toggle menu
Categories
Locations, Regional & international
Business & Finance
Common / Miscellaneous / Community
Medical
Scientific & Educational
Computing & IT
Internet Slang, SMS, Texting & Chat
Governmental & Military
Submit new
Desktop Version
Top Abbreviations
Acronym > Term
Word in meaning
Term > Acronym
Home
/
Governmental & Military
/
Security
Governmental & Military
>> Security Abbreviations
Look through 1646 acronyms and abbreviations related to Security:
PRL
— Password Recovery List
PRK
— Password Recovery Key
LAN
— Local Area Network
PPK
— Previous Page Key
WWWW
— World Wide Web Worm
PPA
— Privacy Protection Act of 1980
PPE
— Prefix-Preserving Encryption
PPP
— Protect Proper Patch
RFID
— Radio Frequency Identification
WYX
— Boot Sector Virus
LIDS
— Linux Intrusion Detection System
HIPAA
— Health Insurance Portability and Accountability Act of 1996
PNE
— Password Never Expires
ARS
— Autonomously Replicating Sequence
PIE
— Propagation Infection and Execution
PIC
— Position Idependent Code
PID
— Personal Identity Digit
SYN
— Synchronous
PKM
— Private Key Management
PKU
— Public Key Unit
PIPS
— Pre-Incident Planning System
PKO
— Private Key Operation
PIR
— Priority Information Report
PITR
— Point-In-Time Recovery
PICS
— Personal Information Communication Storage
PKES
— Public Key Enablement Service
PIN
— Password Identification Notification
PING
— Privacy Is Not Guaranteed
PIM
— Personal Information Manual
R-UIM
— Removable-User Identity Module
XCBF
— XML Common Biometric Format
ZADIR
— Zero Assumption Digital Image Recovery
MDC
— Modification Detection Code
DOD
— United States Department of Defense
WAPARS
— Web-based Auto Permissioning, Authorization, and Reporting System
ACE
— Access Control Entry
XAVF
— XMAIL Anti-Virus Filter
OCR
— Optical Character Recognition
PGP
— Pretty Good Privacy (encryption)
MAAM
— Modular Authentication and Authorization Middleware
RAM
— random-access memory
DDOS
— Distributed Denial of Service
TACTED
— Tactical Trunk Encryption Device
DRAM
— Dynamic Random Access Memory (dee-ram) (computing)
DES
— Data Encryption Standard
KEK
— Key Encryption Key (COMSEC Key)
RFO
— Reason For Outage
PC
— Personal computer (host)
OTP
— One Time Password
SAN
— Storage Area Network
ITU
— International Telecommunication Union
AES
— Advanced Encryption Standard
CGI
— Common Gateway Interface
PNP
— Plug aNd Play
DCOM
— Distributed Component Object Model
SPM
— Spy Password Manager
APP
— Application
UDP
— User Datagram Protocol (FDDI related)
FOIA
— Freedom of Information Act
ICE
— Intrusion Countermeasures Electronics
ISMS
— Information Security Management System
CISO
— Chief Information Security Officer
DL
— Download
IE
— Internet Explorer
COOP
— Continuity of Operations
SCSI
— Small Computer System Interface
BKL
— Big Kernel Lock
COMSEC
— Communications Security (military)
CSIRT
— Computer Security Incident Response Team
OS
— Operating System
DSA
— Digital Signature Algorithm
MTTF
— Mean Time To Failure
ATA
— Advanced Technology Attachment
AV
— Anti-Virus
TASO
— Terminal Area Security Officer
WEP
— Wired Equivalent Privacy
AC
— Access Control
SOA
— Service-Oriented Architecture
EEPROM
— Electrically Erasable Programmable Read-Only Memory
CSC
— Computer Software Component
SHA
— Secure Hash Algorithm
PPP
— Point-to-Point Protocol
MICR
— Magnetic Ink Character Recognition
SVG
— Scalable Vector Graphics
IDE
— Integrated Drive Electronics
SW
— Software (SFTWE Preferred)
DRM
— Digital Rights Management
CRL
— Certificate Revocation List
GUID
— Globally Unique Identifier
DOS
— Denial Of Service
LDAP
— Lightweight Directory Access Protocol (pronounced Ell-dap)
NSA
— National Security Agency
ISAKMP
— Internet Security Association and Key Management Protocol
PCI DSS
— Payment Card Industry Data Security Standard
PHI
— Protected Health Information
CHAP
— Challenge Handshake Authentication Protocol (ATM)
PAPA
— Privacy, Accuracy, Property, Accessibility
ACPI
— Advanced Configuration and Power Interface
SPAWAR
— The Space and Naval Warfare Systems Command (SPAWAR), based in San Diego, is an echelon II organization within the United States Navy and Navy's technical authority and acquisition command for C4ISR (
ITSEC
— Information Technology Security Evaluation Criteria
IAM
— Identity and Access Management
HTTPS
— HyperText Transfer Protocol Secure
EFF
— Electronic Frontier Foundation
MAC
— Message Authentication Code
SOAP
— Simple Object Access Protocol
PABX
— private automatic branch exchange (telephone)
XBRL
— Extensible Business Reporting Language
TCB
— Trusted Computing Base
UCE
— Unsolicited Commercial E-Mail
CMMI
— Capability Maturity Model Integrated
DT
— Don't Trust
RSA
— Rivest-Shamir-Adleman
SID
— Security Identifier
CISSP
— Certified Information Systems Security Professional
TLS
— Transport Layer Security
ECC
— Elliptic Curve Cryptography
DASD
— Direct Access Storage Device
SSH
— Secure Shell (Unix program)
RFPA
— Right to Financial Privacy Act of 1978
SOC
— Security Operations Center
AVI
— Audio Video Interleave
IPS
— Intrusion Prevention System
PKI
— Public Key Infrastructure (cryptography)
CERT
— Computer Emergency Response Team
ATO
— Authority to Operate
NLI
— Not Logged In
DUKPT
— Derived Unique Key Per Transaction
ZEN
— Zero Effort Network
SKL
— Simple Key Loader
GNOME
— GNU Network Object Model Environment
EAD
— Encoded Archival Description
TKIP
— Temporal Key Integrity Protocol
IPV4
— Internet Protocol Version 4
SSH
— Secure Shell Host
CA
— Certificate Authority
ENDEX
— End of Exercise
MTSO
— Mobile Telephone Switching Office
PAIN
— Privacy, Authentication, Integrity, and Non-repudiation
HSM
— Hardware Security Module
ICE
— Immigration and Customs Enforcement
BI
— Business Interruption
KDC
— Kerberos Key Distribution Center
ADK
— Additional Decryption Key
IEEE-SA
— Institute of Electrical and Electronics Engineers - Standards Association
CIA
— Confidentiality, Integrity and Availability
TLV
— Type-Length-Value
PAP
— Password Authentication Protocol (ATM)
SRS
— Software Requirements Specifications
IDS
— Intrusion Detection System
IA
— Information Assurance
SDLC
— Software development life cycle
DEA
— Data Encryption Algorithm
TCSEC
— Trusted Computer System Evaluation Criteria
IDM
— Identity Management
QPSK
— aeronautical quadrature phase shift keying
ACID
— Analysis Console for Incident Databases
HMAC
— Hash-Based Message Authentication Code
CCS
— Coded Character Set
EULA
— End User License Agreement (usually in reference to software)
CSC
— Card Security Code
PII
— Personally Identifiable Information
CCS
— Certified Coding Specialist
DSS
— Digital Signature Standard
KCSA
— Key Control Self-Assessment
SSOP
— Security Standard Operating Procedures
DSLAM
— Digital Subscriber Line Access Multiplexer (Module)
MTBF
— Mean Time Between Failures
CF
— Compact Flash
COAX
— Coaxial
ECPA
— Electronic Communications Privacy Act 1986
QRT
— Quick Response Team
IDEA
— International Data Encryption Algorithm
VIRUS
— Vital Information Resource Under Siege
EPON
— Ethernet Passive Optical Network
FDD
— Floppy Disk Drive
SCEP
— Simple Certificate Enrollment Protocol
UID
— Unique Identifier
TNI
— Trusted Network Interpretation
CEV
— Controlled Environment Vault
IEEE-CS
— Institute of Electrical and Electronics Engineers Computer Society
IPV6
— Internet Protocol Version 6
SD
— Secure Digital
LZW
— Lempel-Ziv-Welch
CAVE
— Cellular Authentication and Voice Encryption Algorithm
MOP
— Means of Production
EIGRP
— Enhanced Interior Gateway Routing Protocol
RBRVS
— Resource-Based Relative Value Scale
MIC
— Message Integrity Code
OSSTMM
— Open Source Security Testing Methodology Manual
IDR
— Intelligent Disaster Recovery
