RTAL |
Real-Time Audit Log |
|
RTP |
Real-Time Protection |
|
RUID |
Real User Identification |
|
RUIM |
Removable User Identity Module |
|
RWPCP |
Read/Write Priority Ceiling Protocol |
|
RWS |
Roger Wilco Server |
|
S |
Shredder |
|
S |
Secure |
|
S-Box |
Substitution-box |
|
SA |
Security Advisory |
|
SAARS |
Small Authentication And Recording System |
|
SAC |
Slovak Antivirus Center |
|
SAC |
Security Access Console |
|
SAC |
Secure Authenticated Communication |
|
SACL |
System Access Control List |
|
SAD |
Security Association Database |
|
SADA |
Select Agent Distribution Activity |
|
SAFE |
Secure and Fast Encryption |
|
SAFER |
Secure and Fast Encryption Routine |
|
SAGE |
Security Algorithms Group of Experts |
|
SAINT |
Security Alliance for Internet and New Technologies |
|
SAINT |
Security Administrator's Integrated Network Tool |
|
SAL |
Secure Auditing for Linux |
|
SAM |
Symantic Anti-virus for Macintosh |
|
SAML |
Security Assertions Markup Language |
|
SAN |
Storage Area Network |
|
SANE |
Secure Active Network Environment |
|
SANS |
System Administration, Networking, and Security Institute |
|
SAPI |
Speech Application Programming Interface |
|
SAR |
System Activity Report |
|
SARA |
Self Assessment Risk Analysis |
|
SARA |
Symantec Antivirus Research Automation |
|
SARC |
Symantec Antivirus Research Center |
|
SARDS |
Spam Analysis Reporting and Destruction System |
|
SAS |
Scalable Available and Secure |
|
SASKMM |
Sierra-based Advanced Standard Key Management Processor |
|
SATAN |
Security Administrator Tool for Analyzing Networks |
|
SB |
System Border |
|
SBC |
Sub-Band Coding |
|
SBI |
Slip Bluetooth Interface |
|
SBK |
Self-configured scheme for Boot-strapping Keys |
|
SBL |
Spamhaus Block List |
|
SBQ |
Secure Business Quarterly |
|
SBS |
Safe Bolt System |
|
SC |
Single Check |
|
SCAP |
Security Content Automation Protocol |
|
SCED |
Security-Constrained Economic Dispatch |
|
SCEP |
Simple Certificate Enrollment Protocol |
|
SCIP |
Security, Confidentiality, Integrity, and Privacy |
|
SCIP |
Security Cooperation Information Portal |
|
SCM |
Secure Console Management |
|
SCMS |
Secure Console Management Switch |
|
SCP |
Security Certified Program |
|
SCP |
Secure Copy Protocol |
|
SCSI |
Small Computer System Interface |
|
SCV |
Secure Client Verification |
|
SD |
Self Delete |
|
SD |
Secure Digital |
|
SD |
Secure Data |
|
SDC |
Security Data Corporation |
|
SDFI |
Secure Digital Forensic Imaging |
|
SDIO |
Secure Digital Input/Output |
|
SDLC |
Software development life cycle |
|
SDMI |
Secure Digital Music Initiative |
|
SDSI |
Simple Distributed Security Infrastructure |
|
SDSL |
Symmetric Digital Subscriber Line |
|
SE |
Security-Enhanced |
|
SE |
Security Environment |
|
SecaaS |
Security as a Service |
|
SECSH |
SECure SHell |
|
SECT |
Secure Electronic Compliance Technologies |
|
SECTY |
Security |
|
SED |
Secure Encryption Device |
|
SEM |
Security Event Management |
|
SEP |
Secure Execute Processor |
|
SEP |
Single Entry Point |
|
SEP |
Slashdot Effect Protection |
|
SET |
Softcopy Exploitation Tools |
|
SET |
Secure Encryption Technology |
|
SF |
Signature File |
|
SFK |
Security Framework Kit |
|
SFP |
System File Protection |
