toggle menu
Categories
Locations, Regional & international
Business & Finance
Common / Miscellaneous / Community
Medical
Scientific & Educational
Computing & IT
Internet Slang, SMS, Texting & Chat
Governmental & Military
Submit new
Desktop Version
Top Abbreviations
Acronym > Term
Word in meaning
Term > Acronym
Home
/
Governmental & Military
/
Security
Governmental & Military
>> Security Abbreviations
Look through 1646 acronyms and abbreviations related to Security:
PRL
— Password Recovery List
PRK
— Password Recovery Key
LAN
— Local Area Network
WWWW
— World Wide Web Worm
PPK
— Previous Page Key
PPA
— Privacy Protection Act of 1980
PPE
— Prefix-Preserving Encryption
PPP
— Protect Proper Patch
WYX
— Boot Sector Virus
LIDS
— Linux Intrusion Detection System
RFID
— Radio Frequency Identification
PNE
— Password Never Expires
HIPAA
— Health Insurance Portability and Accountability Act of 1996
ARS
— Autonomously Replicating Sequence
PIE
— Propagation Infection and Execution
PIC
— Position Idependent Code
PID
— Personal Identity Digit
PKM
— Private Key Management
PKU
— Public Key Unit
PIPS
— Pre-Incident Planning System
SYN
— Synchronous
PKO
— Private Key Operation
PIR
— Priority Information Report
PITR
— Point-In-Time Recovery
PICS
— Personal Information Communication Storage
PKES
— Public Key Enablement Service
PIN
— Password Identification Notification
PIM
— Personal Information Manual
PING
— Privacy Is Not Guaranteed
ZADIR
— Zero Assumption Digital Image Recovery
XCBF
— XML Common Biometric Format
R-UIM
— Removable-User Identity Module
MDC
— Modification Detection Code
WAPARS
— Web-based Auto Permissioning, Authorization, and Reporting System
XAVF
— XMAIL Anti-Virus Filter
MAAM
— Modular Authentication and Authorization Middleware
TACTED
— Tactical Trunk Encryption Device
RFO
— Reason For Outage
ACE
— Access Control Entry
DDOS
— Distributed Denial of Service
KEK
— Key Encryption Key (COMSEC Key)
DOD
— United States Department of Defense
SPM
— Spy Password Manager
RAM
— random-access memory
OTP
— One Time Password
SAN
— Storage Area Network
DES
— Data Encryption Standard
AES
— Advanced Encryption Standard
PGP
— Pretty Good Privacy (encryption)
ICE
— Intrusion Countermeasures Electronics
OCR
— Optical Character Recognition
ISMS
— Information Security Management System
CGI
— Common Gateway Interface
DRAM
— Dynamic Random Access Memory (dee-ram) (computing)
PC
— Personal computer (host)
CISO
— Chief Information Security Officer
CSIRT
— Computer Security Incident Response Team
PNP
— Plug aNd Play
UDP
— User Datagram Protocol (FDDI related)
BKL
— Big Kernel Lock
COOP
— Continuity of Operations
DCOM
— Distributed Component Object Model
APP
— Application
ITU
— International Telecommunication Union
FOIA
— Freedom of Information Act
IE
— Internet Explorer
COMSEC
— Communications Security (military)
ATA
— Advanced Technology Attachment
DL
— Download
TASO
— Terminal Area Security Officer
MTTF
— Mean Time To Failure
SCSI
— Small Computer System Interface
DSA
— Digital Signature Algorithm
CSC
— Computer Software Component
AC
— Access Control
AV
— Anti-Virus
WEP
— Wired Equivalent Privacy
SOA
— Service-Oriented Architecture
PAPA
— Privacy, Accuracy, Property, Accessibility
EEPROM
— Electrically Erasable Programmable Read-Only Memory
SHA
— Secure Hash Algorithm
ISAKMP
— Internet Security Association and Key Management Protocol
ITSEC
— Information Technology Security Evaluation Criteria
MICR
— Magnetic Ink Character Recognition
IDE
— Integrated Drive Electronics
ACPI
— Advanced Configuration and Power Interface
PCI DSS
— Payment Card Industry Data Security Standard
PHI
— Protected Health Information
IAM
— Identity and Access Management
EFF
— Electronic Frontier Foundation
PABX
— private automatic branch exchange (telephone)
XBRL
— Extensible Business Reporting Language
DT
— Don't Trust
CRL
— Certificate Revocation List
NSA
— National Security Agency
DOS
— Denial Of Service
CMMI
— Capability Maturity Model Integrated
SVG
— Scalable Vector Graphics
GUID
— Globally Unique Identifier
CHAP
— Challenge Handshake Authentication Protocol (ATM)
OS
— Operating System
PPP
— Point-to-Point Protocol
UCE
— Unsolicited Commercial E-Mail
DRM
— Digital Rights Management
SOC
— Security Operations Center
SPAWAR
— The Space and Naval Warfare Systems Command (SPAWAR), based in San Diego, is an echelon II organization within the United States Navy and Navy's technical authority and acquisition command for C4ISR (
TCB
— Trusted Computing Base
SID
— Security Identifier
DUKPT
— Derived Unique Key Per Transaction
CISSP
— Certified Information Systems Security Professional
ATO
— Authority to Operate
RSA
— Rivest-Shamir-Adleman
RFPA
— Right to Financial Privacy Act of 1978
SKL
— Simple Key Loader
AVI
— Audio Video Interleave
ZEN
— Zero Effort Network
HTTPS
— HyperText Transfer Protocol Secure
MAC
— Message Authentication Code
SW
— Software (SFTWE Preferred)
IPS
— Intrusion Prevention System
SOAP
— Simple Object Access Protocol
ECC
— Elliptic Curve Cryptography
PAIN
— Privacy, Authentication, Integrity, and Non-repudiation
SSH
— Secure Shell Host
SSH
— Secure Shell (Unix program)
NLI
— Not Logged In
ICE
— Immigration and Customs Enforcement
LDAP
— Lightweight Directory Access Protocol (pronounced Ell-dap)
CA
— Certificate Authority
CERT
— Computer Emergency Response Team
ENDEX
— End of Exercise
TLS
— Transport Layer Security
DASD
— Direct Access Storage Device
TKIP
— Temporal Key Integrity Protocol
BI
— Business Interruption
ADK
— Additional Decryption Key
MTSO
— Mobile Telephone Switching Office
HSM
— Hardware Security Module
EAD
— Encoded Archival Description
IA
— Information Assurance
SSOP
— Security Standard Operating Procedures
IEEE-SA
— Institute of Electrical and Electronics Engineers - Standards Association
KCSA
— Key Control Self-Assessment
ECPA
— Electronic Communications Privacy Act 1986
CCS
— Certified Coding Specialist
ACID
— Analysis Console for Incident Databases
TCSEC
— Trusted Computer System Evaluation Criteria
CIA
— Confidentiality, Integrity and Availability
PAP
— Password Authentication Protocol (ATM)
IPV4
— Internet Protocol Version 4
IDM
— Identity Management
PKI
— Public Key Infrastructure (cryptography)
GNOME
— GNU Network Object Model Environment
MTBF
— Mean Time Between Failures
HMAC
— Hash-Based Message Authentication Code
CCS
— Coded Character Set
VIRUS
— Vital Information Resource Under Siege
SCEP
— Simple Certificate Enrollment Protocol
CEV
— Controlled Environment Vault
TLV
— Type-Length-Value
CSC
— Card Security Code
QRT
— Quick Response Team
KDC
— Kerberos Key Distribution Center
DSS
— Digital Signature Standard
CF
— Compact Flash
DSLAM
— Digital Subscriber Line Access Multiplexer (Module)
EPON
— Ethernet Passive Optical Network
COAX
— Coaxial
CAVE
— Cellular Authentication and Voice Encryption Algorithm
OSSTMM
— Open Source Security Testing Methodology Manual
MOP
— Means of Production
DEA
— Data Encryption Algorithm
IEEE-CS
— Institute of Electrical and Electronics Engineers Computer Society
RBRVS
— Resource-Based Relative Value Scale
NIACAP
— National Information Assurance Certification and Accreditation Process
KMI
— Key Management Infrastructure
IDS
— Intrusion Detection System
PIMS
— Personal Information Management System
SRS
— Software Requirements Specifications
UID
— Unique Identifier
TNI
— Trusted Network Interpretation
SDLC
— Software development life cycle
PII
— Personally Identifiable Information
IDR
— Intelligent Disaster Recovery
QPSK
— aeronautical quadrature phase shift keying
EULA
— End User License Agreement (usually in reference to software)
IDEA
— International Data Encryption Algorithm
AET
— Advanced Encryption Technology
DOI
— Domain Of Interpretation
MIC
— Message Integrity Code
RIMM
— RAMBUS In-Line Memory Module
SD
— Secure Digital
CIP