RIMM
— RAMBUS In-Line Memory Module
TED
— Trunk Encryption Device
HEX
— Hexadecimal (base 16)
DOI
— Domain Of Interpretation
ICF
— Internet Connection Firewall
UTF
— Unicode Transformation Format
PEM
— Privacy-Enhanced Mail
AET
— Advanced Encryption Technology
NIACAP
— National Information Assurance Certification and Accreditation Process
NIS
— Norton Internet Security
ECP
— Encryption Control Protocol
EFS
— Encrypting File System
KMI
— Key Management Infrastructure
SCP
— Secure Copy Protocol
EKMS
— Electronic Key Management System
GSI
— Grid Security Infrastructure
GDI
— Graphics Device Interface
KMP
— Key Management Protocol
CIP
— Critical Infrastructure Protection (US)
PIMS
— Personal Information Management System
NAV
— Norton Anti-Virus
SDSL
— Symmetric Digital Subscriber Line
SSH
— Secure Shell How
CSIRC
— Computer Security Incident Response Capability
WWAN
— Wireless Wide Area Network
IEEE
— Institute of Electrical and Electronics Engineers
SATAN
— Security Administrator Tool for Analyzing Networks
LRC
— Longitudinal Redundancy Check
VDD
— Version Description Document
COMDEX
— Computer Dealers Exposition
PUK
— PIN (Personal Identification Number) Unlocking Key
SANS
— System Administration, Networking, and Security Institute
STM
— Synchronous Transport Module
ESP
— Encapsulating Security Payload
CDP
— Continuous Data Protection
MSS
— Managed Security Services
SDIO
— Secure Digital Input/Output
EAL
— Evaluation Assurance Level
USHER
— United States Higher Education Root Certificate Authority
DLP
— Data Leak Prevention
OWASP
— Open Web Application Security Project
NES
— Network Encryption System
DML
— Display Message Log
CMW
— Compartmented Mode Workstation
UART
— Universal Asynchronous Receiver/Transmitter
ICSA
— International Computer Security Association
FOSE
— Federal Office Systems Exposition
CCI
— Controlled Cryptographic Item
SAD
— Security Association Database
PAM
— Pluggable Authentication Modules
SMM
— System Managers Manual
CIRC
— Cross-Interleaved Reed-Solomon Code
CIS
— Center for Internet Security
KEA
— Key Exchange Algorithm
WPA
— Wi-Fi Protected Access
NIDS
— Network Intrusion Detection System
GPG
— GNU Privacy Guard
RLE
— Run-Length Encoding
NPF
— Norton Personal Firewall
WGA
— Windows Genuine Advantage
DVP
— Digital Voice Privacy
KSU
— Key Service Unit
XSS
— Cross-Site Scripting
UAC
— User Account Control
BCI
— Business Continuity Institute
PSK
— Pre-Shared Key
E3
— End-to-End Encryption
CAL
— Client Access License
MAIS
— Murdoch Authentication and Identification System
COMPUSEC
— Computer Security
WAF
— Web Application Firewall
UUCP
— Unix-to-Unix Copy Program
CPLD
— Complex Programmable Logic Device
MAPS
— Mail Abuse Protection System
CDSA
— Common Data Security Architecture
ASLC
— Application Security Life Cycle
EMACS
— Editor MACroS
CSRF
— Cross-Site Request Forgery
URT
— User Registration Tool
CCNA
— Cisco Certified Network Administrator
OTKSL
— One Time Key Subsidy Lock
ACS
— Access Control System出入控制系统
CALEA
— Communications Assistance for Law Enforcement Act
PUM
— Potentially Unwanted Modification
COMPASS
— COMPuter ASSurance Conference
QAZ
— Quick Access Zone
DL
— Download Link
KSK
— Key Signing Key
NCSA
— National Computer Security Association
OTX
— Object Tool eXtended
CEH
— Certified Ethical Hacker
QXS
— Quick Access
SPMN
— Software Program Managers Network
LDIF
— LDAP (Lightweight Directory Access Protocol) Data Interchange Format
FRAM
— Ferroelectric Random-Access Memory
CMS
— Cryptographic Message Syntax
TMAP
— Test Management Approach
BCH
— Bose, Chaudhuri, Hocquengum
RSH
— Remote Shell
VIO
— Virtual Input/Output
NSM
— Network Security Manager
NKMO
— Navy Key Management Officer
ISA
— Internet Security and Acceleration Server
NAP
— Network Access Protection
QOI
— Quality of Information
LSASS
— Local Security Authority Subsystem Service
RPO
— Recovery Point Objective
QVS
— Quick Verification System
NVT
— Network Vulnerability Tool
CPL
— Current Privilege Level
CAG
— Citrix Access Gateway
BITNET
— Because It is Time NETwork
USRT
— Universal Synchronous Receiver/Transmitter
REMSH
— REMote SHell
FOIP
— Fax Over Internet Protocol
TPM
— Trusted Platform Module
HDCP
— High-bandwidth Digital Content Protection
VFM
— Virtual File Manager
CC
— Common Core
PPI
— Protected Personal Information
RC
— Run Commands (UNIX)
ANDF
— Architectural Neutral Distribution Format
HC
— High Compression
TUCOWS
— The Ultimate Collection of Winsock Software
IBE
— Identity-Based Encryption
WVPN
— Wireless Virtual Private Network
DNT
— Do Not Track
G4S
— Group 4 Securicor
PIX
— Private Internet Exchange
AFSS
— AuthenTec Fingerprint Security System
SSPI
— Security Support Provider Interface
PUP
— Potentially Unwanted Program
SORBS
— Spam and Open Relay Blocking System
VHSIC
— Very-High-Speed Integrated Circuit
PSS
— Probabilistic Signature Scheme
ASIC
— Australian Securities & Investments Commission
ASPI
— Advanced SCSI (Small Computer System Interface) Programming Interface
APWG
— Anti-Phishing Working Group
PKCS
— Public Key Cryptography Standard
CCR
— Commitment, Concurrency and Recovery
DECSS
— Decrypt Content Scrambling System
ZSK
— Zone Signing Key (information technology)
STP
— Secret Tweaker Pad
PKC
— Public Key Cryptography
UPN
— User Principal Name
SRP
— Secure Remote Passwords
STE
— Secure Telephone Equipment
SAPI
— Speech Application Programming Interface
RFH
— Request for Help
CISM
— Certified Information Security Manager
HBA
— Host-Based Authentication
CA
— Conditional Access
USF
— Universal Service Fund
SSH
— Secure Shell Home
DNSSEC
— Domain Name System Security Extensions
RBAC
— Role-Based Access Control
APP
— Application Program
ABP
— AdBlock Plus
SRR
— Software Requirements Review
QOP
— Quality Of Protection
AGDLP
— Account, Global, Domain, Local, Permissions
SBL
— Spamhaus Block List
VFS
— Virtual File System
XMCL
— eXtensible Media Commerce Language (digital rights management cross-product metadata system)
WSA
— Wireless Security Auditor
AKMS
— Automated Key Management System
BWF
— Barbed Wire Fence
AKMC
— Automated Key Management Center
ACE
— Assured Computing Environment (VMware)
CBL
— Composite Blocking List
BPE
— Byte pair encoding
KL
— Key Length
PAVA
— Public Address and Voice Alarm System
SAR
— System Activity Report
UTM
— Unified Threat Management
SPKI
— Simple Public Key Infrastructure
PA
— Privacy Act
VUL
— Vulnerability
SCAP
— Security Content Automation Protocol
RA
— Registration Authority
SSAA
— System Security Authorization Agreement
ODMR
— On-Demand Mail Relay
NGFW
— Next Generation Firewall
CPRM
— Content Protection for Recordable Media
TISR
— Timer Interrupt Service Routine
MMDS
— Multichannel Multipoint Distribution Service
ASIS
— Application Software Installation Server
XRML
— Extensible Rights Markup Language
VZ
— Virtual Zone
IDP
— Intrusion Detection and Prevention
NWS
— Non-Working Software
3DES
— Triple Data Encryption Standard
NORA
— Non-Obvious Relationship Awareness
CSR
— Certificate Signing Request
VKA
— Volatile Keying Assembly
NSRL
— National Software Reference Library
SDFI
— Secure Digital Forensic Imaging
SBC
— Sub-Band Coding
GIG
— Global Information Grid
RBL
— Real-Time Block List
APP
— Application-specific functions
ZIL
— Zork Implementation Language
LWST
— Lowest
RUID
— Real User Identification
SPAP
— Shiva Password Authentication Protocol
IPO
— Input Process Output
ABS
— Anti-Blockier-System
PIV
— Personal Identity Verification
CCMP
— Cipher Block Chaining Message Authentication Code Protocol
UUIM
— Unified User Identity Management
IM
— Instant Messenger
AVG
— Anti-Viral Guard
ISC2
— International Information Systems Security Certification Consortium, Inc.