|
SGC |
Server-Gated Cryptography |
|
SHA |
Secure Hash Algorithm |
|
SHTTP |
Secure Hyper Text Transfer Protocol |
|
SI |
Secure Internet |
|
SIATA |
Security Infrastructure for Agent-based Telecommunication Applications |
|
SIC |
Secure Identification Chip |
|
SIC |
System Integrity Check |
|
SID |
Security Identifier |
|
SID |
Security in Depth |
|
SIM |
Secure Intelligent Menu system |
|
SIN |
Secure Identification Number |
|
SISO |
Soft-Input Soft-Output |
|
SITE |
Sign In To Enter |
|
SK |
Secret Key |
|
SK |
Surrogate Key |
|
SK |
Strengthened Key |
|
SK |
Session Key |
|
SK |
Spatial Key |
|
SK |
Stop Keying |
|
SKA |
Secret Key Algorithm |
|
SKIP |
Simple Key Management for Internet Protocols |
|
SKL |
Site Key Library |
|
SKL |
Simple Key Loader |
|
SKM |
Standard Key Management |
|
SKMM |
Standard Key Management Module |
|
SKMP |
Standard Key Management Protocol |
|
SKS |
Synchronizing Key Server |
|
SKS |
Smart Key System |
|
SKT |
Sectioned Key Tree |
|
SKU |
Security Kernel Unit |
|
SLAM |
Site Logging and Monitoring |
|
SLED |
Specification Language for Encoding and Decoding |
|
SLME |
Select Manual Entry |
|
SLR |
Steam Lock Release |
|
SMC |
SCSI (Small Computer System Interface) Media Changer |
|
SMC |
Super Map Controller |
|
SME |
Short Message Encryption |
|
SMEK |
Short Message Encryption Key |
|
SMIME |
Secure multipurpose Internet Mail Extensions |
|
SMK |
System Multipurpose Key |
|
SMKS |
Single Master Key Scheme |
|
SMM |
System Managers Manual |
|
SMX |
Server Macro Expansion |
|
SNAP |
System Network Advanced Protection |
|
SNAP |
Secure Network Access Platform |
|
SNF |
Single Network Firewall |
|
SNLT |
Speed Negotiation Lock Time |
|
SNP |
Security News Portal |
|
SO |
Sign Out |
|
SOA |
Service-Oriented Architecture |
|
SOAP |
Simple Object Access Protocol |
|
SOAP |
Secure Overlay Access Point |
|
SOC |
Security Operations Center |
|
SORB |
Secure Object Request Broker |
|
SORBS |
Spam and Open Relay Blocking System |
|
SOSA |
Spin Off Sub-Account |
|
SP |
Security Potential |
|
SP |
Secure Proxy |
|
SPAM |
Scanning Probe Array Memory |
|
SPAP |
Shiva Password Authentication Protocol |
|
SPAWAR |
The Space and Naval Warfare Systems Command (SPAWAR), based in San Diego, is an echelon II organization within the United States Navy and Navy's technical authority and acquisition command for C4ISR ( |
|
SPC |
Software Protection Code |
|
SPD |
Security Policy Distribution |
|
SPDR |
Secure Protected Development Repository |
|
SPDS |
Sealed Parcel Delivery System |
|
SPEAR |
Security Protocol Engineering and Analysis Resource |
|
SPEE |
Special Purpose Encryption Equipment |
|
SPEED |
Secure Package for Encrypting Electronic Data |
|
SPEWS |
Spam Prevention and Early Warning System |
|
SPG |
Sequence Password Generator |
|
SPI |
Security Parameters Index |
|
SPIN |
Secure Personal Identification Number |
|
SPK |
Simple Public Key |
|
SPKI |
Simple Public Key Infrastructure |
|
SPKM |
Simple Public Key Mechanism |
|
SpL |
Security Protocol Language |
|
SPM |
Spy Password Manager |
|
SPMN |
Software Program Managers Network |
|
SPOE |
System Point Of Entry |
|
SPU |
Secure Processing Unit |
|
SR |
Security and Replication |
|