— Critical Infrastructure Protection (US)
UTF
— Unicode Transformation Format
PEM
— Privacy-Enhanced Mail
SATAN
— Security Administrator Tool for Analyzing Networks
EFS
— Encrypting File System
TED
— Trunk Encryption Device
HEX
— Hexadecimal (base 16)
WWAN
— Wireless Wide Area Network
EIGRP
— Enhanced Interior Gateway Routing Protocol
IPV6
— Internet Protocol Version 6
NIS
— Norton Internet Security
ECP
— Encryption Control Protocol
GSI
— Grid Security Infrastructure
IEEE
— Institute of Electrical and Electronics Engineers
ICF
— Internet Connection Firewall
PUK
— PIN (Personal Identification Number) Unlocking Key
LZW
— Lempel-Ziv-Welch
SSH
— Secure Shell How
CSIRC
— Computer Security Incident Response Capability
SDSL
— Symmetric Digital Subscriber Line
SDIO
— Secure Digital Input/Output
MSS
— Managed Security Services
FDD
— Floppy Disk Drive
GDI
— Graphics Device Interface
NAV
— Norton Anti-Virus
CIS
— Center for Internet Security
VDD
— Version Description Document
SCP
— Secure Copy Protocol
DML
— Display Message Log
COMDEX
— Computer Dealers Exposition
KMP
— Key Management Protocol
DVP
— Digital Voice Privacy
NES
— Network Encryption System
LRC
— Longitudinal Redundancy Check
OWASP
— Open Web Application Security Project
USHER
— United States Higher Education Root Certificate Authority
SMM
— System Managers Manual
MAIS
— Murdoch Authentication and Identification System
DLP
— Data Leak Prevention
CIRC
— Cross-Interleaved Reed-Solomon Code
STM
— Synchronous Transport Module
SANS
— System Administration, Networking, and Security Institute
EAL
— Evaluation Assurance Level
ASLC
— Application Security Life Cycle
EKMS
— Electronic Key Management System
ESP
— Encapsulating Security Payload
KEA
— Key Exchange Algorithm
FOSE
— Federal Office Systems Exposition
NPF
— Norton Personal Firewall
NIDS
— Network Intrusion Detection System
CDP
— Continuous Data Protection
KSU
— Key Service Unit
UART
— Universal Asynchronous Receiver/Transmitter
PAM
— Pluggable Authentication Modules
LDIF
— LDAP (Lightweight Directory Access Protocol) Data Interchange Format
CDSA
— Common Data Security Architecture
BCI
— Business Continuity Institute
PSK
— Pre-Shared Key
MAPS
— Mail Abuse Protection System
ICSA
— International Computer Security Association
CMW
— Compartmented Mode Workstation
COMPASS
— COMPuter ASSurance Conference
DL
— Download Link
CCI
— Controlled Cryptographic Item
SAD
— Security Association Database
WGA
— Windows Genuine Advantage
NKMO
— Navy Key Management Officer
UAC
— User Account Control
XSS
— Cross-Site Scripting
CPLD
— Complex Programmable Logic Device
WPA
— Wi-Fi Protected Access
GPG
— GNU Privacy Guard
CALEA
— Communications Assistance for Law Enforcement Act
WAF
— Web Application Firewall
QAZ
— Quick Access Zone
CC
— Common Core
OTKSL
— One Time Key Subsidy Lock
CCNA
— Cisco Certified Network Administrator
CAL
— Client Access License
E3
— End-to-End Encryption
URT
— User Registration Tool
FRAM
— Ferroelectric Random-Access Memory
UUCP
— Unix-to-Unix Copy Program
BCH
— Bose, Chaudhuri, Hocquengum
QXS
— Quick Access
CAG
— Citrix Access Gateway
KSK
— Key Signing Key
ACS
— Access Control System出入控制系统
NSM
— Network Security Manager
CEH
— Certified Ethical Hacker
PPI
— Protected Personal Information
OTX
— Object Tool eXtended
CMS
— Cryptographic Message Syntax
VIO
— Virtual Input/Output
RLE
— Run-Length Encoding
TMAP
— Test Management Approach
RPO
— Recovery Point Objective
EMACS
— Editor MACroS
PUM
— Potentially Unwanted Modification
ISA
— Internet Security and Acceleration Server
QVS
— Quick Verification System
NVT
— Network Vulnerability Tool
CSRF
— Cross-Site Request Forgery
SPMN
— Software Program Managers Network
LSASS
— Local Security Authority Subsystem Service
REMSH
— REMote SHell
COMPUSEC
— Computer Security
NCSA
— National Computer Security Association
ABP
— AdBlock Plus
NAP
— Network Access Protection
WVPN
— Wireless Virtual Private Network
G4S
— Group 4 Securicor
STP
— Secret Tweaker Pad
CPL
— Current Privilege Level
VFM
— Virtual File Manager
FOIP
— Fax Over Internet Protocol
CA
— Conditional Access
QOI
— Quality of Information
USRT
— Universal Synchronous Receiver/Transmitter
TPM
— Trusted Platform Module
PIX
— Private Internet Exchange
UPN
— User Principal Name
HDCP
— High-bandwidth Digital Content Protection
BITNET
— Because It is Time NETwork
RA
— Registration Authority
ASIC
— Australian Securities & Investments Commission
ANDF
— Architectural Neutral Distribution Format
IBE
— Identity-Based Encryption
RSH
— Remote Shell
PSS
— Probabilistic Signature Scheme
ASPI
— Advanced SCSI (Small Computer System Interface) Programming Interface
NGFW
— Next Generation Firewall
HC
— High Compression
PA
— Privacy Act
WSA
— Wireless Security Auditor
AFSS
— AuthenTec Fingerprint Security System
SCAP
— Security Content Automation Protocol
DNT
— Do Not Track
SSPI
— Security Support Provider Interface
ZSK
— Zone Signing Key (information technology)
PKCS
— Public Key Cryptography Standard
CISM
— Certified Information Security Manager
SORBS
— Spam and Open Relay Blocking System
DECSS
— Decrypt Content Scrambling System
APWG
— Anti-Phishing Working Group
CCR
— Commitment, Concurrency and Recovery
BPE
— Byte pair encoding
SSH
— Secure Shell Home
STE
— Secure Telephone Equipment
VHSIC
— Very-High-Speed Integrated Circuit
SRP
— Secure Remote Passwords
SBL
— Spamhaus Block List
USF
— Universal Service Fund
BWF
— Barbed Wire Fence
QOP
— Quality Of Protection
AKMC
— Automated Key Management Center
AKMS
— Automated Key Management System
RC
— Run Commands (UNIX)
XMCL
— eXtensible Media Commerce Language (digital rights management cross-product metadata system)
PUP
— Potentially Unwanted Program
SBC
— Sub-Band Coding
TUCOWS
— The Ultimate Collection of Winsock Software
AGDLP
— Account, Global, Domain, Local, Permissions
DNSSEC
— Domain Name System Security Extensions
MMDS
— Multichannel Multipoint Distribution Service
RBAC
— Role-Based Access Control
ACE
— Assured Computing Environment (VMware)
HBA
— Host-Based Authentication
PKC
— Public Key Cryptography
RFH
— Request for Help
PAVA
— Public Address and Voice Alarm System
PIV
— Personal Identity Verification
SSAA
— System Security Authorization Agreement
UTM
— Unified Threat Management
ODMR
— On-Demand Mail Relay
SPKI
— Simple Public Key Infrastructure
VFS
— Virtual File System
APP
— Application Program
SAPI
— Speech Application Programming Interface
IDP
— Intrusion Detection and Prevention
SRR
— Software Requirements Review
CPRM
— Content Protection for Recordable Media
KL
— Key Length
3DES
— Triple Data Encryption Standard
CSR
— Certificate Signing Request
TISR
— Timer Interrupt Service Routine
NORA
— Non-Obvious Relationship Awareness
ABS
— Anti-Blockier-System
SSO
— Single Sign On
SPAP
— Shiva Password Authentication Protocol
RUID
— Real User Identification
CBL
— Composite Blocking List
VUL
— Vulnerability
IPO
— Input Process Output
GIG
— Global Information Grid
ASIS
— Application Software Installation Server
VZ
— Virtual Zone
SAR
— System Activity Report
WFG
— Wireless Firewall Gateway
AA
— Auto-Answer
CCMP
— Cipher Block Chaining Message Authentication Code Protocol
TIA
— Total Information Awareness
WKEK
— Working Key Encryption Key
FAM
— File Alteration Monitor
FAR
— False Alarm Rate
FA
— False Alarm
VKA
— Volatile Keying Assembly
SF
— Signature File
NSRL
— National Software Reference Library
LWST
— Lowest
PFS
— Perfect Forward Secrecy
XRML
— Extensible Rights Markup Language
NWS
— Non-Working Software
CVV
— Card Verification Value
SDFI
— Secure Digital Forensic Imaging
RBL
— Real-Time Block List
AVG
— Anti-Viral Guard
TOS
— Trusted Operating System
BT
— Back Trace
OEL
— Occupational Exposure Limit
IM
— Instant Messenger
PKA
— Public Key Authentication
ISC2
— International Information Systems Security Certification Consortium, Inc.