WUS
— Windows Update Services
FAR
— False Alarm Rate
WKEK
— Working Key Encryption Key
SSO
— Single Sign On
SAINT
— Security Administrator's Integrated Network Tool
AA
— Auto-Answer
TIA
— Total Information Awareness
CVV
— Card Verification Value
VZE
— Virtual Zone Entrance
NSIS
— Nullsoft Scriptable Install System
WFG
— Wireless Firewall Gateway
SF
— Signature File
QAV
— Qubux Anti-Virus
OEL
— Occupational Exposure Limit
FAM
— File Alteration Monitor
PKA
— Public Key Authentication
RPL
— Requested Privilege Level
TSZ
— Temporary Security Zone
FA
— False Alarm
TPF
— Tiny Personal Firewall
TDPS
— Topio Data Protection Suite
KMPDU
— Key Management Protocol Data Unit
CLASP
— Comprehensive, Lightweight Application Security Process
PR
— Password Recovery
2S2D
— Double-Sided Double-Density
SPI
— Security Parameters Index
STD
— Security Tools Distribution
WNAP
— Wireless Network Access Point
PFS
— Perfect Forward Secrecy
3DESEP
— Triple Data Encryption Standard Encryption Protocol
SZM
— Security Zone Management
TOS
— Trusted Operating System
MPC
— Multimedia Personal Computer
PWR
— PassWord Recovery
BT
— Back Trace
WPKI
— Wireless Public Key Infrastructure
SCED
— Security-Constrained Economic Dispatch
CCIRC
— Canadian Cyber Incident Response Centre
GPEE
— General Purpose Encryption Equipment
EQ
— Estimation-Quantization (type of coder)
SK
— Session Key
PTD
— Password Tracker Deluxe
SSDD
— System/Segment Design Description (MIL-STD-498)
PF
— Packet Filter
PBE
— Password Based Encryption
ECL
— Exit Control List
ASVS
— Application Security Verification Standard
RBS
— Remote Backup Software
VKF
— Variable Key Function
WUP
— Wired Up Privacy
WGX
— Wireless Gateway Switch
QCC
— Quantum Computation/Cryptography
BIS
— Boot Integrity Service
CAS
— Conditional Access System
MLS
— Multi-Level Security
S
— Secure
TEED
— Tactical End-to-End Encryption Device
CMPPA
— Computer Matching and Privacy Protection Act of 1988
PIFI
— Personally Identifiable Financial Information
TPVS
— Third Party Verification Service
CVE
— Common Vulnerabilities and Exposures
AU
— Authorized User
UPS
— Un-interruptable Power Supply
ASIS
— American Society for Industrial Security
PCEF
— Policy and Charging Enforcement Function
SLME
— Select Manual Entry
IAO
— Information Assurance Officer
HPA
— Host Protected Area
ISA
— Internal Security Act
VDB
— Vulnerability DataBase
ULS
— Update of Legacy Systems
SCP
— Security Certified Program
DTO
— Denial To Operate
COW
— Computer On Wheels
WYX.B
— Boot Sector Virus
ISSO
— Information Systems Security Officer
SNP
— Security News Portal
CSO
— Computer Security Officer
NACL
— Named Access Control List
SFP
— System File Protection
RDT
— Reliable Data Transfer
LGPO
— Local Group Policy Object
WNAS
— Wireless Network Access Services
KP
— Key Pulse
CRAM
— Challenge-Response Authentication Mechanism
ADHOC
— Associated Destructive Hackers Of Columbia
VTL
— Virtual Test Laboratory
ZAR
— Zero Assumption Recovery
AFEKMS
— Air Force Electronic Key Management System
SZE
— Security Zone Entry
WIMP
— Windows, Icons, Mouse, and Pointer
WIX
— Wireless Information EXchange
CFC
— Call for Comments
CTL
— Certificate Trust List
OPPA
— Online Privacy Protection Act of 2003
VGA
— VGA (Video Graphics Array) Graphics Adapter
ANR
— Automatic Network Replenishment
IKEP
— Internet Key Encryption Protocol
TEA
— Tiny Encryption Algorithm
ZAM
— Zone Announcement Message
CACRL
— Custodian Authorization Custody Receipt Listing
PKIX
— Public Key Infrastructure for X.509 Certificates
KS
— Key Stage
CSA
— Cisco Security Agent
SKU
— Security Kernel Unit
WSSP
— Web Service Security Policy
SACL
— System Access Control List
DH
— Diffie-Hellman
GPIB
— General Purpose Interface Bus
VSS
— Video Surveillance System
KAM
— Key Account Management
SEM
— Security Event Management
URP
— User Registration Protocol
QPRK
— Quicken Password Recovery Key
FUD
— Fully Undetected
APKI
— Architecture for Public Key Infrastructure
KVL
— Key Variable Loader
RIP
— Regulated Interaction Protocol
ONVIF
— Open Network Video Interface Forum
NBSP
— National Biometric Security Project
MFA
— Multi-Factor Authentication
OTAC
— One-Time Authorization Code
IPES
— Improved Proposed Encryption Standard
CSAC
— Cross Signature Assurance Criterion
LO
— Log Out
3DESE
— Triple Data Encryption Standard Encryption
WFP
— Windows File Protection
2VPCP
— Two-Version Priority Ceiling Protocol
USIM
— Universal Subscriber Identity Module
SVI
— Switched Virtual Interface
CFS
— Cryptographic File System
PKM
— Personal Knowledge Management
OGSA-SEC-WG
— Open Grid Services Architecture Security Working Group
RC
— Ron's Cipher
VACL
— VLAN (Virtual Local Area Network) Access Control List
AAI
— Authentication and Authorization Infrastructure
PL
— Private Line
ASA
— Adaptive Security Appliance
PAS
— Personal Access System
DSC
— Digital Security Controls
ZMS
— Zhone Management System
WEP
— Wireless Encryption Protocol
ACFA
— Access-Control Framework Access
PGPI
— Pretty Good Privacy for the Internet
CAAS
— Common Authentication and Authorization Service
IC
— Identification Code
RHCSS
— Red Hat Certified Security Specialist
AVERT
— Anti-Virus Emergency Response Team
COOP
— Continuity of Operations Procedure
DACS
— Distributed Access Control System
CD-ROM XA
— Compact Disc Read-Only Memory eXtended Architecture
NAUP
— Network Acceptable Use Policy
WASC
— Web Application Security Consortium
CRAP
— Challenge Response Authentication Program
AAIP
— Authentication and Authorization Infrastructure Project
CSP
— Computer Security Plan
UCK
— Universal Correlation Key
ZB
— Zone Boundary
INE
— Improved Network Encryption
PWP
— Password Protected
ADPSSO
— Automatic Data Processing System Security Officer
AFKMS
— Air Force Key Management System
LVQ
— Learning Vector Quantization
PVV
— PIN (Personal Identification Number) Verification Value
OTAR
— Over-The-Air Rekeying
EED
— Encryption and Encapsulation Device
APP
— Application Programming Platform
MKMP
— Modular Key Management Protocol
RSTR
— Request Security Token Response
IKE
— Internet Key Encryption
UBE
— Unsolicited Bulk E-Mail
ISM
— Information Security Management
PCP
— Priority Ceiling Protocol
DES-CBC
— Data Encryption Standard-Cipher Block Chaining
ZM
— Zone Management
AVZ
— AntiVirus by Oleg Zaitsev
IP
— Ingress Protection
PAS
— Privacy Act Statement
DHK
— Diffie Hellman Knowledge
ACU
— Access Control Unit
PKS
— Public Key Server
IMSS
— InterScan Messaging Security Suite
ZI
— Zero Incident
DCS
— Device Control String
WBFS
— Wii Backup File System
CCSP
— Cisco Certified Security Professional
ZC
— Zone Controller
ASIO
— Australian Security Intelligence Organization
EEE
— End-To-End Encryption
SSPR
— Single Sign-On Password Reset
PES
— Proposed Encryption Standard
UDACT
— Universal Digital Alarm Communicator Transmitter
PBA
— Pre-Boot Authentication
CAMEO
— Computer-Aided Management of Emergency Operations System
WYX.C
— Boot Sector Virus
KMASE
— Key Management Application Service Element
CISP
— Cardholder Information Security Program
JPG
— Joint Photographic Experts Group picture file
AESDE
— Advanced Encryption Standard Development Effort