SRM |
Security Relationship Management |
|
SRN |
Security Reference Number |
|
SRP |
Secure Remote Passwords |
|
SRR |
Software Requirements Review |
|
srs |
Software Requirements Specifications |
|
SRS |
Single Ring Security |
|
SS |
System Security |
|
SSA |
Super Spammers Anonymous |
|
SSAA |
System Security Authorization Agreement |
|
SSDD |
System/Segment Design Description (MIL-STD-498) |
|
SSF |
Security Strength Factor |
|
ssh |
Secure Shell Host |
|
SSH |
Secure Shell Home |
|
SSH |
Secure Shell (Unix program) |
|
SSH |
Secure Shell How |
|
SSO |
Single Sign On |
|
SSO |
Single Sign on Option |
|
SSO |
Single Sign One |
|
SSO |
Single Sign on Oracle |
|
SSOP |
Security Standard Operating Procedures |
|
SSOP |
Standard Security Operational Procedures |
|
SSP |
Security Support Provider |
|
SSP |
Single Sign-on Password |
|
SSP |
Simple Security Policy |
|
SSPE |
Simple Security Policy Editor |
|
SSPI |
Security Support Provider Interface |
|
SSPM |
Self-Service Password Management |
|
SSPR |
Single Sign-On Password Reset |
|
SSS |
Simple System Security |
|
ST |
Screening Tool |
|
STAT |
Secure Timed Audit Trail |
|
STAT |
Security Test and Analysis Tool |
|
STCA |
Security Technologies for Collaborative Architectures |
|
STD |
Security Tools Distribution |
|
STE |
Secure Telephone Equipment |
|
STM |
Synchronous Transport Module |
|
STO |
Security Through Obscurity |
|
STP |
Secret Tweaker Pad |
|
STR |
Suspicious Transaction Reporting |
|
STRIP |
Secure Tool for Recalling Important Passwords |
|
STS |
Sound Telecommunication Security |
|
SUS |
System Update Service |
|
SVG |
Scalable Vector Graphics |
|
SVI |
Switched Virtual Interface |
|
SVK |
Signature Verifiable Key |
|
SVP |
Secure Video Processor |
|
SW |
Software (SFTWE Preferred) |
|
SXV |
Self-eXpanding Virus |
|
SYN |
Synchronous |
|
SZE |
Security Zone Entry |
|
SZE |
Shared Zone Entry |
|
SZM |
Security Zone Management |
|
TACTED |
Tactical Trunk Encryption Device |
|
TAS |
Toshiba Authentication Service |
|
TAS |
Token Access Support |
|
TASO |
Terminal Area Security Officer |
|
TBV |
Transaction-Based Verification |
|
TC |
Transform Coding |
|
TC |
Thin Client |
|
TCB |
Trusted Computing Base |
|
TCBA |
Thread Can Be Archived |
|
TCSEC |
Trusted Computer System Evaluation Criteria |
|
TDAR |
Temporary Desktop Administration Rights |
|
TDES |
Tactical Data Encryption System |
|
TDG |
Three Days Grace |
|
TDPS |
Topio Data Protection Suite |
|
TDS |
Trojan Defense Suite |
|
TE |
Transmission Encryption |
|
TEA |
Tiny Encryption Algorithm |
|
TED |
Trunk Encryption Device |
|
TEED |
Tactical End-to-End Encryption Device |
|
TEI |
Text Encoding Initiative |
|
TEK |
Transmission Encryption Key |
|
TEKD |
Transmission Encryption Key Device |
|
TFA |
Two-Factor Authentication |
|
TGB |
TheGreenBow Personal Firewall |
|
TGW |
Trusted GateWay |
|
THC |
Totally Homogonous Cryptography |
|
TIA |
Total Information Awareness |
|
TISR |
Timer Interrupt Service Routine |
|
TKG |
Terminal Key Generator |
|
TKI |
Temporal Key Integrity |
|
TKIP |
Temporal Key Integrity Protocol |
|
TLC |
Trust Level Control |
|
TLS |
Transport Layer Security |
|
TLV |
Type-Length-Value |
|
TMap |
Test Management Approach |
