Security Acroniemen
Blog
Publicatie Security Acroniemen op 10 februari 2021

Security Acroniemen
Lijst met acroniemen uit de wereld van Security.
Acroniemen die gebruikt worden in de wereld van de security.Acroniem | Betekenis |
---|---|
ACL | Access Control List |
AES | Advanced Encryption System |
BIA | Business Impact Analysis |
CBSP | Cloud-Based Security Providers |
CIDR | Classles Inter-Domain Routing |
COBIT | Control Objectives for Information and Related Technology |
CoC | Chain of Custody |
COSO | Committee of Sponsoring Organizations of the Treadway Commission |
CSIRT | Computer Security Incident Response Team |
CSP | Content Securtiy Policy |
CVSS | Common Vulnerability Scoring System |
DAST | Dynamic Application Security Testing |
DDOS | Distributed Denial Of Services |
DES | Data Encryption Standard |
DHCP | Dynamic Host Configuration Protocols |
DNSBL | DNS-based Blackhole List |
DOS | Denial of Service |
DSA | Digital Signature Algorithm |
FoW | Fog of War |
GMT | Greenwich Mean Time |
GPG | Gnu Privacy Guard |
GSE | GIAC Security Expert |
IPSec | Internet Protocol Security |
IRP | Incident Response Process |
IRT | Incident Response Team |
LEA | Law Enforcement Agency |
MAC | Media Access Control |
MFA | Multi-Factor Authentication |
MX | Mail Exchange |
NAT | Network Address Translation |
NCSL | National Conference of State Legislatures |
NIST SP | National Institute of Standards Special Publication |
NTP | Network Time Protocol |
ODU | Old Dominion University |
OODA | Observe, Orient, Decide, Act |
PAO | Public Affairs Officer |
PGP | Pretty Good Privacy |
PHI | Personal Health Information |
PII | Personally Identifiable Information |
RAT | Remote Administration Tool |
RBL | Real-time Blackhole List |
SAST | Static Application Security Testing |
SCD | Source Code Disclosure |
SIFT | SANS Investigate Forensic Toolkit |
SMB | Server Message Block |
SME | Subject Matter Expert |
SPF | Sender Policy Framework |
SSE | Server Side Encryption |
STS | Security Token Service |
SURBL | Spam URI RBL |
TCT | The Coroner's Toolkit |
TFTP | Trivial File Transfer Protocol |
TLS | Transport Layer Security |
TTC | Time To Crack |
VOIP | Voice over IP |
WAP | Web Application Protection |
WFT | Windows Forensic Toolchest |
XSS | Cross-Site Scripting |