ZIL
— Zork Implementation Language
SAINT
— Security Administrator's Integrated Network Tool
APP
— Application-specific functions
PR
— Password Recovery
MPC
— Multimedia Personal Computer
WNAP
— Wireless Network Access Point
WUS
— Windows Update Services
WPKI
— Wireless Public Key Infrastructure
3DESEP
— Triple Data Encryption Standard Encryption Protocol
CCIRC
— Canadian Cyber Incident Response Centre
KMPDU
— Key Management Protocol Data Unit
SPI
— Security Parameters Index
PWR
— PassWord Recovery
QAV
— Qubux Anti-Virus
TSZ
— Temporary Security Zone
STD
— Security Tools Distribution
PF
— Packet Filter
TPF
— Tiny Personal Firewall
TDPS
— Topio Data Protection Suite
NSIS
— Nullsoft Scriptable Install System
RPL
— Requested Privilege Level
UUIM
— Unified User Identity Management
2S2D
— Double-Sided Double-Density
SCED
— Security-Constrained Economic Dispatch
VZE
— Virtual Zone Entrance
PBE
— Password Based Encryption
QCC
— Quantum Computation/Cryptography
WGX
— Wireless Gateway Switch
ECL
— Exit Control List
CAS
— Conditional Access System
ASVS
— Application Security Verification Standard
EQ
— Estimation-Quantization (type of coder)
WUP
— Wired Up Privacy
AU
— Authorized User
SSDD
— System/Segment Design Description (MIL-STD-498)
GPEE
— General Purpose Encryption Equipment
CSO
— Computer Security Officer
MLS
— Multi-Level Security
PIFI
— Personally Identifiable Financial Information
SCP
— Security Certified Program
ASIS
— American Society for Industrial Security
HPA
— Host Protected Area
PTD
— Password Tracker Deluxe
WYX.B
— Boot Sector Virus
SNP
— Security News Portal
KP
— Key Pulse
PCEF
— Policy and Charging Enforcement Function
ISA
— Internal Security Act
CVE
— Common Vulnerabilities and Exposures
RBS
— Remote Backup Software
UPS
— Un-interruptable Power Supply
RDT
— Reliable Data Transfer
CRAM
— Challenge-Response Authentication Mechanism
BIS
— Boot Integrity Service
CLASP
— Comprehensive, Lightweight Application Security Process
ISSO
— Information Systems Security Officer
CMPPA
— Computer Matching and Privacy Protection Act of 1988
IAO
— Information Assurance Officer
SK
— Session Key
SZM
— Security Zone Management
WIX
— Wireless Information EXchange
SLME
— Select Manual Entry
SFP
— System File Protection
CTL
— Certificate Trust List
S
— Secure
ZAM
— Zone Announcement Message
VKF
— Variable Key Function
COW
— Computer On Wheels
AFEKMS
— Air Force Electronic Key Management System
TPVS
— Third Party Verification Service
TEA
— Tiny Encryption Algorithm
OPPA
— Online Privacy Protection Act of 2003
ZAR
— Zero Assumption Recovery
WNAS
— Wireless Network Access Services
DTO
— Denial To Operate
ADHOC
— Associated Destructive Hackers Of Columbia
TEED
— Tactical End-to-End Encryption Device
ANR
— Automatic Network Replenishment
SKU
— Security Kernel Unit
NACL
— Named Access Control List
LGPO
— Local Group Policy Object
PKIX
— Public Key Infrastructure for X.509 Certificates
KS
— Key Stage
FUD
— Fully Undetected
CFC
— Call for Comments
ULS
— Update of Legacy Systems
GPIB
— General Purpose Interface Bus
CACRL
— Custodian Authorization Custody Receipt Listing
DH
— Diffie-Hellman
CSA
— Cisco Security Agent
SACL
— System Access Control List
KVL
— Key Variable Loader
VTL
— Virtual Test Laboratory
WIMP
— Windows, Icons, Mouse, and Pointer
IKEP
— Internet Key Encryption Protocol
ONVIF
— Open Network Video Interface Forum
WSSP
— Web Service Security Policy
VDB
— Vulnerability DataBase
VSS
— Video Surveillance System
KAM
— Key Account Management
LO
— Log Out
SEM
— Security Event Management
URP
— User Registration Protocol
IPES
— Improved Proposed Encryption Standard
CSAC
— Cross Signature Assurance Criterion
APKI
— Architecture for Public Key Infrastructure
PKM
— Personal Knowledge Management
VGA
— VGA (Video Graphics Array) Graphics Adapter
NBSP
— National Biometric Security Project
CFS
— Cryptographic File System
MFA
— Multi-Factor Authentication
SVI
— Switched Virtual Interface
3DESE
— Triple Data Encryption Standard Encryption
QPRK
— Quicken Password Recovery Key
SZE
— Security Zone Entry
ASA
— Adaptive Security Appliance
WFP
— Windows File Protection
2VPCP
— Two-Version Priority Ceiling Protocol
RIP
— Regulated Interaction Protocol
PL
— Private Line
ZMS
— Zhone Management System
OGSA-SEC-WG
— Open Grid Services Architecture Security Working Group
VACL
— VLAN (Virtual Local Area Network) Access Control List
PGPI
— Pretty Good Privacy for the Internet
AVERT
— Anti-Virus Emergency Response Team
DSC
— Digital Security Controls
IC
— Identification Code
COOP
— Continuity of Operations Procedure
PWP
— Password Protected
PAS
— Personal Access System
WEP
— Wireless Encryption Protocol
RC
— Ron's Cipher
CAAS
— Common Authentication and Authorization Service
AAI
— Authentication and Authorization Infrastructure
UBE
— Unsolicited Bulk E-Mail
UCK
— Universal Correlation Key
CRAP
— Challenge Response Authentication Program
PVV
— PIN (Personal Identification Number) Verification Value
IP
— Ingress Protection
USIM
— Universal Subscriber Identity Module
RSTR
— Request Security Token Response
INE
— Improved Network Encryption
AAIP
— Authentication and Authorization Infrastructure Project
ISM
— Information Security Management
PCP
— Priority Ceiling Protocol
OTAC
— One-Time Authorization Code
NAUP
— Network Acceptable Use Policy
DHK
— Diffie Hellman Knowledge
DACS
— Distributed Access Control System
ACU
— Access Control Unit
PES
— Proposed Encryption Standard
ACFA
— Access-Control Framework Access
AFKMS
— Air Force Key Management System
PBA
— Pre-Boot Authentication
CSP
— Computer Security Plan
WYX.C
— Boot Sector Virus
OTAR
— Over-The-Air Rekeying
DCS
— Device Control String
EEE
— End-To-End Encryption
APP
— Application Programming Platform
RHCSS
— Red Hat Certified Security Specialist
PAS
— Privacy Act Statement
IMSS
— InterScan Messaging Security Suite
IKE
— Internet Key Encryption
WASC
— Web Application Security Consortium
ZC
— Zone Controller
ZI
— Zero Incident
ADPSSO
— Automatic Data Processing System Security Officer
UDACT
— Universal Digital Alarm Communicator Transmitter
CCSP
— Cisco Certified Security Professional
ZB
— Zone Boundary
WBFS
— Wii Backup File System
SSPR
— Single Sign-On Password Reset
K
— Key/Black
AESDE
— Advanced Encryption Standard Development Effort
SSP
— Security Support Provider
CAMEO
— Computer-Aided Management of Emergency Operations System
KMASE
— Key Management Application Service Element
NP
— No Password
ABU
— Analog Backup
AAAA
— Authentication, Authorization, Auditing, and Accounting