|
TNE |
Trusted Network Environment |
|
TNI |
Trusted Network Interpretation |
|
TOR |
Trusted Operating Root |
|
TOS |
Trusted Operating System |
|
TP |
Tamper Proof |
|
TPA |
Third Party Access |
|
TPA |
Third Party Auditor |
|
TPE |
Trusted Path Execution |
|
TPF |
Tiny Personal Firewall |
|
TPKE |
Threshold Public-Key Encryption |
|
TPL |
Trusted Products List |
|
TPM |
Technical Protection Measure |
|
TPM |
Trusted Platform Module |
|
tpv |
Third Party Verifications |
|
TPVS |
Third Party Verification Service |
|
TRU |
Trusted Reliable User |
|
TS-CAL |
Terminal Services - Client Access License |
|
TSI |
Telecommunication Security Information |
|
TSM |
Trusted Service Management |
|
TSOL |
Trusted SOLaris operating system |
|
TSP |
Tracking Security Protection |
|
TSS |
Transaction Security System |
|
TSSA |
Trusted System Software Architecture |
|
TST |
Transitional Stored Ticket |
|
TSZ |
Temporary Security Zone |
|
TT |
Time-Tagged |
|
TTH |
Tiger Tree Hashing |
|
TUCOWS |
The Ultimate Collection of Winsock Software |
|
TVA |
Time Variance Authority |
|
TVC |
Trivial Vernam Cipher |
|
TVd |
Total Virus Defence |
|
TW |
Tequila Worm |
|
TWS |
TrustWorthy Software |
|
TYM |
Taking Your Machine |
|
U |
Userid |
|
U |
Unlocked |
|
UA |
Unlimited Access |
|
UAC |
User Account Control |
|
UAC |
Unified Administration Center |
|
UACT |
User Account Control Team |
|
UAR |
User Access Rights |
|
UART |
Universal Asynchronous Receiver/Transmitter |
|
UAS |
User Accounts Security |
|
UBD |
Uber0n Back Door |
|
UBE |
Unsolicited Bulk E-Mail |
|
UC |
Unacceptable Content |
|
UCA |
Unauthorized Computer Access |
|
UCAR |
User Control Access Right |
|
UCE |
Unsolicited Commercial E-Mail |
|
UCF |
Unregistration ConFirmation |
|
UCK |
Universal Correlation Key |
|
UCU |
Universal Control Unit |
|
UDACT |
Universal Digital Alarm Communicator Transmitter |
|
UDID |
Universal Design IDentity |
|
UDO |
Ultra Density Optical storage |
|
UDP |
User Datagram Protocol (FDDI related) |
|
UE |
Unlikely Event |
|
UES |
User Electronic Signature |
|
UFO |
Un-Filtered Offering |
|
UG |
Up Gateway |
|
UGO |
User, Group, and Other |
|
UI |
Unauthorized Information |
|
UIC |
User Identification Code |
|
UID |
Unique Identifier |
|
UIM |
User Identity Module |
|
UIN |
User Identification Number |
|
ULS |
Update of Legacy Systems |
|
ULS |
User Level Security |
|
UMA |
Unlocking Mechanical Apparatus |
|
UMD |
Universal Media Disk |
|
UMS |
User Management System |
|
UOWHF |
Universal One-Way Hash Function |
|
UPN |
User Principal Name |
|
ups |
Un-interruptable Power Supply |
|
UPUK |
Universal Personal Unblocking Key |
|
URA |
Ultimate Revenge Attack |
|
URA |
User Role Assignment |
|
URJ |
Un-registration ReJection |
|
URP |
User Registration Protocol |
|
URS |
United Recovery Services, Inc. |
|
URT |
User Registration Tool |
|
URV |
Universal Remote Viewing |
|
USF |
Universal Service Fund |
|
USHER |
United States Higher Education Root Certificate Authority |
|
USIM |
Universal Subscriber Identity Module |
|
USM |
User Session Management |
|
USNM |
User Name |
|
USRT |
Universal Synchronous Receiver/Transmitter |
|
UTC |
User Tracking Cookie |
|
UTE |
Unlimited Time to Enter |