UIM
— User Identity Module
SLED
— Specification Language for Encoding and Decoding
HDC
— Handle for Device Context
AAPR
— Advanced ARJ (Archived by Robert Jung) Password Recovery
VK
— Virtual Keyboard
OSE
— Open Security Exchange
TVA
— Time Variance Authority
ABU
— Analog Backup
PNR
— Personal Name Record
SVP
— Secure Video Processor
ZC
— Zone Checker
AAAA
— Authentication, Authorization, Auditing, and Accounting
SAFER
— Secure and Fast Encryption Routine
SSP
— Security Support Provider
GPE
— Group Policy Editor
WDRT
— Whole Disk Recovery Token
ACES
— Army Communication Encryption System
NSTISSAM
— National Security Telecommunications and Information Systems Security Advisory Memorandum
CS
— Case Sensitive
NP
— No Password
AFD
— Auto Format Decode
WHID
— Web Hacking Incident Database
K
— Key/Black
RSAES-OAEP
— Rivest-Shamir-Adleman Encryption Scheme - Optimal Asymmetric Encryption Padding
WES
— Wireless Encryption Standard
PWF
— PGP (Pretty-Good Privacy) WinFront
SADA
— Select Agent Distribution Activity
MEK
— Message Encryption Key
ZIF
— Zero Incident Frequency
NCER
— Non-Compliance Escalation Report
WSSE
— Web Services Security Environment
ODI
— Open Datalink Interface
AKM
— Automated Key Management
RAT
— Remote Access Trojans (CERTs - Hacker Programs)
ZBS
— Zone Boundary Switching
TNE
— Trusted Network Environment
DMCA
— Digital Millenium Copyright Act
ACRU
— Active Confirmed Registered User
ZRP
— Zone Routing Protocol
AIP
— Application Integrity Policy
CT
— Cipher Text
OPSEC
— Open Platform for Secure Enterprise Connectivity
AAA
— Authentication, Authorization, and Accountability
KMSS
— Key Management Software Support
ASA
— Adaptive Security Algorithm
ENISA
— European Network and Information Security Agency
ADPSO
— Automatic Data Processing Security Officer
CSIS
— Canadian Security Intelligence Service
TDES
— Tactical Data Encryption System
WKT
— Well-Known Text
TS-CAL
— Terminal Services - Client Access License
PK
— Public Key
ZLE
— Zone Limit Exceeded
CIRC
— Computer Incident Response Capability
VIR
— Virus
UC
— Unacceptable Content
KAMS
— Key Account Management System
SECSH
— SECure SHell
CLSID
— Computer Licence Security ID
SISO
— Soft-Input Soft-Output
KMC
— Key Management Center
CPC
— Cyberarmy Privacy Commission
DSS
— Data Security Standard
CHA
— Concentric Hemispherical Analyzer
TST
— Transitional Stored Ticket
KMF
— Key Management Facility
OSG
— Operational Security Guidelines
HTL
— Hack Tracking Log
SORB
— Secure Object Request Broker
SKMM
— Standard Key Management Module
TEKD
— Transmission Encryption Key Device
SPIN
— Secure Personal Identification Number
ADT
— Ant Detection Technology
VV&A
— Verification, Validation, and Authentication
ZL
— Zone Limit
KM
— Key Management
RDES
— Randomized Data Encryption Standard
PCI SSC
— Payment Card Industry Security Standard Council
NOSC
— Network Operations Security Center
EDESPL
— Endorsed Data Encryption Standard Products List
WIDJ.1093
— Life is Beautiful virus hoax
RWPCP
— Read/Write Priority Ceiling Protocol
KAMP
— Key Account Management Protocol
ZCA
— Zone Control Alarm
TGB
— TheGreenBow Personal Firewall
EM64T
— Extended Memory 64-bit Technology
TDG
— Three Days Grace
NYB
— New York Boot virus
MSFT
— Most Secure Firewall Tester
ECES
— Elliptic Curve Encryption Scheme
ISSA
— Information Security for South Africa
SK
— Stop Keying
ZA
— Zone Alarm
CASS
— Certification and Accreditation Support System
TPA
— Third Party Access
FBE
— Function-Based Encryption
PED
— Programmable Encryption Device
CAAR
— Computer Assisted Accreditation Reporting
EKM
— Electronic Key Management
CVTP
— Certified Vaulting Technology Professional
LUA
— Least-privileged User Account
CAS
— Central Authentication Service
EA
— Extended Attribute
OOBA
— Out-Of-Band Authentication
BBWC
— Battery-Backed Write Cache
PG
— Privacy Guard
IPSEC
— Internet Protocol SECurity protocol
SCMS
— Secure Console Management Switch
HAK
— Hacker Assault Kit
CRACK
— Challenge Response for Authenticated Cryptographic Keys
PCIS
— Partnership for Critical Infrastructure Security
PHH
— Project Honeypots and Honeynets
ADT
— Advanced Development Tool
ACS
— Accredited Certification Scheme
CPA
— Chosen-Plaintext Attack
WMVG
— WalruS Macro Virus Generator
EES
— Escrow(ed) Encryption Standard
NADS
— Network Anomaly Detection System
LCEAD
— Low-Cost Encryption and Authentication Device
EDAC
— Evidence-Based Design Accreditation and Certification
ADSS
— Access Decision Support Services
AERN
— Advanced EAS (Emergency Alert System) Relay Network
MAAWG
— Messaging Anti-Abuse Working Group
IKMP
— Internet Key Management Protocol
CVV
— Creditcard Verification Value
SPU
— Secure Processing Unit
DCP
— Defense Continuity Program
DESCBC
— Data Encryption Standard/Cipher Block Chaining
COOP
— Continuity of Operations Policy
KDM
— Key Dependent Message
ESS
— Emergency Shutdown System
FEK
— File Encryption Key
NPCP
— New Priority Ceiling Protocol
ECA
— External Certificate Authority
TPL
— Trusted Products List
SHTTP
— Secure Hyper Text Transfer Protocol
IKP
— Internet-Keyed Payment
BCCM
— Business Continuity Consultancy and Management
IPC
— Internet Privacy Coalition
UAR
— User Access Rights
HIPS
— Host Intrusion Prevention System
TKI
— Temporal Key Integrity
VCL
— Virus Creation Laboratory
PKE
— Public Key Encryption
KMD
— Key Management Device
ACCE
— Advanced Configurable Crypto Environment
PKS
— Public Key System
ACFTT
— Advanced Computer Forensic Techniques Training
SPEWS
— Spam Prevention and Early Warning System
FARP
— False Alarm Reduction Program
DCP
— Data Compression Protocol
STRIP
— Secure Tool for Recalling Important Passwords
XES
— XML Encryption Standard
ZKP
— Zero-Knowledge with Public keys
ZA
— Zone Announcement
YAPS
— Yet Another Port Scanner
DP
— Data Privacy
MKB
— Media Key Block
IAPC
— International Audit Protocol Consortium
DSMP
— Data and Safety Monitoring Plans
DLM
— Dynamic Link Module
PCRF
— Policy and Charging Rules Function
SSOP
— Standard Security Operational Procedures
MIPS
— Million Instructions Per Second
ASKMM
— Advanced Standard Key Management Module
COOP
— Continuity of Operations Program
ZCM
— Zone Convexity Message
KMID
— Key Management Identification
VDL
— Virus Description Language
EPD
— Equipment Protective Device
STAT
— Security Test and Analysis Tool
ACFT
— Advanced Computer Forensic Techniques
ADMS
— Advanced Distributed Monitoring System
VSAM
— Video Surveillance and Monitoring
DITSCAP
— Defense Information Technology Security Certification and Accreditation Program
EDES
— Electronic Document Encryption System
ARO
— Annualized Rate of Occurrence
FEMA
— Federal Emergency Mangement Agency
COOP
— Continuity of Operations Project
ACIT
— Advanced Countermeasures for Insider Threats
SANE
— Secure Active Network Environment
HIDS
— Host Intrusion Detection System
UES
— User Electronic Signature
WHOG-878
— Computer Virus (Windows 95/98)
WAKE
— Word Auto Key Encryption
HSS
— Hierarchical Secure System
DLT
— Direct Linear Transformation
MCRC
— Malicious Code Research Center
AVPE
— Anti-Virus Policy Enforcement
CCRA
— Common Criteria Recognition Arrangement