SVP
— Secure Video Processor
PKS
— Public Key Server
ZM
— Zone Management
EED
— Encryption and Encapsulation Device
AVZ
— AntiVirus by Oleg Zaitsev
CPC
— Cyberarmy Privacy Commission
PNR
— Personal Name Record
OSE
— Open Security Exchange
PWF
— PGP (Pretty-Good Privacy) WinFront
ASA
— Adaptive Security Algorithm
CD-ROM XA
— Compact Disc Read-Only Memory eXtended Architecture
SADA
— Select Agent Distribution Activity
DES-CBC
— Data Encryption Standard-Cipher Block Chaining
RAT
— Remote Access Trojans (CERTs - Hacker Programs)
GPE
— Group Policy Editor
SLED
— Specification Language for Encoding and Decoding
WHID
— Web Hacking Incident Database
UIM
— User Identity Module
CISP
— Cardholder Information Security Program
NSTISSAM
— National Security Telecommunications and Information Systems Security Advisory Memorandum
ZRP
— Zone Routing Protocol
MKMP
— Modular Key Management Protocol
AAA
— Authentication, Authorization, and Accountability
ASIO
— Australian Security Intelligence Organization
VK
— Virtual Keyboard
SAFER
— Secure and Fast Encryption Routine
LVQ
— Learning Vector Quantization
ACRU
— Active Confirmed Registered User
TVA
— Time Variance Authority
ZBS
— Zone Boundary Switching
ACES
— Army Communication Encryption System
ZIF
— Zero Incident Frequency
OPSEC
— Open Platform for Secure Enterprise Connectivity
CSIS
— Canadian Security Intelligence Service
JPG
— Joint Photographic Experts Group picture file
WDRT
— Whole Disk Recovery Token
ZC
— Zone Checker
AAPR
— Advanced ARJ (Archived by Robert Jung) Password Recovery
ZLE
— Zone Limit Exceeded
CT
— Cipher Text
MEK
— Message Encryption Key
DMCA
— Digital Millenium Copyright Act
WES
— Wireless Encryption Standard
KMSS
— Key Management Software Support
ODI
— Open Datalink Interface
PK
— Public Key
ENISA
— European Network and Information Security Agency
CS
— Case Sensitive
TNE
— Trusted Network Environment
HDC
— Handle for Device Context
SECSH
— SECure SHell
KMC
— Key Management Center
AIP
— Application Integrity Policy
WSSE
— Web Services Security Environment
SPIN
— Secure Personal Identification Number
RSAES-OAEP
— Rivest-Shamir-Adleman Encryption Scheme - Optimal Asymmetric Encryption Padding
WKT
— Well-Known Text
TEKD
— Transmission Encryption Key Device
CHA
— Concentric Hemispherical Analyzer
ADPSO
— Automatic Data Processing Security Officer
OSG
— Operational Security Guidelines
ADT
— Ant Detection Technology
AFD
— Auto Format Decode
KAMS
— Key Account Management System
UC
— Unacceptable Content
NCER
— Non-Compliance Escalation Report
EA
— Extended Attribute
TST
— Transitional Stored Ticket
CLSID
— Computer Licence Security ID
TPA
— Third Party Access
ISSA
— Information Security for South Africa
KM
— Key Management
CRACK
— Challenge Response for Authenticated Cryptographic Keys
DSS
— Data Security Standard
PCIS
— Partnership for Critical Infrastructure Security
CIRC
— Computer Incident Response Capability
TDES
— Tactical Data Encryption System
ZL
— Zone Limit
ZCA
— Zone Control Alarm
MSFT
— Most Secure Firewall Tester
EM64T
— Extended Memory 64-bit Technology
FBE
— Function-Based Encryption
ACS
— Accredited Certification Scheme
EDESPL
— Endorsed Data Encryption Standard Products List
TS-CAL
— Terminal Services - Client Access License
PED
— Programmable Encryption Device
CVTP
— Certified Vaulting Technology Professional
KAMP
— Key Account Management Protocol
VIR
— Virus
RWPCP
— Read/Write Priority Ceiling Protocol
IPC
— Internet Privacy Coalition
ECES
— Elliptic Curve Encryption Scheme
ADSS
— Access Decision Support Services
TGB
— TheGreenBow Personal Firewall
ECA
— External Certificate Authority
WIDJ.1093
— Life is Beautiful virus hoax
HTL
— Hack Tracking Log
CVV
— Creditcard Verification Value
CPA
— Chosen-Plaintext Attack
EKM
— Electronic Key Management
SK
— Stop Keying
ZA
— Zone Alarm
PHH
— Project Honeypots and Honeynets
KMF
— Key Management Facility
KDM
— Key Dependent Message
EES
— Escrow(ed) Encryption Standard
AKM
— Automated Key Management
ESS
— Emergency Shutdown System
DCP
— Defense Continuity Program
LUA
— Least-privileged User Account
CASS
— Certification and Accreditation Support System
NPCP
— New Priority Ceiling Protocol
ZA
— Zone Announcement
SHTTP
— Secure Hyper Text Transfer Protocol
WMVG
— WalruS Macro Virus Generator
PG
— Privacy Guard
VV&A
— Verification, Validation, and Authentication
RDES
— Randomized Data Encryption Standard
NOSC
— Network Operations Security Center
FEK
— File Encryption Key
SKMM
— Standard Key Management Module
SISO
— Soft-Input Soft-Output
SPEWS
— Spam Prevention and Early Warning System
SPU
— Secure Processing Unit
KMD
— Key Management Device
ACCE
— Advanced Configurable Crypto Environment
MAAWG
— Messaging Anti-Abuse Working Group
ADT
— Advanced Development Tool
HSS
— Hierarchical Secure System
IKP
— Internet-Keyed Payment
DP
— Data Privacy
NYB
— New York Boot virus
EDAC
— Evidence-Based Design Accreditation and Certification
SORB
— Secure Object Request Broker
HAK
— Hacker Assault Kit
DSMP
— Data and Safety Monitoring Plans
SSOP
— Standard Security Operational Procedures
IKMP
— Internet Key Management Protocol
IPSEC
— Internet Protocol SECurity protocol
LCEAD
— Low-Cost Encryption and Authentication Device
FARP
— False Alarm Reduction Program
TKI
— Temporal Key Integrity
DCP
— Data Compression Protocol
CAS
— Central Authentication Service
IAPC
— International Audit Protocol Consortium
PKE
— Public Key Encryption
PKS
— Public Key System
BCCM
— Business Continuity Consultancy and Management
ZCM
— Zone Convexity Message
MKB
— Media Key Block
XES
— XML Encryption Standard
DESCBC
— Data Encryption Standard/Cipher Block Chaining
PK
— Primary Key
NADS
— Network Anomaly Detection System
SCMS
— Secure Console Management Switch
UAR
— User Access Rights
ZC
— Zone Convexity
AERN
— Advanced EAS (Emergency Alert System) Relay Network
STAT
— Security Test and Analysis Tool
ACFTT
— Advanced Computer Forensic Techniques Training
DLM
— Dynamic Link Module
CAAR
— Computer Assisted Accreditation Reporting
OOBA
— Out-Of-Band Authentication
LOC
— Low Overhead Cipher
VCL
— Virus Creation Laboratory
VDL
— Virus Description Language
ACFT
— Advanced Computer Forensic Techniques
ZKP
— Zero-Knowledge with Public keys
VSAM
— Video Surveillance and Monitoring
YAPS
— Yet Another Port Scanner
APAS
— Automated Prior Authorization System
EAP
— Electronic Authentication Partnership
COOP
— Continuity of Operations Program
ASKMM
— Advanced Standard Key Management Module
COOP
— Continuity of Operations Project
EPD