|
UTF |
Unicode Transformation Format |
|
UTM |
Unified Threat Management |
|
UTMS |
Unified Threat Management System |
|
UU |
User Unknown |
|
UUCP |
Unix-to-Unix Copy Program |
|
UUIM |
Unified User Identity Management |
|
UUT |
Universal User Tracking |
|
UV |
User Visible |
|
UVK |
Ultimate Virus Killer |
|
UVS |
Underground Vaults & Storage, Inc. |
|
UVS |
Universal Verification System |
|
UVT |
McAfee VirusScan for Unix |
|
UXS |
Unix Security |
|
VACL |
VLAN (Virtual Local Area Network) Access Control List |
|
VAM |
Virtual Authorization Module |
|
VAM |
Vulnerability Assessment and Management |
|
VATS |
Versatile And Tough System |
|
VB |
Virtual Backup |
|
VBA |
Virtual Base for Access |
|
VBFR |
Virtual Buffer |
|
VBH |
Vinyl Badge Holder |
|
VCI |
V-Chip Information |
|
VCK |
Visual Cryptography Kit |
|
VCL |
Virus Creation Laboratory |
|
VCP |
Vulnerability Contributor Program |
|
VD |
Virus Definition |
|
VDB |
Vulnerability DataBase |
|
VDD |
Version Description Document |
|
VDH |
Very Distant Host |
|
VDL |
Virus Description Language |
|
VDS |
Virus Distribution System |
|
VEIL |
Variable Encryption and Intelligence Labeling |
|
VEST |
Virtual Environment for Secure Transactions |
|
VFE |
Version with Full Encryption |
|
VFM |
Virtual File Manager |
|
VFS |
Virtual File System |
|
VGA |
VGA (Video Graphics Array) Graphics Adapter |
|
VHM |
Virtual Hacking Machine |
|
VHM |
Virus Help Munich |
|
VHSIC |
Very-High-Speed Integrated Circuit |
|
VIO |
Virtual Input/Output |
|
VIR |
Virus |
|
VIRUS |
Vital Information Resource Under Siege |
|
VK |
Virtual Key |
|
VK |
Virtual Keyboard |
|
VKA |
Volatile Keying Assembly |
|
VKE |
VHF (Very-High Frequency) Keyless Entry |
|
VKF |
Variable Key Function |
|
VKM |
Vodak Kernel Model |
|
VMPE |
Virtual Multi-Pass Encoding |
|
VPA |
Voice Privacy Adaptor |
|
VPI |
Very Poor Integrity |
|
VR |
Virus Removal |
|
VS |
Very Secure |
|
VSAM |
Video Surveillance and Monitoring |
|
VSAT |
Vulnerability Self Assessment Tool |
|
VSF |
McAfee VirusScan 6.0 - Full Version |
|
VSM |
Viable Systems Method |
|
VSS |
Video Surveillance System |
|
VT |
Virus Tools |
|
VTC |
Virus Test Center |
|
VTL |
Virtual Test Laboratory |
|
VTM |
Viral Traffic Machine |
|
VTN |
VeriSign Trust Network |
|
VTN |
Virtual Trust Network |
|
VUL |
Vulnerability |
|
VV&A |
Verification, Validation, and Authentication |
|
VVZ |
Virus Varicela-Zoster |
|
vw |
Virtual Wallet |
|
VZ |
Virtual Zone |
|
VZE |
Virtual Zone Entrance |
|
VZK |
Validate Zillion Key |
|
WAF |
Web Application Firewall |
|
WAKE |
Word Auto Key Encryption |
|
WAPARS |
Web-based Auto Permissioning, Authorization, and Reporting System |
|
WASC |
Web Application Security Consortium |
|
WAV |
Windows Anti-Virus |
|
WBFB |
Whole Body Film Badges |
|
WBFS |
Wii Backup File System |
|
WBVS |
Web Based Verification System |
|
WDRT |
Whole Disk Recovery Token |
|
We |
Wireless Encryption |
|
WEP |
Wireless Encryption Protocol |
|
WEP |
Wired Equivalent Privacy |
|
WES |
Wireless Encryption Standard |
|
WETM |
Waterman Error Trending Model |
|
WFG |
Wireless Firewall Gateway |
|
WFP |
Windows File Protection |
|
WG |
Worm Guard |
|
WGA |
Windows Genuine Advantage |
|
WGX |