IASE
— Information Assurance Support Environment
JITA
— Just In Time Authentication
APAS
— Automated Prior Authorization System
SPEE
— Special Purpose Encryption Equipment
UIC
— User Identification Code
WSPEC
— Workshop on Security and Privacy in E-Commerce
CVP
— Content Vector Protocol
LOC
— Low Overhead Cipher
WKB
— Well-Known Binary
ZC
— Zone Convexity
GACL
— Generic Access Control List
ACF
— Access Control File
TPKE
— Threshold Public-Key Encryption
ID
— Intrusion Detection
REQ
— Requirement
SECTY
— Security
ACS
— Authenticated Content Signing
FCFB
— Fire Classified Floor Box
DES/CBC
— Data Encryption Standard/Cipher Block Chaining
MBAM
— Malware Bytes Anti-Malware
JKMS
— Joint Key Management System
CRS
— Certificate Retrieval System
NISO
— National Information Standards Organization
NLE
— Network-Layer Encryption
ZCR
— Zone Checkers Room
MEL
— MIME (Multipurpose Internet Mail Extensions) Encoding Library
IA
— Instant Access
UUT
— Universal User Tracking
DST
— Digital Signature Transponder
JKM
— Joint Key Management
HTS
— Hack This Site
HOST
— Hotel Operating Statistics
KP
— Key Pair
SAML
— Security Assertions Markup Language
EAP
— Electronic Authentication Partnership
XKM
— XML Key Management
PK
— Primary Key
XKMS
— XML Key Management Specification
CCTL
— Common Criteria Testing Laboratory
KCN
— Key Conversion Notice
SSPM
— Self-Service Password Management
ASAC
— Application Security Attack Components
CAPI
— Cryptography Application Programming Interface
IDPS
— Intrusion Detection and Prevention Service
SPL
— Security Protocol Language
TGW
— Trusted GateWay
SMC
— SCSI (Small Computer System Interface) Media Changer
LSM
— Linux Security Module
TKG
— Terminal Key Generator
SECT
— Secure Electronic Compliance Technologies
SID
— Security in Depth
CPSA
— Content Protection System Architecture
VHM
— Virtual Hacking Machine
HEPKI
— Higher Education Public Key Infrastructure
BEK
— Bulk Encryption Key
IWA
— Integrated Windows Authentication
AUP
— Acceptible Use Policy
ISAM
— Information Security Awareness Month
EBSI
— Enhanced Backup Solutions Initiative
TBV
— Transaction-Based Verification
ST
— Screening Tool
SSP
— Single Sign-on Password
JKMP
— Joint Key Management Plan
VSAT
— Vulnerability Self Assessment Tool
DLP
— Data Loss Prevention
UOWHF
— Universal One-Way Hash Function
HARS
— Homomorphic Authenticable Ring Signature
SSO
— Single Sign on Oracle
EKMC
— Electronic Key Management Center
KPCM
— Key Privilege and Certificate Management
ANTS
— A New Trojan Scanner
AITS
— Advanced Interface for Tactical Security
CMC
— Certificate Management protocol using CMS
MESH
— Multimedia Embedded Security Hub
SMKS
— Single Master Key Scheme
SMX
— Server Macro Expansion
ILS
— Internet Locator Server
AHS
— Advanced Habbo Security
WYOP
— Write Your Own Program
ABS
— Active Battery Security
KKDC
— Kerberos Key Distribution Center
TDS
— Trojan Defense Suite
RKP
— Relative Key Position
STCA
— Security Technologies for Collaborative Architectures
IDSC
— Intrusion Detection Systems Consortium
SKMP
— Standard Key Management Protocol
ICSF
— Institute for Computer Security and Forensics
KMSA
— Key Management System Agent
XI
— Xtreme Integrity
K
— Key Generator
MACI
— Multiple-Access Cryptographic Interface
QPR
— Quicken Password Recovery
CID
— Card Identification Digit
IAAC
— Information Assurance Advisory Council
NKM
— Navy Key Management
VDH
— Very Distant Host
ACT
— Access Coordination Team
AIV
— Artificially Intelligent Virus
I
— Insecure
M/S
— Master/Session
LIU
— Logged In User
SMIME
— Secure multipurpose Internet Mail Extensions
APAP
— Army Privacy Act Program
CK
— Crypto Key
ULS
— User Level Security
JKMIWG
— Joint Key Management Infrastructure Working Group
SKA
— Secret Key Algorithm
LWS
— Light-Weight System
IDEAS
— Internet Design Engineering And Security
CALS
— Consolidated Accreditation and Licensure Survey
SDMI
— Secure Digital Music Initiative
UTMS
— Unified Threat Management System
PPKC
— Probabilistic Public Key Cryptosystem
RUIM
— Removable User Identity Module
HAC
— Hierarchical Access Control
SK
— Secret Key
RPSS
— Routing Policy System Security
AESD
— Advanced Encryption Standard Development
TEK
— Transmission Encryption Key
SPKM
— Simple Public Key Mechanism
IPKI
— Internet X.509 Public Key Infrastructure
UPUK
— Universal Personal Unblocking Key
PAPI
— Public And Private Information
URV
— Universal Remote Viewing
CMEA
— Cellular Message Encryption Algorithm
UMD
— Universal Media Disk
CAU
— Control Access Unit
WWUI
— World-Wide Unique Identifier
MOLE
— Multichannel Occurrent Logger Evaluator
GINA
— Graphical Interface For Neural Applications
NEU
— Network Encryption Unit
IKE
— Implicit Key Expiration
BPI
— Baseline Privacy Interface
KIP
— Key management for Internet Protocols
WQK
— Variant of the W32/ElKern firus
SPDS
— Sealed Parcel Delivery System
SBQ
— Secure Business Quarterly
ISATP
— Information Security Awareness Training Program
COAST
— Computer Operations Audit and Security Tools
HAL
— Hackers At Large
APF
— Advance Policy Firewall
ICT
— Instant Center Tracking
UIN
— User Identification Number
SCIP
— Security Cooperation Information Portal
SSO
— Single Sign on Option
NU
— New User
APARS
— Auto Permissioning, Authorization, and Reporting System
AVG
— Anti-Virus Group
WTD
— Who to Delete
SNAP
— Secure Network Access Platform
HEAD
— Hand-held Encryption Authentication Device
IBTT
— Identity-Based Traitor Tracing
CSDII
— Cross-Sector Digital Identity Initiative
DRAR
— Data Recovery And Repair
ASPECT
— Automated Security Protocol Examination and Checking Tool
CSP
— Certificate Service Provider
MIME
— Multipurpose Internet Mail Extensions
ADFT
— Advanced Digital Forensic Techniques
PME
— Protection Mitigation and Enhancement
PTD
— Personal Trusted Device
NCF
— Neutral Code Format
EKG
— Encryption Key Generator
SCIP
— Security, Confidentiality, Integrity, and Privacy
PVG
— Protection of Vulnerable Groups
MACS
— Monitor And Control System
CSAD
— Computer Security Awareness Day
JCA
— Java Cryptography Architecture
CSAC
— Computer Security Advisory Committee
NRP
— Nominal Rate of Protection
TSOL
— Trusted SOLaris operating system
TSS
— Transaction Security System
PAR
— Privacy Act Release
CC
— Command Code
ECMEA
— Enhanced Cellular Message Encryption Algorithm
SLAM
— Site Logging and Monitoring
KEA
— Known Exponent Attack
MOSS
— MIME (Multi-purpose Internet Mail Extensions) Object Security Services
ISBG
— International Security Buyers Guide
FUV
— Fordham University Virus
RPCA
— Responsable du Plan de Continuité d'Activité
JIAS
— Journal of Information Assurance and Security
SKIP
— Simple Key Management for Internet Protocols
DKG
— Decryption Key Generator
K
— Key
PASR
— Preparatory Action and Security Research
BKE
— Bilateral Key Exchange
DMTC
— Disaster Management Training Course
KVM
— Key Variable Management
RKSS
— Random Key Spaces Scheme
ROT13
— ROTate 13 encoding
AISECPOL
— Assimilation of Integral SECurity POLicies
VTN
— Virtual Trust Network
KV
— Key Variable
KES
— Keyless Entry System
MTIPS
— Managed Trusted Internet Protocol Service
URS
— United Recovery Services, Inc.