— Equipment Protective Device
STRIP
— Secure Tool for Recalling Important Passwords
PCRF
— Policy and Charging Rules Function
IA
— Instant Access
KP
— Key Pair
KMID
— Key Management Identification
KCN
— Key Conversion Notice
SID
— Security in Depth
MEL
— MIME (Multipurpose Internet Mail Extensions) Encoding Library
JITA
— Just In Time Authentication
HTS
— Hack This Site
SPL
— Security Protocol Language
COOP
— Continuity of Operations Policy
UIC
— User Identification Code
FCFB
— Fire Classified Floor Box
ACS
— Authenticated Content Signing
TPL
— Trusted Products List
FEMA
— Federal Emergency Mangement Agency
LSM
— Linux Security Module
CVP
— Content Vector Protocol
ASAC
— Application Security Attack Components
HIPS
— Host Intrusion Prevention System
CRS
— Certificate Retrieval System
NLE
— Network-Layer Encryption
ADMS
— Advanced Distributed Monitoring System
PCI SSC
— Payment Card Industry Security Standard Council
WHOG-878
— Computer Virus (Windows 95/98)
CCRA
— Common Criteria Recognition Arrangement
TGW
— Trusted GateWay
JKM
— Joint Key Management
CCTL
— Common Criteria Testing Laboratory
ACT
— Access Coordination Team
UES
— User Electronic Signature
ZCR
— Zone Checkers Room
UUT
— Universal User Tracking
SPEE
— Special Purpose Encryption Equipment
DITSCAP
— Defense Information Technology Security Certification and Accreditation Program
HOST
— Hotel Operating Statistics
MIPS
— Million Instructions Per Second
MESH
— Multimedia Embedded Security Hub
ICT
— Instant Center Tracking
CID
— Card Identification Digit
ARO
— Annualized Rate of Occurrence
SECTY
— Security
WSPEC
— Workshop on Security and Privacy in E-Commerce
TDG
— Three Days Grace
HIDS
— Host Intrusion Detection System
WKB
— Well-Known Binary
ACF
— Access Control File
IDPS
— Intrusion Detection and Prevention Service
IASE
— Information Assurance Support Environment
EBSI
— Enhanced Backup Solutions Initiative
DST
— Digital Signature Transponder
REQ
— Requirement
SMC
— SCSI (Small Computer System Interface) Media Changer
ST
— Screening Tool
EDES
— Electronic Document Encryption System
I
— Insecure
PME
— Protection Mitigation and Enhancement
SSPM
— Self-Service Password Management
DLT
— Direct Linear Transformation
CALS
— Consolidated Accreditation and Licensure Survey
SSO
— Single Sign on Oracle
NISO
— National Information Standards Organization
DLP
— Data Loss Prevention
SANE
— Secure Active Network Environment
HEPKI
— Higher Education Public Key Infrastructure
CK
— Crypto Key
AVPE
— Anti-Virus Policy Enforcement
GACL
— Generic Access Control List
TPKE
— Threshold Public-Key Encryption
XI
— Xtreme Integrity
K
— Key Generator
CMC
— Certificate Management protocol using CMS
XKM
— XML Key Management
NKM
— Navy Key Management
ACIT
— Advanced Countermeasures for Insider Threats
CAPI
— Cryptography Application Programming Interface
CPSA
— Content Protection System Architecture
ISAM
— Information Security Awareness Month
KPCM
— Key Privilege and Certificate Management
AUP
— Acceptible Use Policy
TDS
— Trojan Defense Suite
BEK
— Bulk Encryption Key
SKMP
— Standard Key Management Protocol
IWA
— Integrated Windows Authentication
ICSF
— Institute for Computer Security and Forensics
SSP
— Single Sign-on Password
TEK
— Transmission Encryption Key
MBAM
— Malware Bytes Anti-Malware
DES/CBC
— Data Encryption Standard/Cipher Block Chaining
SMX
— Server Macro Expansion
SSO
— Single Sign on Option
AIV
— Artificially Intelligent Virus
PTD
— Personal Trusted Device
SECT
— Secure Electronic Compliance Technologies
UTMS
— Unified Threat Management System
UOWHF
— Universal One-Way Hash Function
HAC
— Hierarchical Access Control
KKDC
— Kerberos Key Distribution Center
VHM
— Virtual Hacking Machine
RKP
— Relative Key Position
STCA
— Security Technologies for Collaborative Architectures
KMSA
— Key Management System Agent
ID
— Intrusion Detection
TBV
— Transaction-Based Verification
WAKE
— Word Auto Key Encryption
AHS
— Advanced Habbo Security
MOSS
— MIME (Multi-purpose Internet Mail Extensions) Object Security Services
IAAC
— Information Assurance Advisory Council
VDH
— Very Distant Host
EKMC
— Electronic Key Management Center
AVG
— Anti-Virus Group
JKMS
— Joint Key Management System
SNAP
— Secure Network Access Platform
RUIM
— Removable User Identity Module
VSAT
— Vulnerability Self Assessment Tool
APAP
— Army Privacy Act Program
SK
— Secret Key
RPSS
— Routing Policy System Security
ECMEA
— Enhanced Cellular Message Encryption Algorithm
SBQ
— Secure Business Quarterly
SMKS
— Single Master Key Scheme
URV
— Universal Remote Viewing
SCIP
— Security, Confidentiality, Integrity, and Privacy
ILS
— Internet Locator Server
UMD
— Universal Media Disk
ABS
— Active Battery Security
KIP
— Key management for Internet Protocols
BPI
— Baseline Privacy Interface
ANTS
— A New Trojan Scanner
QPR
— Quicken Password Recovery
SAML
— Security Assertions Markup Language
WO
— Web Object
SKA
— Secret Key Algorithm
SPKM
— Simple Public Key Mechanism
RKSS
— Random Key Spaces Scheme
XKMS
— XML Key Management Specification
APF
— Advance Policy Firewall
HARS
— Homomorphic Authenticable Ring Signature
WTD
— Who to Delete
CSDII
— Cross-Sector Digital Identity Initiative
CAU
— Control Access Unit
WWUI
— World-Wide Unique Identifier
NEU
— Network Encryption Unit
MOLE
— Multichannel Occurrent Logger Evaluator
NRP
— Nominal Rate of Protection
MCRC
— Malicious Code Research Center
AESD
— Advanced Encryption Standard Development
PAR
— Privacy Act Release
CSP
— Certificate Service Provider
LWS
— Light-Weight System
ADFT
— Advanced Digital Forensic Techniques
AITS
— Advanced Interface for Tactical Security
IDEAS
— Internet Design Engineering And Security
HAL
— Hackers At Large
VAM
— Vulnerability Assessment and Management
MACI
— Multiple-Access Cryptographic Interface
CACI
— Controlling Access to Computer Information
UIN
— User Identification Number
SCIP
— Security Cooperation Information Portal
RPCA
— Responsable du Plan de Continuité d'Activité
JIAS
— Journal of Information Assurance and Security
SDMI
— Secure Digital Music Initiative
LIU
— Logged In User
SMIME
— Secure multipurpose Internet Mail Extensions
GINA
— Graphical Interface For Neural Applications
IKE
— Implicit Key Expiration
FIC
— Fidelis Interoperable Credential
HEAD
— Hand-held Encryption Authentication Device
IDSC
— Intrusion Detection Systems Consortium
TSS
— Transaction Security System
AVS
— Access Verification Service
MTIPS
— Managed Trusted Internet Protocol Service
ULS
— User Level Security
URS
— United Recovery Services, Inc.
