3DES | triple data encryption standard |
ACD | automatic call distributor |
AES | Advanced Encryption Standard |
ANSI | American National Standards Institute |
AP | access point |
API | application programming interface |
B2B | business to business |
B2C | business to consumer |
BBB | Better Business Bureau |
BCP | business continuity planning |
C2C | consumer to consumer |
CA | certificate authority |
CAP | Certification and Accreditation Professional |
CAUCE | Coalition Against Unsolicited Commercial Email |
CCC | CERT Coordination Center |
CCNA | Cisco Certified Network Associate |
CERT | Computer Emergency Response Team |
CFE | Certified Fraud Examiner |
CISA | Certified Information Systems Auditor |
CISM | Certified Information Security Manager |
CISSP | Certified Information System Security Professional |
CMIP | common management information protocol |
COPPA | Children's Online Privacy Protection |
CRC | cyclic redundancy check |
CSI | Computer Security Institute |
CTI | Computer Telephony Integration |
DBMS | database management system |
DDoS | distributed denial of service |
DES | Data Encryption Standard |
DMZ | demilitarized zone |
DoS | denial of service |
DPI | deep packet inspection |
DRP | disaster recovery plan |
DSL | digital subscriber line |
DSS | Digital Signature Standard |
DSU | data service unit |
EDI | Electronic Data Interchange |
EIDE | Enhanced IDE |
FACTA | Fair and Accurate Credit Transactions Act |
FAR | false acceptance rate |
FBI | Federal Bureau of Investigation |
FDIC | Federal Deposit Insurance Corporation |
FEP | front-end processor |
FRCP | Federal Rules of Civil Procedure |
FRR | false rejection rate |
FTC | Federal Trade Commission |
FTP | file transfer protocol |
GIAC | Global Information Assurance Certification |
GLBA | Gramm-Leach-Bliley Act |
HIDS | host-based intrusion detection system |
HIPAA | Health Insurance Portability and Accountability Act |
HIPS | host-based intrusion prevention system |
HTTP | hypertext transfer protocol |
HTTPS | HTTP over Secure Socket Layer |
HTML | hypertext markup language |
IAB | Internet Activities Board |
IDEA | International Data Encryption Algorithm |
IDPS | intrusion detection and prevention |
IDS | intrusion detection system |
IEEE | Institute of Electrical and Electronics Engineers |
IETF | Internet Engineering Task Force |
InfoSec | information security |
IPS | intrusion prevention system |
IPSec | IP Security |
IPv4 | Internet protocol version 4 |
IPv6 | Internet protocol version 6 |
IRS | Internal Revenue Service |
(ISC)2 | International Information System Security Certification Consortium |
ISO | International Organization for Standardization |
ISP | Internet service provider |
ISS | Internet security systems |
ITRC | Identity Theft Resource Center |
IVR | interactive voice response |
LAN | local area network |
MAN | metropolitan area network |
MD5 | Message Digest 5 |
modem | modulator demodulator |
NFIC | National Fraud Information Center |
NIDS | network intrusion detection system |
NIPS | network intrusion prevention system |
NIST | National Institute of Standards and Technology |
NMS | network management system |
OS | operating system |
OSI | open system interconnection |
PBX | private branch exchange |
PCI | Payment Card Industry |
PGP | Pretty Good Privacy |
PKI | public-key infrastructure |
RAID | redundant array of independent disks |
RFC | Request for Comments |
RSA | Rivest, Shamir, and Adleman (algorithm) |
SAN | storage area network |
SANCP | Security Analyst Network Connection Profiler |
SANS | SysAdmin, Audit, Network, Security |
SAP | service access point |
SCSI | small computer system interface |
SET | Secure electronic transaction |
SGC | server-gated cryptography |
SHA | Secure Hash Algorithm |
S-HTTP | secure HTTP |
SLA | service level agreement |
SMFA | specific management functional area |
SNMP | simple network management protocol |
SOX | Sarbanes-Oxley Act of 2002 (also Sarbox) |
SSA | Social Security Administration |
SSCP | Systems Security Certified Practitioner |
SSL | Secure Socket Layer |
SSO | single system sign-on |
STP | shielded twisted cable |
TCP/IP | Transmission Control Protocol/Internet Protocol |
TCSEC | Trusted Computer System Evaluation Criteria |
TFTP | Trivial File Transfer Protocol |
TNI | Trusted Network Interpretation |
UDP | User Datagram Protocol |
UPS | uninterruptible power supply |
UTP | unshielded twisted cable |
VLAN | virtual local area network |
VOIP | Voice over Internet Protocol |
VPN | virtual private network |
WAN | wide area network |
WLAN | wireless local area network |
WNIC | wireless network interface card |
W3C | World Wide Web Consortium |
WWW | World Wide Web |