Lista Akronimów Cybersecurity - Security Bez Tabu

Lista Akronimów Cybersecurity

Poniżej znajdziesz listę akronimów pojawiających się kiedy czytamy, mówimy lub piszemy o bezpieczeństwie. Wiedza na temat tych skrótów jest przydatna również kiedy chcesz zdać egzaminy np. CompTIA Security+.

A

3DES
AAA
ABAC
ACL
AD
AES
AES256
AH
AI
AIS
ALE
AP
API
APT
ARO
ARP
ASLR
ASP
ATT&CK

AUP
AV

Triple Data Encryption Standard
Authentication, Authorization, and Accounting
Attribute-based Access Control
Access Control List
Active Directory
Advanced Encryption Standard
Advanced Encryption Standards 256bit
Authentication Header
Artificial Intelligence
Automated Indicator Sharing
Annualized Loss Expectancy
Access Point
Application Programming Interface
Advanced Persistent Threat
Annualized Rate of Occurrence
Address Resolution Protocol
Address Space Layout Randomization
Active Server Pages
Adversarial Tactics, Techniques,
and Common Knowledge
Acceptable Use Policy
Antivirus

B

BASH
BCP
BGP
BIA
BIOS
BPA
BPDU
BSSID
BYOD

Bourne Again Shell
Business Continuity Planning
Border Gateway Protocol
Business Impact Analysis
Basic Input/Output System
Business Partnership Agreement
Bridge Protocol Data Unit
Basic Service Set Identifier
Bring Your Own Device

C

CA
CAPTCHA

CAR
CASB
CBC
CBT
CCMP
CCTV
CERT
CFB
CHAP
CIO
CIRT
CIS
CMS
CN
COOP
COPE
CP
CRC
CRL
CSA
CSIRT
CSO
CSP
CSR
CSRF
CSU
CTM
CTO
CVE
CVSS
CYOD

Certificate Authority
Completely Automated Public Turing
Test to Tell Computers and Humans Apart
Corrective Action Report
Cloud Access Security Broker
Cipher Block Chaining
Computer-based Training
Counter-Mode/CBC-MAC Protocol
Closed-Circuit Television
Computer Emergency Response Team
Cipher Feedback
Challenge-Handshake Authentication Protocol
Chief Information Officer
Computer Incident Response Team
Center for Internet Security
Content Management System
Common Name
Continuity of Operations Planning
Corporate-owned Personally Enabled
Contingency Planning
Cyclic Redundancy Check
Certificate Revocation List
Cloud Security Alliance
Computer Security Incident Response Team
Chief Security Officer
Cloud Service Provider
Certificate Signing Request
Cross-Site Request Forgery
Channel Service Unit
Counter-Mode
Chief Technology Officer
Common Vulnerabilities and Exposures
Common Vulnerability Scoring System
Choose Your Own Device

D

DAC
DBA
DDoS
DEP
DER
DES
DHCP
DHE
DKIM
DLL
DLP
DMARC

DNAT
DNS
DNSSEC
DoS
DPO
DRP
DSA
DSL

Discretionary Access Control
Database Administrator
Distributed Denial-of-Service
Data Execution Prevention
Distinguished Encoding Rules
Data Encryption Standard
Dynamic Host Configuration Protocol
Diffie-Hellman Ephemeral
Domain Keys Identified Mail
Dynamic-link Library
Data Loss Prevention
Domain Message Authentication
Reporting and Conformance
Destination Network Address Transaction
Domain Name System
Domain Name System Security Extensions
Denial-of-Service
Data Protection Officer
Disaster Recovery Plan
Digital Signature Algorithm
Digital Subscriber Line

E

EAP
ECB
ECC
ECDHE
ECDSA
EDR
EFS
EIP
EOL
EOS
ERP
ESN
ESP
ESSID

Extensible Authentication Protocol
Electronic Code Book
Elliptic-curve Cryptography
Elliptic-curve Diffie-Hellman Ephemeral
Elliptic-curve Digital Signature Algorithm
Endpoint Detection and Response
Encrypted File System
Extended Instruction Pointer
End of Life
End of Service
Enterprise Resource Planning
Electronic Serial Number
Encapsulating Security Payload
Extended Service Set Identifier

F

FACL
FDE
FIM
FPGA
FRR
FTP
FTPS

File System Access Control List
Full Disk Encryption
File Integrity Monitoring
Field Programmable Gate Array
False Rejection Rate
File Transfer Protocol
Secured File Transfer Protocol

G

GCM
GDPR
GPG
GPO
GPS
GPU
GRE

Galois/Counter Mode
General Data Protection Regulation
GNU Privacy Guard
Group Policy Object
Global Positioning System
Graphics Processing Unit
Generic Routing Encapsulation