RPA
— Remote Patron Authentication
KMUA
— Key Management User Agent
BBWC
— Battery-Backed Write Cache
ASAP
— Application System Authorization Process
SKIP
— Simple Key Management for Internet Protocols
WYOP
— Write Your Own Program
NCF
— Neutral Code Format
PASR
— Preparatory Action and Security Research
EKMP
— Electronic Key Management Protocol
PVG
— Protection of Vulnerable Groups
K
— Key
DRAR
— Data Recovery And Repair
WYX.A
— Boot Sector Virus
MDC
— Message Digest Cipher
SPDS
— Sealed Parcel Delivery System
UPUK
— Universal Personal Unblocking Key
CSS
— Client Security Software
QQT
— Quick Qard Technology (France)
VTN
— VeriSign Trust Network
KVM
— Key Variable Management
IPKI
— Internet X.509 Public Key Infrastructure
AISECPOL
— Assimilation of Integral SECurity POLicies
UCU
— Universal Control Unit
JKMP
— Joint Key Management Plan
RLC
— Rebound Lockout and Compression
VTN
— Virtual Trust Network
PPKC
— Probabilistic Public Key Cryptosystem
DKG
— Decryption Key Generator
KV
— Key Variable
ECC
— Electronic Check Conversion
JCA
— Java Cryptography Architecture
TSOL
— Trusted SOLaris operating system
BKE
— Bilateral Key Exchange
CC
— Command Code
WBVS
— Web Based Verification System
AVC
— Access Vector Cache
HIP
— Hacking In Progress
NKMS
— Navy Key Management System
TKG
— Terminal Key Generator
FUV
— Fordham University Virus
DMTC
— Disaster Management Training Course
UDO
— Ultra Density Optical storage
PAPI
— Public And Private Information
IBTT
— Identity-Based Traitor Tracing
ADPSP
— Automatic Data Processing Security Plan
MACS
— Monitor And Control System
CMEA
— Cellular Message Encryption Algorithm
GIAC
— General Inquiry Access Code
DSCA
— Dynamic Security Control Architecture
WOSA
— Workshop on Software Assessment
APP
— Application Transport Parameter
EPE
— Enhanced Privacy and Encryption
DC
— Double Check (valve used to protect water supplies)
ASPECT
— Automated Security Protocol Examination and Checking Tool
SARA
— Symantec Antivirus Research Automation
CNS
— Computer and Network Security
ECCO
— Emergency Computer Crisis Organization
FPOC
— Fortezza PKI Operations Center
COPS
— Computer Oracle and Password System
NINA
— Non-Intrusive Network Assessment
JKMIWG
— Joint Key Management Infrastructure Working Group
ECL
— Encoder Control List
ROT13
— ROTate 13 encoding
SSPE
— Simple Security Policy Editor
CSAD
— Computer Security Awareness Day
SAINT
— Security Alliance for Internet and New Technologies
SNF
— Single Network Firewall
SET
— Secure Encryption Technology
IAP
— Information Assurance Program
KVMPR
— Key Variable Management Procedures
VVZ
— Virus Varicela-Zoster
CSAC
— Computer Security Advisory Committee
DCMS
— Distributed Certificate Management System
ONC
— OpenNet Controller
CSCI
— Computer Systems Center Incorporated
DLF
— Definable Logging Format
FAAP
— False Alarm Analysis Program
SLAM
— Site Logging and Monitoring
RKE
— Remote Keyless Entry
NVH
— Network- Vs. Host-based intrusion detection
SMK
— System Multipurpose Key
EKG
— Encryption Key Generator
M/S
— Master/Session
ILE
— In-Line network Encryption
CRS
— Carrier Router System
APARS
— Auto Permissioning, Authorization, and Reporting System
FEBA
— Firewalls, Encryption, Backups, and Access
WSH
— Windows Scripting Host
TCBA
— Thread Can Be Archived
CKDS
— Cryptographic Key Data Set
PADS
— Protected Archives Distribution System
OATH
— Open AuTHentication
NEK
— Network Encryption Key
SKS
— Synchronizing Key Server
WQK
— Variant of the W32/ElKern firus
VTM
— Viral Traffic Machine
KES
— Keyless Entry System
HIP
— Host Interface Program
DDRM
— Dynamic Digital Right Management
MIME
— Multipurpose Internet Mail Extensions
MNF
— Multi-Network Firewall
EDESP
— Endorsed Data Encryption Standard Product
COAST
— Computer Operations Audit and Security Tools
MSSE
— Microsoft Security Essentials
RRD
— Resonant Reed Decoder
DPSWG
— Digital Privacy and Security Working Group
RID
— Remote Intrusion Detector
ISDP
— Information Sharing Data Protection
EDS
— Emergency Disaster Services
PKA
— Public Key Algorithm
AAL
— Access Activity Log
WPK
— Wireless Public Key
ADG
— Advanced Data Guardian
MOST
— Michigan Online Security Training
HATS
— High Assurance Transformation System
OPA
— Online Privacy Alliance
SPDR
— Secure Protected Development Repository
LSO
— Local Shared Objects
JCSR
— Japan Computer Security Research
VHM
— Virus Help Munich
NSSA
— National Security Space Architecture
WSRP
— Web Services for Remote Portlets
TEI
— Text Encoding Initiative
MASKMM
— Modified Advanced Standard Key Management Module
RPSS
— Reverse Proxy Security Servers
RS
— Reed Solomon
KSSA
— Kurt Seifried Security Advisory
MCG
— Meta Certificate Group
ITH
— Item That's Hacked
EPIC
— Electronic Privacy Information Center
NAS
— Network Authentication Service
MAA
— Message Authentication Algorithm
NU
— New User
OASIS
— Orbis Advanced Security Intruder System
ISBG
— International Security Buyers Guide
VCK
— Visual Cryptography Kit
CP
— Code Page
SPOE
— System Point Of Entry
DPNSS
— Digital Private Network Signalling System
MLES
— Multiple Line Encryption System
TYM
— Taking Your Machine
MPD
— Microsoft Project Database
TC
— Thin Client
CCLE
— CheckPoint Certified Licensing Expert
GETS
— Government Emergency Telecommunications Service
ZRG
— Zhone Residential Gateway
NOSSA
— Naval Ordnance Safety & Security Activity
CAT
— Crisis Action Team
SARC
— Symantec Antivirus Research Center
DBM
— DataBase Maintenance
FHC
— Fairhaven Hacking Clan
ISBS
— Information Security Breaches Survey
XBL
— Exploits Block List
STO
— Security Through Obscurity
OSD
— Open Source Definition
UGO
— User, Group, and Other
CAS
— CPE (Customer Premise Equipment) Alert Signal
SE
— Security-Enhanced
ESD
— Electronic Secure Delivery
RPC
— Region Protection Control
VTC
— Virus Test Center
NST
— Network Security Toolkit
KVMS
— Key Variable Management System
ISATP
— Information Security Awareness Training Program
SEP
— Secure Execute Processor
APP
— Application Portability Profile
RIMS
— Remote Intelligent Monitoring System
VT
— Virus Tools
URA
— User Role Assignment
APG
— Automated Password Generator
DCHT
— Development Capricorns Hack Team
INSS
— Internal Network Security Sweep
UACT
— User Account Control Team
AA
— Awaiting Activation
IASE
— Internet Application Security Environment
UVS
— Universal Verification System
SVK
— Signature Verifiable Key
VK
— Virtual Key
FBI
— Fingerprint Biometric Identity
SXV
— Self-eXpanding Virus
ECDL
— Elliptic Curve Discrete Logarithm
OBB
— Orange Book Blog
SE
— Security Environment
IACR
— International Association for Cryptologic Research
SOAP
— Secure Overlay Access Point
EKOR
— Trojan Backdoor.Sdbot.AQ computer virus
VBFR
— Virtual Buffer
WAV
— Windows Anti-Virus
SDSI
— Simple Distributed Security Infrastructure
QHJ
— QL Hackers Journal
APT
— Anti-Piracy Technology
MMH
— Multilinear Modular Hashing
SK
— Surrogate Key
BUDR
— Back-Up and Disaster Recovery
WICF
— Windows Internet Connection Firewall
WSS
— Web Service Security
VEIL
— Variable Encryption and Intelligence Labeling