GETS
— Government Emergency Telecommunications Service
WO
— Web Object
NVH
— Network- Vs. Host-based intrusion detection
WBVS
— Web Based Verification System
SSPE
— Simple Security Policy Editor
ILE
— In-Line network Encryption
CACI
— Controlling Access to Computer Information
WSH
— Windows Scripting Host
PKA
— Public Key Algorithm
MOST
— Michigan Online Security Training
ECC
— Electronic Check Conversion
UDO
— Ultra Density Optical storage
ADG
— Advanced Data Guardian
DPNSS
— Digital Private Network Signalling System
EKMP
— Electronic Key Management Protocol
DCMS
— Distributed Certificate Management System
GIAC
— General Inquiry Access Code
ONC
— OpenNet Controller
WOSA
— Workshop on Software Assessment
APP
— Application Transport Parameter
TYM
— Taking Your Machine
WYX.A
— Boot Sector Virus
MDC
— Message Digest Cipher
DPSWG
— Digital Privacy and Security Working Group
VAM
— Vulnerability Assessment and Management
NINA
— Non-Intrusive Network Assessment
NKMS
— Navy Key Management System
KMUA
— Key Management User Agent
VTN
— VeriSign Trust Network
ISDP
— Information Sharing Data Protection
SAINT
— Security Alliance for Internet and New Technologies
NEK
— Network Encryption Key
ISBS
— Information Security Breaches Survey
ADPSP
— Automatic Data Processing Security Plan
HIPA
— Health Information Privacy Act of 1999
EPE
— Enhanced Privacy and Encryption
UGO
— User, Group, and Other
DC
— Double Check (valve used to protect water supplies)
NSSA
— National Security Space Architecture
CNS
— Computer and Network Security
AVS
— Access Verification Service
WSRP
— Web Services for Remote Portlets
ECCO
— Emergency Computer Crisis Organization
COPS
— Computer Oracle and Password System
RKE
— Remote Keyless Entry
MASKMM
— Modified Advanced Standard Key Management Module
QQT
— Quick Qard Technology (France)
SMK
— System Multipurpose Key
ZRG
— Zhone Residential Gateway
UCU
— Universal Control Unit
CKDS
— Cryptographic Key Data Set
RLC
— Rebound Lockout and Compression
SNF
— Single Network Firewall
IAP
— Information Assurance Program
OATH
— Open AuTHentication
DSCA
— Dynamic Security Control Architecture
NST
— Network Security Toolkit
FIC
— Fidelis Interoperable Credential
JCSR
— Japan Computer Security Research
KCT
— Key Conversion Time
FAAP
— False Alarm Analysis Program
SPDR
— Secure Protected Development Repository
VEIL
— Variable Encryption and Intelligence Labeling
QHJ
— QL Hackers Journal
KVMS
— Key Variable Management System
DDRM
— Dynamic Digital Right Management
FPOC
— Fortezza PKI Operations Center
TSSA
— Trusted System Software Architecture
BUDR
— Back-Up and Disaster Recovery
RPSS
— Reverse Proxy Security Servers
ECL
— Encoder Control List
HIP
— Hacking In Progress
RID
— Remote Intrusion Detector
CCLE
— CheckPoint Certified Licensing Expert
CAT
— Crisis Action Team
RIMS
— Remote Intelligent Monitoring System
NOSSA
— Naval Ordnance Safety & Security Activity
SOAP
— Secure Overlay Access Point
ITH
— Item That's Hacked
PADS
— Protected Archives Distribution System
CISPA
— Cyber-Intelligence Sharing and Protection Act
AAL
— Access Activity Log
WPK
— Wireless Public Key
SDSI
— Simple Distributed Security Infrastructure
CSCI
— Computer Systems Center Incorporated
DCHT
— Development Capricorns Hack Team
DLF
— Definable Logging Format
UACT
— User Account Control Team
NIM
— Not-Inside Message
WICF
— Windows Internet Connection Firewall
CSS
— Client Security Software
JKMI
— Joint Key Management Infrastructure
MCG
— Meta Certificate Group
APP
— Application Portability Profile
SPEAR
— Security Protocol Engineering and Analysis Resource
IDMS
— Intrusion Detection Mitigation System
TCBA
— Thread Can Be Archived
RMF
— Reputation Management Framework
VBFR
— Virtual Buffer
XBL
— Exploits Block List
NIV
— No Information Verified
KVMPR
— Key Variable Management Procedures
SKS
— Synchronizing Key Server
VVZ
— Virus Varicela-Zoster
MACID
— Medium Access Control IDentifier
VTM
— Viral Traffic Machine
LSO
— Local Shared Objects
IASE
— Internet Application Security Environment
TEI
— Text Encoding Initiative
MNF
— Multi-Network Firewall
MSSE
— Microsoft Security Essentials
EDESP
— Endorsed Data Encryption Standard Product
RPA
— Remote Patron Authentication
ASAP
— Application System Authorization Process
VCK
— Visual Cryptography Kit
ACMP
— Access Control Management Program
SAS
— Scalable Available and Secure
OASIS
— Orbis Advanced Security Intruder System
OPA
— Online Privacy Alliance
IACR
— International Association for Cryptologic Research
MAA
— Message Authentication Algorithm
APG
— Automated Password Generator
CDID
— Cross Divisional Identification
VHM
— Virus Help Munich
NID
— Network Intrusion Detection
TC
— Thin Client
AVC
— Access Vector Cache
SVK
— Signature Verifiable Key
VAM
— Virtual Authorization Module
KSSA
— Kurt Seifried Security Advisory
APP
— Applications Programme Department
NAS
— Network Authentication Service
XSRF
— Cross-Site Request Forgery
FEBA
— Firewalls, Encryption, Backups, and Access
KGU
— Crypto Generator Unit
DWH
— Deep and Wide Hash
CP
— Code Page
SET
— Secure Encryption Technology
SNLT
— Speed Negotiation Lock Time
SPOE
— System Point Of Entry
UCA
— Unauthorized Computer Access
HATS
— High Assurance Transformation System
JCE
— Java Cryptography Extensions
MLES
— Multiple Line Encryption System
VZK
— Validate Zillion Key
EKOR
— Trojan Backdoor.Sdbot.AQ computer virus
SK
— Surrogate Key
APT
— Anti-Piracy Technology
DPA
— Data Privacy Algorithm
RRD
— Resonant Reed Decoder
IKES
— Internet Key Encryption System
KMU
— Key Management User
BISF
— Business Information Security Firewall
UVS
— Universal Verification System
DNSBL
— Domain Name Server Block List
UBD
— Uber0n Back Door
VCP
— Vulnerability Contributor Program
AVC
— AntiVirus Comparatives
EPIC
— Electronic Privacy Information Center
MIDAS
— Monitoring Intrusion Detection and Administration Server
DOWS
— Duck Operated Warning System
CRS
— Carrier Router System
DSL
— Days Since Login
NICI
— Novell International Cryptographic Infrastructure
URA
— User Role Assignment
FHC
— Fairhaven Hacking Clan
SECAAS
— Security as a Service
APKS
— All Pairwise Key Scheme
SARA
— Symantec Antivirus Research Automation
INSS
— Internal Network Security Sweep
MASK
— Modified Advanced Standard Key
CAS
— CPE (Customer Premise Equipment) Alert Signal
LCED
— Low-Cost Encryption Device
UVK
— Ultimate Virus Killer
ARC
— Authenticated Request Code
ECDL
— Elliptic Curve Discrete Logarithm
QCM
— Query Certificate Manager
WSS
— Web Service Security
SEP
— Secure Execute Processor
OBB
— Orange Book Blog
VSF
— McAfee VirusScan 6.0 - Full Version
IFS
— Internet Fraud Screen
UVT
— McAfee VirusScan for Unix
CMA
— Control and Monitoring Agent
RLN
— Release Lock Number
PWK
— PassWord Key
KMIP
— Key Management Interoperability Protocol
RPC
— Region Protection Control
DBM
— DataBase Maintenance
MPD
— Microsoft Project Database
WAV
— Windows Anti-Virus
VTC
— Virus Test Center
CDSSO
— Cross-Domain Single Sign-On
HIP
— Host Interface Program
APP
— Application Peering Protocol
FBI
— Fingerprint Biometric Identity
S-BOX
— Substitution-box
AFS