H

HA
HDD
HIDS
HIPS
HMAC
HOTP
HSM
HSMaaS
HTML
HTTP
HTTPS
HVAC

High Availability
Hard Disk Drive
Host-based Intrusion Detection System
Host-based Intrusion Prevention System
Hash-based Message Authentication Code
HMAC-based One-time Password
Hardware Security Module
Hardware Security Module as a Service
Hypertext Markup Language
Hypertext Transfer Protocol
Hypertext Transfer Protocol Secure
Heating, Ventilation, Air Conditioning

I

IaaS
IAM
ICMP
ICS
IDEA
IDF
IdP
IDS
IEEE
IKE
IM
IMAP4
IoC
IoT
IP
IPS
IPSec
IR
IRC
IRP
ISA
ISFW
ISO
ISP
ISSO
ITCP
IV

Infrastructure as a Service
Identity and Access Management
Internet Control Message Protocol
Industrial Control Systems
International Data Encryption Algorithm
Intermediate Distribution Frame
Identity Provider
Intrusion Detection System
Institute of Electrical and Electronics Engineers
Internet Key Exchange
Instant Messaging
Internet Message Access Protocol v4
Indicators of Compromise
Internet of Things
Internet Protocol
Intrusion Prevention System
Internet Protocol Security
Incident Response
Internet Relay Chat
Incident Response Plan
Interconnection Security Agreement
Internal Segmentation Firewall
International Organization for Standardization
Internet Service Provider
Information Systems Security Officer
IT Contingency Plan
Initialization Vector

K

KDC
KEK

Key Distribution Center
Key Encryption Key

L

L2TP
LAN
LDAP
LEAP

Layer 2 Tunneling Protocol
Local Area Network
Lightweight Directory Access Protocol
Lightweight Extensible Authentication Protocol

M

MaaS
MAC
MAM
MAN
MBR
MD5
MDF
MDM
MFA
MFD
MFP
ML
mMS
MOA
MOU
MPLS
MSA
MS-CHAP

MSP
MSSP
MTBF
MTTF
MTTR
MTU

Monitoring as a Service
Media Access Control
Mobile Application Management
Metropolitan Area Network
Master Boot Record
Message Digest 5
Main Distribution Frame
Mobile Device Management
Multifactor Authentication
Multifunction Device
Multifunction Printer
Machine Learning
Multimedia Message Service
Memorandum of Agreement
Memorandum of Understanding
Multiprotocol Label Switching
Measurement Systems Analysis
Microsoft Challenge-Handshake
Authentication Protocol
Managed Service Provider
Managed Security Service Provider
Mean Time Between Failures
Mean Time to Failure
Mean Time to Repair
Maximum Transmission Unit

N

NAC
NAS
NAT
NDA
NFC
NFV
NGFW
NG-SWG
NIC
NIDS
NIPS
NIST
NOC
NTFS
NTLM
NTP

Network Access Control
Network-attached Storage
Network Address Translation
Non-disclosure Agreement
Near-field Communication
Network Function Virtualization
Next-generation Firewall
Next-generation Secure Web Gateway
Network Interface Card
Network-based Intrusion Detection System
Network-based Intrusion Prevention System
National Institute of Standards & Technology
Network Operations Center
New Technology File System
New Technology LAN Manager
Network Time Protocol

O

OCSP
OID
OS
OSI
OSINT
OSPF
OT
OTA
OTG
OVAL
OWASP

Online Certificate Status Protocol
Object Identifier
Operating System
Open Systems Interconnection
Open-source Intelligence
Open Shortest Path First
Operational Technology
Over-The-Air
On-The-Go
Open Vulnerability and Assessment Language
Open Web Application Security Project

P

P12
P2P
PaaS
PAC
PAM
PAM
PAP
PAT
PBKDF2
PBX
PCAP
PCI DSS
PDU
PE
PEAP
PED
PEM
PFS
PGP
PHI
PII
PIN
PIV
PKCS
PKI
PoC
POP
POTS
PPP
PPTP
PSK
PTZ
PUP

PKCS #12
Peer-to-Peer
Platform as a Service
Proxy Auto Configuration
Privileged Access Management
Pluggable Authentication Modules
Password Authentication Protocol
Port Address Translation
Password-based Key Derivation Function 2
Private Branch Exchange
Packet Capture
Payment Card Industry Data Security Standard
Power Distribution Unit
Portable Executable
Protected Extensible Authentication Protocol
Portable Electronic Device
Privacy Enhanced Mail
Perfect Forward Secrecy
Pretty Good Privacy
Personal Health Information
Personally Identifiable Information
Personal Identification Number
Personal Identity Verification
Public Key Cryptography Standards
Public Key Infrastructure
Proof of Concept
Post Office Protocol
Plain Old Telephone Service
Point-to-Point Protocol
Point-to-Point Tunneling Protocol
Preshared Key
Pan-Tilt-Zoom
Potentially Unwanted Program