DPA
— Data Privacy Algorithm
TE
— Transmission Encryption
KMU
— Key Management User
TSSA
— Trusted System Software Architecture
UBD
— Uber0n Back Door
PCS
— Permanent Control Security
IPEM
— Internet Privacy Enhanced Mail
IFS
— Internet Fraud Screen
HUGS
— Harness Ultra Guard System
SAL
— Secure Auditing for Linux
APP
— Applications Programme Department
CMA
— Control and Monitoring Agent
VCP
— Vulnerability Contributor Program
TWS
— TrustWorthy Software
WUF
— Words Used Frequently
GABCS
— Government Advisory Board for CyberSecurity
DWH
— Deep and Wide Hash
GSP
— Guardian Service Processor
MEA
— Message Encryption Algorithm
RMF
— Reputation Management Framework
NICI
— Novell International Cryptographic Infrastructure
UCA
— Unauthorized Computer Access
RIC
— Recognizable Interchangeable Combinations
JKMI
— Joint Key Management Infrastructure
AFS
— American Filing System
ARC
— Authenticated Request Code
RPG
— Random Password Generator
WTS
— Web Transaction Security
AUS
— Anonymous Undeniable Signature
VAM
— Virtual Authorization Module
VSF
— McAfee VirusScan 6.0 - Full Version
RAN
— Registration Access Number
LOSC
— Letter Of Security Cognizance
DCC
— Distributed Checksum Clearinghouse
ACMP
— Access Control Management Program
QST
— Quality Security Training
CVI
— Cyber Viral Implant
SI
— Secure Internet
KGU
— Crypto Generator Unit
ELS
— Equidistant Letter Sequence
SPEAR
— Security Protocol Engineering and Analysis Resource
SNLT
— Speed Negotiation Lock Time
MACID
— Medium Access Control IDentifier
JCE
— Java Cryptography Extensions
AU
— Authenticated User
SLR
— Steam Lock Release
PASS
— Predicate Alteration Security System
CSM
— Cryptographic Services Module
ISP
— Internet Security Protocol
NIV
— No Information Verified
ESD
— Event Summary Data
ODBE
— Original Dynamic Broadcast Encryption
QKG
— Quantum Key Generation
DMV
— Document Macro Virus
ET
— Extended Technology
HT
— Hash table
JMP1
— Password Over-ride JuMPer number one
KEA
— Known Exponent Attack
VEST
— Virtual Environment for Secure Transactions
DNSBL
— Domain Name Server Block List
SUS
— System Update Service
OFC
— Optical Fiber Communications
TPV
— Third Party Verifications
DOWS
— Duck Operated Warning System
XSRF
— Cross-Site Request Forgery
TSM
— Trusted Service Management
DBDP
— Disk Based Data Protection
SKS
— Smart Key System
THC
— Totally Homogonous Cryptography
VKE
— VHF (Very-High Frequency) Keyless Entry
LSS
— Location Signature Sensor
WH
— WallHack
SAM
— Symantic Anti-virus for Macintosh
QAL
— Query Answered Log
USNM
— User Name
CDID
— Cross Divisional Identification
DSL
— Days Since Login
UI
— Unauthorized Information
SECAAS
— Security as a Service
LB
— Lock Bit
KCT
— Key Conversion Time
LCED
— Low-Cost Encryption Device
NIM
— Not-Inside Message
UVK
— Ultimate Virus Killer
TW
— Tequila Worm
BISF
— Business Information Security Firewall
IETF
— Intensional Existential Textuality Fanatics
QCM
— Query Certificate Manager
SME
— Short Message Encryption
PBC
— Potential Backup Cost
UVT
— McAfee VirusScan for Unix
TVD
— Total Virus Defence
AVC
— AntiVirus Comparatives
PAL
— Personal Access List
SO
— Sign Out
PWK
— PassWord Key
TPM
— Technical Protection Measure
RLN
— Release Lock Number
SCV
— Secure Client Verification
NLA
— Network Log Analyzer
ES
— Encryption Scheme
MIDAS
— Monitoring Intrusion Detection and Administration Server
DPU
— Data Protection Unit
RWS
— Roger Wilco Server
NMU
— Non-Maintainer Uploads
SEP
— Single Entry Point
APKS
— All Pairwise Key Scheme
KMIP
— Key Management Interoperability Protocol
RPG
— Real Private Group
HIPA
— Health Information Privacy Act of 1999
NID
— Network Intrusion Detection
SPAM
— Scanning Probe Array Memory
DL
— Download Last
SB
— System Border
IA
— Impersonation Attack
PWL
— Password List (Windows System File Extension .pwl)
VBH
— Vinyl Badge Holder
ZRM
— Zone Releasing Module
SPEED
— Secure Package for Encrypting Electronic Data
IKG
— Internet Key Generator
RKS
— Random Keys Scheme
GRI
— Guarding Rights Indefinite
SRN
— Security Reference Number
HIP
— Health Information Privacy
OSN
— Operator Security Number
SMEK
— Short Message Encryption Key
UCF
— Unregistration ConFirmation
IDMS
— Intrusion Detection Mitigation System
XAV
— XMAIL Anti-Virus
SA
— Security Advisory
SIATA
— Security Infrastructure for Agent-based Telecommunication Applications
NMH
— Non-linear Modular Hashing
IJB
— Internet JunkBuster
CISPA
— Cyber-Intelligence Sharing and Protection Act
KIF
— Key Interchange Format
CPW
— Check Password
SZE
— Shared Zone Entry
WSS
— Weapon System Specification
CDSSO
— Cross-Domain Single Sign-On
RPA
— Remote Password Authentication
ED
— Encryption Device
IOC
— Infrastructure Operating Center
S-BOX
— Substitution-box
CSVN
— Consistent SubVersioN
IKES
— Internet Key Encryption System
FPKI
— Federal Public Key Infrastructure
RPKS
— Random Pairwise Keys Scheme
ACID
— Anti-Copying In Design
MBAE
— MalwareBytes Anti-Exploit
KHG
— Kernel Hackers' Guide
NSIF
— National Security Industry Forum
GWV
— Gnutella Worm Victim
ME
— Message Encryption
IKM
— Internet Key Management
IPWG
— Interactive Privacy Working Group
USM
— User Session Management
MD
— Mini-Disk
OIAP
— Object-Independent Authorization Protocol
KC
— Key Conversion
SED
— Secure Encryption Device
EPI
— Electronic Privacy Information
WETM
— Waterman Error Trending Model
MASK
— Modified Advanced Standard Key
NTMG
— Network Threat Management Gateway
MLS
— Multiple Licensing Service
INES
— Improved Network Encryption Systems
SARA
— Self Assessment Risk Analysis
VZK
— Validate Zillion Key
SET
— Softcopy Exploitation Tools
WSC
— Weldex Security Camera
FPK
— Fast Public Key
ECS
— Encryption Control System
SD
— Secure Data
PKP
— Public Key Partners (A vendor)
CHFT
— Computer Hacking Forensic Training
ARIA
— Acceptable Risk, Incorrect Acceptance
FSAV
— F-Secure Anti-virus
FED
— File Encrypted Data
BOS
— Best of Security
IF
— Information Foraging
PARI
— Primary Access Rights Identifier
SAFE
— Secure and Fast Encryption
QXR
— Quick Access Recording
FEP
— Forefront Endpoint Protection
U
— Unlocked
KD
— Key Define
ISSA
— Information Systems Security Association
XCB
— eXtended CodeBook
SKM
— Standard Key Management
LOH
— List Of Hashes
HLBR
— Hogwash Light BRidge security software
UAS
— User Accounts Security
UA
— Unlimited Access
APP
— Application Peering Protocol
EC
— Encryption Control
ICS
— Inexpensive Cloaking Script
MYK
— Manage Your Keys
FW
— Fire Wall
KF
— Keyed File
WYX.C1
— Boot Sector Virus
CK
— Clear Key
SAC
— Slovak Antivirus Center
LEDS
— Lightweight Easy Debugging Service
SC
— Single Check
H
— Hoax
ISO
— Initial Sign-On
IACE
— Information Assurance Courseware Evaluation
RO
— Ring Out
EUSM
— External User Security Model
TOR
— Trusted Operating Root
EL
— Encryption Licensing
CSVC
— Computer System Validation Compliance
MASKM
— Modified Advanced Standard Key Management
SASKMM
— Sierra-based Advanced Standard Key Management Processor
ITC
— Information Trust Corporation
DVP
— Dynamic Virus Protection
CASS