Wireless Gateway Switch |
|
WH |
WallHack |
|
WHID |
Web Hacking Incident Database |
|
WHOG-878 |
Computer Virus (Windows 95/98) |
|
WICF |
Windows Internet Connection Firewall |
|
WIDJ.1093 |
Life is Beautiful virus hoax |
|
WIMP |
Windows, Icons, Mouse, and Pointer |
|
WISL |
Wireless Security Laboratory |
|
WIX |
Wireless Information EXchange |
|
WJSB |
WannaJava Spam Controller |
|
WKB |
Well-Known Binary |
|
WKEK |
Working Key Encryption Key |
|
WKT |
Well-Known Text |
|
WLES |
WebLogic Enterprise Security |
|
WMVG |
WalruS Macro Virus Generator |
|
WNAP |
Wireless Network Access Point |
|
WNAS |
Wireless Network Access Services |
|
WO |
Web Object |
|
WOSA |
Workshop on Software Assessment |
|
WPA |
Wi-Fi Protected Access |
|
WPK |
Wireless Public Key |
|
WPKI |
Wireless Public Key Infrastructure |
|
WQK |
Variant of the W32/ElKern firus |
|
WSA |
Wireless Security Auditor |
|
WSC |
Weldex Security Camera |
|
WSH |
Windows Scripting Host |
|
WSPEC |
Workshop on Security and Privacy in E-Commerce |
|
WSRP |
Web Services for Remote Portlets |
|
WSS |
Web Service Security |
|
WSS |
Weapon System Specification |
|
WSSE |
Web Services Security Environment |
|
WSSP |
Web Service Security Policy |
|
WSSPF |
Web Service Security Policy File |
|
WTD |
Who to Delete |
|
WTS |
Web Transaction Security |
|
WUF |
Words Used Frequently |
|
WUP |
Wired Up Privacy |
|
WUS |
Windows Update Services |
|
WUWA |
Wake Up, We're Affected |
|
WVPN |
Wireless Virtual Private Network |
|
WWAN |
Wireless Wide Area Network |
|
WWUI |
World-Wide Unique Identifier |
|
WWWW |
World Wide Web Worm |
|
WYOP |
Write Your Own Program |
|
WYX |
Boot Sector Virus |
|
WYX.A |
Boot Sector Virus |
|
WYX.B |
Boot Sector Virus |
|
WYX.C |
Boot Sector Virus |
|
WYX.C1 |
Boot Sector Virus |
|
XAV |
XMAIL Anti-Virus |
|
XAVF |
XMAIL Anti-Virus Filter |
|
XBL |
Exploits Block List |
|
XBRL |
Extensible Business Reporting Language |
|
XCB |
eXtended CodeBook |
|
XCBF |
XML Common Biometric Format |
|
XES |
XML Encryption Standard |
|
XI |
Xtreme Integrity |
|
XKM |
XML Key Management |
|
XKMS |
XML Key Management Specification |
|
XMCL |
eXtensible Media Commerce Language (digital rights management cross-product metadata system) |
|
XrML |
Extensible Rights Markup Language |
|
XSRF |
Cross-Site Request Forgery |
|
XSS |
Cross-Site Scripting |
|
YAPS |
Yet Another Port Scanner |
|
ZA |
Zone Alarm |
|
ZA |
Zone Announcement |
|
ZADIR |
Zero Assumption Digital Image Recovery |
|
ZAM |
Zone Announcement Message |
|
ZAR |
Zero Assumption Recovery |
|
ZB |
Zone Boundary |
|
ZBS |
Zone Boundary Switching |
|
ZC |
Zone Controller |
|
ZC |
Zone Checker |
|
ZC |
Zone Convexity |
|
ZCA |
Zone Control Alarm |
|
ZCM |
Zone Convexity Message |
|
ZCR |
Zone Checkers Room |
|
ZEN |
Zero Effort Network |
|
ZI |
Zero Incident |
|
ZIF |
Zero Incident Frequency |
|
ZIL |
Zork Implementation Language |
|
ZKP |
Zero-Knowledge with Public keys |
|
ZL |
Zone Limit |
|
ZLE |
Zone Limit Exceeded |
|
ZM |
Zone Management |
|
ZMS |
Zhone Management System |
|
ZRG |
Zhone Residential Gateway |
|
ZRM |
Zone Releasing Module |
|
ZRP |
Zone Routing Protocol |
|
ZS |
Zone System |
|
ZSK |
Zone Signing Key (information technology) |
|