— American Filing System
SXV
— Self-eXpanding Virus
ARIA
— Acceptable Risk, Incorrect Acceptance
RKS
— Random Keys Scheme
CTVS
— Cap Token Verification Service
IKM
— Internet Key Management
EDS
— Emergency Disaster Services
SE
— Security Environment
TPV
— Third Party Verifications
HUGS
— Harness Ultra Guard System
SAL
— Secure Auditing for Linux
WUF
— Words Used Frequently
TWS
— TrustWorthy Software
VKE
— VHF (Very-High Frequency) Keyless Entry
SARC
— Symantec Antivirus Research Center
GSP
— Guardian Service Processor
STO
— Security Through Obscurity
SE
— Security-Enhanced
ISP
— Internet Security Protocol
INES
— Improved Network Encryption Systems
LOH
— List Of Hashes
VK
— Virtual Key
VEST
— Virtual Environment for Secure Transactions
RS
— Reed Solomon
LOSC
— Letter Of Security Cognizance
DCC
— Distributed Checksum Clearinghouse
QST
— Quality Security Training
UCF
— Unregistration ConFirmation
SKS
— Smart Key System
DBDP
— Disk Based Data Protection
IJB
— Internet JunkBuster
WH
— WallHack
QAL
— Query Answered Log
USNM
— User Name
DL
— Download Last
ESD
— Electronic Secure Delivery
APP
— Application Program Package
ET
— Extended Technology
WTS
— Web Transaction Security
FPK
— Fast Public Key
FPKI
— Federal Public Key Infrastructure
RPG
— Random Password Generator
DMV
— Document Macro Virus
RPKS
— Random Pairwise Keys Scheme
AUS
— Anonymous Undeniable Signature
IPEM
— Internet Privacy Enhanced Mail
SUS
— System Update Service
JMP1
— Password Over-ride JuMPer number one
IETF
— Intensional Existential Textuality Fanatics
MGE
— Multi Gauntlet Emulator
WYX.C1
— Boot Sector Virus
SA
— Security Advisory
SED
— Secure Encryption Device
GABCS
— Government Advisory Board for CyberSecurity
ES
— Encryption Scheme
WETM
— Waterman Error Trending Model
OSD
— Open Source Definition
PASS
— Predicate Alteration Security System
MMH
— Multilinear Modular Hashing
TW
— Tequila Worm
PWL
— Password List (Windows System File Extension .pwl)
KHG
— Kernel Hackers' Guide
PKP
— Public Key Partners (A vendor)
HT
— Hash table
QKG
— Quantum Key Generation
IKG
— Internet Key Generator
RAN
— Registration Access Number
SPEED
— Secure Package for Encrypting Electronic Data
ISTS
— Institute for Security Technology and Society
ACID
— Anti-Copying In Design
PCS
— Permanent Control Security
SMEK
— Short Message Encryption Key
SO
— Sign Out
NSIF
— National Security Industry Forum
CVI
— Cyber Viral Implant
ELS
— Equidistant Letter Sequence
XAV
— XMAIL Anti-Virus
H
— Hoax
VT
— Virus Tools
SIATA
— Security Infrastructure for Agent-based Telecommunication Applications
UI
— Unauthorized Information
EUSM
— External User Security Model
NLA
— Network Log Analyzer
UDID
— Universal Design IDentity
PENS
— Portcullis Enterprise Network Security
MLR
— Master Lock Resettable
U
— Unlocked
LSS
— Location Signature Sensor
RWS
— Roger Wilco Server
NMH
— Non-linear Modular Hashing
XCB
— eXtended CodeBook
AA
— Awaiting Activation
NMU
— Non-Maintainer Uploads
RPA
— Remote Password Authentication
WLES
— WebLogic Enterprise Security
TE
— Transmission Encryption
TVD
— Total Virus Defence
IPWG
— Interactive Privacy Working Group
OFC
— Optical Fiber Communications
OSN
— Operator Security Number
CRV
— Connectivity, Reliability, and Value
ILRT
— Industry Loss Reduction Team
EBS
— Enterprise Backup Solution
AU
— Authenticated User
USM
— User Session Management
QXR
— Quick Access Recording
SZE
— Shared Zone Entry
EBB
— Encoder Breakout Board
VBH
— Vinyl Badge Holder
HLBR
— Hogwash Light BRidge security software
ZRM
— Zone Releasing Module
UAS
— User Accounts Security
UMS
— User Management System
FSAV
— F-Secure Anti-virus
TTH
— Tiger Tree Hashing
SAARS
— Small Authentication And Recording System
MBAE
— MalwareBytes Anti-Exploit
SCV
— Secure Client Verification
DOG
— Disaster Operations Group
GWV
— Gnutella Worm Victim
TSM
— Trusted Service Management
PARI
— Primary Access Rights Identifier
IACE
— Information Assurance Courseware Evaluation
KC
— Key Conversion
KIF
— Key Interchange Format
SET
— Softcopy Exploitation Tools
CPW
— Check Password
SPAM
— Scanning Probe Array Memory
CSM
— Cryptographic Services Module
ODBE
— Original Dynamic Broadcast Encryption
CSVC
— Computer System Validation Compliance
CSVN
— Consistent SubVersioN
CHFT
— Computer Hacking Forensic Training
PBC
— Potential Backup Cost
GRI
— Guarding Rights Indefinite
MYK
— Manage Your Keys
PAL
— Personal Access List
LEDS
— Lightweight Easy Debugging Service
UV
— User Visible
KVMP
— Key Variable Management Protocol
MD
— Mini-Disk
URA
— Ultimate Revenge Attack
SARA
— Self Assessment Risk Analysis
TDAR
— Temporary Desktop Administration Rights
VKM
— Vodak Kernel Model
SPC
— Software Protection Code
SEP
— Single Entry Point
SAM
— Symantic Anti-virus for Macintosh
MEA
— Message Encryption Algorithm
SIC
— System Integrity Check
LB
— Lock Bit
RPG
— Real Private Group
ISSA
— Information Systems Security Association
SB
— System Border
ED
— Encryption Device
ITC
— Information Trust Corporation
NTMG
— Network Threat Management Gateway
RIC
— Recognizable Interchangeable Combinations
IA
— Impersonation Attack
SASKMM
— Sierra-based Advanced Standard Key Management Processor
WSC
— Weldex Security Camera
NVA
— Network Vulnerability Assessment
CRHF
— Collision-Resistant Hash Function
SME
— Short Message Encryption
SRN
— Security Reference Number
HIP
— Health Information Privacy
PAPB
— Payment Application Best Practices
DPU
— Data Protection Unit
OIAP
— Object-Independent Authorization Protocol
FEP
— Forefront Endpoint Protection
KD
— Key Define
EPI
— Electronic Privacy Information
SLR
— Steam Lock Release
MLS
— Multiple Licensing Service
ESD
— Event Summary Data
SKM
— Standard Key Management
PST
— Pipeline Security Technology
IOC
— Infrastructure Operating Center
SKT
— Sectioned Key Tree
MASKM
— Modified Advanced Standard Key Management
PTIN
— Postini Threat Identification Network
CS
— Coding Scheme
CASS
— Computer Automated Security System
SBK
— Self-configured scheme for Boot-strapping Keys
TPM
— Technical Protection Measure
QKD
— Quantum Key Distribution
VFE
— Version with Full Encryption
SI
— Secure Internet
SRS
— Single Ring Security
WISL
— Wireless Security Laboratory
SAFE
— Secure and Fast Encryption
MKM
— Modular Key Management
ASA
— After Security Advisory
KVMP
— Key Variable Management Plan
THC
— Totally Homogonous Cryptography
ZS
— Zone System
CMS
— Classic Mole Style
WSS
— Weapon System Specification
ISAR
— Internet Security Assessment of Risks
WUWA
— Wake Up, We're Affected
GPK
— Gerombolan Pengacau Keamanan (hackers)
RC
— Rivest Cipher
ICS
— Inexpensive Cloaking Script
FED
— File Encrypted Data
ME
— Message Encryption
CUSIP
— Committee of Uniform Security Identification Procedures
IF
— Information Foraging
MK
— Modular Key
CIP
— Complete Internet Protection
ISO
— Initial Sign-On
NSTIC
— National Strategy on Trusted Identities in Cyberspace
SSO
— Single Sign One
DVP
— Dynamic Virus Protection
GLESEC
— GLobal Electronic-SECurity
MSV
— Magnetic Strip Verification
DCS
— Disaster Control Squad
KD
— Key Data
IA
— Identification Authentication
UVS
— Underground Vaults & Storage, Inc.