Q

QA
QoS

Quality Assurance
Quality of Service

R

RA
RAD
RADIUS
RAID
RAM
RAS
RAT
RC4
RCS
RFC
RFID
RIPEMD

ROI
RPO
RSA
RTBH
RTO
RTOS
RTP

Registration Authority
Rapid Application Development
Remote Authentication Dial-in User Service
Redundant Array of Inexpensive Disks
Random Access Memory
Remote Access Server
Remote Access Trojan
Rivest Cipher version 4
Rich Communication Services
Request for Comments
Radio Frequency Identification
RACE Integrity Primitives
Evaluation Message Digest
Return on Investment
Recovery Point Objective
Rivest, Shamir, & Adleman
Remotely Triggered Black Hole
Recovery Time Objective
Real-time Operating System
Real-time Transport Protocol

S

S/MIME
SaaS
SAE
SAML
SCADA
SCAP
SCEP
SDK
SDLC
SDLM
SDN
SDP
SDV
SED
SEH
SFTP
SHA
SIEM
SIM
SIP
SLA
SLE
SMB
S/MIME
SMS
SMTP
SMTPS
SNMP
SOAP
SOAR
SoC
SOC
SPF
SPIM
SQL
SQLi
SRTP
SSD
SSH
SSID
SSL
SSO
STIX
STP
SWG

Secure/Multipurpose Internet Mail Extensions
Software as a Service
Simultaneous Authentication of Equals
Security Assertions Markup Language
Supervisory Control and Data Acquisition
Security Content Automation Protocol
Simple Certificate Enrollment Protocol
Software Development Kit
Software Development Life Cycle
Software Development Life-cycle Methodology
Software-defined Networking
Service Delivery Platform
Software-defined Visibility
Self-Encrypting Drives
Structured Exception Handling
SSH File Transfer Protocol
Secure Hashing Algorithm
Security Information and Event Management
Subscriber Identity Module
Session Initiation Protocol
Service-level Agreement
Single Loss Expectancy
Server Message Block
Secure/Multipurpose Internet Mail Extensions
Short Message Service
Simple Mail Transfer Protocol
Simple Mail Transfer Protocol Secure
Simple Network Management Protocol
Simple Object Access Protocol
Security Orchestration, Automation, Response
System on Chip
Security Operations Center
Sender Policy Framework
Spam over Instant Messaging
Structured Query Language
SQL Injection
Secure Real-time Transport Protocol
Solid State Drive
Secure Shell
Service Set Identifier
Secure Sockets Layer
Single Sign-on
Structured Threat Information eXpression
Shielded Twisted Pair
Secure Web Gateway

T

TACACS+
TAXII

TCP/IP
TGT
TKIP
TLS
TOTP
TPM
TSIG
TTP

Terminal Access Controller Access Control System
Trusted Automated eXchange
of Intelligence Information
Transmission Control Protocol/Internet Protocol
Ticket Granting Ticket
Temporal Key Integrity Protocol
Transport Layer Security
Time-based One Time Password
Trusted Platform Module
Transaction Signature
Tactics, Techniques, and Procedures

U

UAT
UDP
UEBA
UEFI
UEM
UPS
URI
URL
USB
USB OTG
UTM
UTP

User Acceptance Testing
User Datagram Protocol
User and Entity Behavior Analytics
Unified Extensible Firmware Interface
Unified Endpoint Management
Uninterruptible Power Supply
Uniform Resource Identifier
Universal Resource Locator
Universal Serial Bus
USB On-The-Go
Unified Threat Management
Unshielded Twisted Pair

V

VBA
VDE
VDI
VLAN
VLSM
VM
VoIP
VPC
VPN
VTC

Visual Basic for Applications
Virtual Desktop Environment
Virtual Desktop Infrastructure
Virtual Local Area Network
Variable-length Subnet Masking
Virtual Machine
Voice over IP
Virtual Private Cloud
Virtual Private Network
Video Teleconferencing

W

WAF
WAP
WEP
WIDS
WIPS
WORM
WPA
WPS

Web Application Firewall
Wireless Access Point
Wired Equivalent Privacy
Wireless Intrusion Detection System
Wireless Intrusion Prevention System
Write Once Read Many
WiFi Protected Access
WiFi Protected Setup

X

XaaS
XML
XOR
XSRF
XSS

Anything as a Service
Extensible Markup Language
Exclusive OR
Cross-site Request Forgery
Cross-site Scripting