KF
— Keyed File
SFK
— Security Framework Kit
LWS
— Link WorkStation
DJ
— Dumpster Jockey
VBA
— Virtual Base for Access
BEF
— Browser Exploitation Framework
UFO
— Un-Filtered Offering
TOR
— Trusted Operating Root
VMPE
— Virtual Multi-Pass Encoding
OW
— Ominous Worms
LUP
— Least User Privilege
JCSV
— JCV/SV40 hybrid Virus
TPE
— Trusted Path Execution
QBP
— QuickBooks Password
SBS
— Safe Bolt System
VD
— Virus Definition
KMSSA
— Key Management Software Support Agent
SD
— Secure Data
S
— Shredder
ECS
— Encryption Control System
SDC
— Security Data Corporation
MISK
— McGruff Internet Safety Kit
TVC
— Trivial Vernam Cipher
IIS
— Insecure Infiltration System
VATS
— Versatile And Tough System
MSSK
— McGruff Safer Senior Kit
NCSAM
— National Cybersecurity Awareness Month
CCC
— Card Capabilities Container
DHS
— Deceptive Header Screening
EC
— Encryption Control
UA
— Unlimited Access
BSP
— Best Security Practices
EL
— Encryption Licensing
HIP
— Host Intrusion Prevention
NUT
— N-Universal Transformation
BOS
— Best of Security
FW
— Fire Wall
NSA
— Network Security Administration
CK
— Clear Key
UCAR
— User Control Access Right
URJ
— Un-registration ReJection
UE
— Unlikely Event
WSSPF
— Web Service Security Policy File
KG
— Key Generation
RA
— Registry Agent
SPK
— Simple Public Key
PAS
— Protected Area System
AVP
— Anti-Virus Protection
SOSA
— Spin Off Sub-Account
PE
— Privacy-Enhanced
SPD
— Security Policy Distribution
EC
— Embedded Communication
ODM
— Originally Detectable and Masked
VPI
— Very Poor Integrity
SAC
— Slovak Antivirus Center
SC
— Single Check
OSP
— Operator Security Password
RO
— Ring Out
PBM
— Partition Boot Manager
UTE
— Unlimited Time to Enter
SIN
— Secure Identification Number
RA
— Review Access
GLT
— Ghetto LAN (Local Area Network) Thugs
SCM
— Secure Console Management
TC
— Transform Coding
NI
— Not-Inside
ISBK
— Improved Self-configured scheme for Boot-strapping Keys
DT
— Deletion Tracking
SAGE
— Security Algorithms Group of Experts
SNAP
— System Network Advanced Protection
RTAL
— Real-Time Audit Log
IPP
— Identity Preservation Program
MCFA
— Mirox Cyber Force Academy
TSI
— Telecommunication Security Information
KC
— Key Code
RES
— Revised Encoding Scheme
SARDS
— Spam Analysis Reporting and Destruction System
LVE
— Lightweight Virtual Environment
DSK
— Down-Stream Key
UG
— Up Gateway
CM
— Codebook Mapping
FCC
— Full Cycle Checking
UXS
— Unix Security
ISIS
— Isis Stands For Integrated Security
NSPK
— Needham-Schroeder Public-Key
ASDA
— Application Security Design Assessment
KISS
— Keep Internet Security Simple
APP
— Application Program Processor
WBFB
— Whole Body Film Badges
IT
— Information Trickery
TAS
— Token Access Support
SPG
— Sequence Password Generator
DP
— Diverse Protection
PARS
— Privacy Act Release Statement
TP
— Tamper Proof
SS
— System Security
STAT
— Secure Timed Audit Trail
VR
— Virus Removal
BSG
— Belonging Security Goal
MI
— Message Invader
TFA
— Two-Factor Authentication
CL
— Counter Lock
ONE
— Optimized Network Encryption
VPA
— Voice Privacy Adaptor
PD
— Parallel Decode
DSK
— Directory Style Key
APP
— Application Marker
SITE
— Sign In To Enter
OCB
— Offset Code Book
CAA
— Collusion Attack Algorithm
EIA
— Entry Identification and Access
PEF
— Password Encrypted Format
NV
— New Variant
MPL
— Minumum Pattern Length
NAM
— Numbered Access Module
NE
— Network Encryption
CME
— Cellular Message Encryption
VW
— Virtual Wallet
IRIS
— Incident Resolution Information System
PSP
— Perfect Security Property
SR
— Security and Replication
PTC
— Polymorphic Tracking Code
UAC
— Unified Administration Center
STR
— Suspicious Transaction Reporting
CMS
— Certificate Management Services
TSP
— Tracking Security Protection
ISSIP
— Information System Security Implementation Process
UU
— User Unknown
EMS
— Electronic Media Sanitization
TPA
— Third Party Auditor
FYI
— Filter Your Internet
WG
— Worm Guard
SAC
— Security Access Console
DPA
— Dynamic PolyAlphabetic
MSA
— Multifunction Security Appliance
IRF
— Inherited Rights and Filters
SKL
— Site Key Library
CCA
— Chosen Ciphertext Attack
CFP
— Computers, Freedom, and Privacy
IPC
— Internet Protection Community
CP
— Copy Protected
FT
— Fully Trusted
CM
— Cryptological Mathematics
KS
— Key Sign
SAC
— Secure Authenticated Communication
LLI
— Last Login Identification
WJSB
— WannaJava Spam Controller
IIS
— Instant Insecure Server
RDE
— Randomized Data Encryption
ME
— Malicious Environment
OMP
— Online Media Protection
TT
— Time-Tagged
NT
— Not Trusted
VCI
— V-Chip Information
PBM
— Passwords by Mask
PTF
— Partition Trace File
VDS
— Virus Distribution System
MB
— MegaBytes
FDC
— Fault Design Criteria
ESA
— Excessive Selective Access
DLD
— Default Logging Destination
RPK
— Rapid Public Key
SSA
— Super Spammers Anonymous
WE
— Wireless Encryption
SSP
— Simple Security Policy
SGC
— Server-Gated Cryptography
TRU
— Trusted Reliable User
IDS
— Interface Domain Signature
MP
— Message Protector
RAB
— Remote Alarm Box
DRM
— Disaster Recovery Management
NPP
— National Privacy Principles
AV
— Access violation
RDC
— Random Data Compression
KA
— Key Address
CPS
— Current Protection Subdomain
VS
— Very Secure
SP
— Security Potential
OCB
— Operational Cipher Block
ICS
— Ideal Costa Scheme
VB
— Virtual Backup
NL
— New Lock
IPL
— Interim Parts Library
ASA
— Automatic System Access
CCP
— Cryptography Centralized Policy
IMP
— Identifying, Monitoring, and Protecting
NC
— No Check
CDS
— Certified Digital Signing
EUSM
— End-User Spam Management
CP
— Compact Policy
OT
— Open Trapdoor
U
— Userid
RTP
— Real-Time Protection
ICM
— Integrated Cybercrime Management
SEP
— Slashdot Effect Protection
OEC
— Offshore Engineered Component
KU
— Keyed Unique
HSP
— Hidden Service Protocol
PMS
— Possible Malicious Software
SK
— Strengthened Key
VSM
— Viable Systems Method
TLC
— Trust Level Control
SSS
— Simple System Security
SIC
— Secure Identification Chip
ROS
— Remote Operations Security
SRM
— Security Relationship Management
UTC
— User Tracking Cookie
ICV
— Integrated Check Vector
PI
— Personal Information
EPOC
— Enhanced Protection of Content
SSF
— Security Strength Factor
NCC
— No Cycle Checking
CE
— Communication Encryption
SP
— Secure Proxy
CC
— Common Criteria
DST
— Distributed Spam Trap
B
— Breach
TAS
— Toshiba Authentication Service
MLE
— Multiple Line Encryption
E
— Encryption
R
— Reencoding
SIM
— Secure Intelligent Menu system
NTR
— No Trusting Required
FSS
— File System Safe
ITP
— Information Technology Probers
STS
— Sound Telecommunication Security
AVS
— Anti-Virus Station
PAD
— Private Alias Directory
RAM
— Remote Authorization Mechanism
PEF
— Plain English Firewall
SD
— Self Delete
LE
— Live Encoding
CRR
— Cyber Resilience Review
RCE
— Region Content Encryption
IE
— Intelligent Encryption
SK
— Spatial Key
SBI
— Slip Bluetooth Interface
MS
— Malicious System
UMA
— Unlocking Mechanical Apparatus
MOD
— Methods Of Destruction
SMC
— Super Map Controller
CMK
— Complete Match Key
Show More Results
33