— Computer Automated Security System
MSV
— Magnetic Strip Verification
SKT
— Sectioned Key Tree
ISTS
— Institute for Security Technology and Society
CTVS
— Cap Token Verification Service
CRV
— Connectivity, Reliability, and Value
IT
— Information Trickery
VFE
— Version with Full Encryption
SDC
— Security Data Corporation
TVC
— Trivial Vernam Cipher
ILRT
— Industry Loss Reduction Team
CIP
— Complete Internet Protection
UV
— User Visible
KVMP
— Key Variable Management Plan
RA
— Registry Agent
DJ
— Dumpster Jockey
BEF
— Browser Exploitation Framework
TDAR
— Temporary Desktop Administration Rights
SAS
— Scalable Available and Secure
EBS
— Enterprise Backup Solution
PST
— Pipeline Security Technology
SPC
— Software Protection Code
ZS
— Zone System
PE
— Privacy-Enhanced
SIC
— System Integrity Check
URA
— Ultimate Revenge Attack
CMS
— Classic Mole Style
EBB
— Encoder Breakout Board
DHS
— Deceptive Header Screening
UMS
— User Management System
EC
— Embedded Communication
RA
— Review Access
CS
— Coding Scheme
HIP
— Host Intrusion Prevention
FCC
— Full Cycle Checking
NI
— Not-Inside
DOG
— Disaster Operations Group
ISIS
— Isis Stands For Integrated Security
IIS
— Insecure Infiltration System
ASA
— After Security Advisory
UDID
— Universal Design IDentity
PENS
— Portcullis Enterprise Network Security
JCSV
— JCV/SV40 hybrid Virus
SSO
— Single Sign One
GLESEC
— GLobal Electronic-SECurity
OW
— Ominous Worms
CCC
— Card Capabilities Container
VD
— Virus Definition
WLES
— WebLogic Enterprise Security
APP
— Application Marker
NVA
— Network Vulnerability Assessment
SAARS
— Small Authentication And Recording System
WISL
— Wireless Security Laboratory
SFK
— Security Framework Kit
SRS
— Single Ring Security
MKM
— Modular Key Management
UE
— Unlikely Event
OSP
— Operator Security Password
IPP
— Identity Preservation Program
PAS
— Protected Area System
SPK
— Simple Public Key
TSI
— Telecommunication Security Information
SPD
— Security Policy Distribution
S
— Shredder
DCS
— Disaster Control Squad
MI
— Message Invader
GLT
— Ghetto LAN (Local Area Network) Thugs
KC
— Key Code
ISAR
— Internet Security Assessment of Risks
CRHF
— Collision-Resistant Hash Function
NUT
— N-Universal Transformation
KD
— Key Data
ODM
— Originally Detectable and Masked
GPK
— Gerombolan Pengacau Keamanan (hackers)
WUWA
— Wake Up, We're Affected
PTIN
— Postini Threat Identification Network
CUSIP
— Committee of Uniform Security Identification Procedures
MISK
— McGruff Internet Safety Kit
KG
— Key Generation
SAGE
— Security Algorithms Group of Experts
MGE
— Multi Gauntlet Emulator
QKD
— Quantum Key Distribution
MK
— Modular Key
KVMP
— Key Variable Management Protocol
UFO
— Un-Filtered Offering
VBA
— Virtual Base for Access
MLR
— Master Lock Resettable
VKM
— Vodak Kernel Model
LUP
— Least User Privilege
PSP
— Perfect Security Property
RES
— Revised Encoding Scheme
TPE
— Trusted Path Execution
TFA
— Two-Factor Authentication
APP
— Application Program Package
SIN
— Secure Identification Number
EMS
— Electronic Media Sanitization
RC
— Rivest Cipher
TTH
— Tiger Tree Hashing
LWS
— Link WorkStation
WG
— Worm Guard
WSSPF
— Web Service Security Policy File
ASDA
— Application Security Design Assessment
DPA
— Dynamic PolyAlphabetic
NT
— Not Trusted
STAT
— Secure Timed Audit Trail
AVP
— Anti-Virus Protection
SARDS
— Spam Analysis Reporting and Destruction System
QBP
— QuickBooks Password
TP
— Tamper Proof
VMPE
— Virtual Multi-Pass Encoding
PBM
— Passwords by Mask
SSA
— Super Spammers Anonymous
ONE
— Optimized Network Encryption
VPA
— Voice Privacy Adaptor
SBS
— Safe Bolt System
CAA
— Collusion Attack Algorithm
SBK
— Self-configured scheme for Boot-strapping Keys
CM
— Codebook Mapping
SCM
— Secure Console Management
IA
— Identification Authentication
PAPB
— Payment Application Best Practices
CM
— Cryptological Mathematics
DT
— Deletion Tracking
MPL
— Minumum Pattern Length
NAM
— Numbered Access Module
VATS
— Versatile And Tough System
SR
— Security and Replication
KISS
— Keep Internet Security Simple
PBM
— Partition Boot Manager
TT
— Time-Tagged
CCA
— Chosen Ciphertext Attack
MSSK
— McGruff Safer Senior Kit
ME
— Malicious Environment
UAC
— Unified Administration Center
LVE
— Lightweight Virtual Environment
PTC
— Polymorphic Tracking Code
VR
— Virus Removal
PD
— Parallel Decode
DSK
— Down-Stream Key
UG
— Up Gateway
ISBK
— Improved Self-configured scheme for Boot-strapping Keys
EIA
— Entry Identification and Access
PEF
— Password Encrypted Format
FT
— Fully Trusted
UU
— User Unknown
SPG
— Sequence Password Generator
KS
— Key Sign
MCFA
— Mirox Cyber Force Academy
CCP
— Cryptography Centralized Policy
TAS
— Token Access Support
PARS
— Privacy Act Release Statement
IDS
— Interface Domain Signature
CME
— Cellular Message Encryption
ESA
— Excessive Selective Access
MP
— Message Protector
NCSAM
— National Cybersecurity Awareness Month
BSP
— Best Security Practices
UTE
— Unlimited Time to Enter
VPI
— Very Poor Integrity
UVS
— Underground Vaults & Storage, Inc.
UCAR
— User Control Access Right
TPA
— Third Party Auditor
RTAL
— Real-Time Audit Log
NSTIC
— National Strategy on Trusted Identities in Cyberspace
RDE
— Randomized Data Encryption
TRU
— Trusted Reliable User
NV
— New Variant
IRIS
— Incident Resolution Information System
NC
— No Check
CL
— Counter Lock
DSK
— Directory Style Key
WBFB
— Whole Body Film Badges
TC
— Transform Coding
CP
— Copy Protected
MSA
— Multifunction Security Appliance
SOSA
— Spin Off Sub-Account
OMP
— Online Media Protection
SS
— System Security
STR
— Suspicious Transaction Reporting
ICM
— Integrated Cybercrime Management
ICS
— Ideal Costa Scheme
WE
— Wireless Encryption
PI
— Personal Information
NSPK
— Needham-Schroeder Public-Key
SNAP
— System Network Advanced Protection
FYI
— Filter Your Internet
IIS
— Instant Insecure Server
NE
— Network Encryption
SP
— Security Potential
ROS
— Remote Operations Security
VCI
— V-Chip Information
DLD
— Default Logging Destination
KMSSA
— Key Management Software Support Agent
TSP
— Tracking Security Protection
IPC
— Internet Protection Community
NSA
— Network Security Administration
SITE
— Sign In To Enter
OCB
— Offset Code Book
SAC
— Secure Authenticated Communication
URJ
— Un-registration ReJection
IPL
— Interim Parts Library
WJSB
— WannaJava Spam Controller
UXS
— Unix Security
LLI
— Last Login Identification
KA
— Key Address
IRF
— Inherited Rights and Filters
VW
— Virtual Wallet
BSG
— Belonging Security Goal
APP
— Application Program Processor
OCB
— Operational Cipher Block
PTF
— Partition Trace File
RPK
— Rapid Public Key
MB
— MegaBytes
CFP
— Computers, Freedom, and Privacy
VB
— Virtual Backup
CC
— Common Criteria
FDC
— Fault Design Criteria
MLE
— Multiple Line Encryption
R
— Reencoding
NTR
— No Trusting Required
RAB
— Remote Alarm Box
DRM
— Disaster Recovery Management
VDS
— Virus Distribution System
ICV
— Integrated Check Vector
DST
— Distributed Spam Trap
B
— Breach
HSP
— Hidden Service Protocol
PMS
— Possible Malicious Software
AV
— Access violation
VSM
— Viable Systems Method
OT
— Open Trapdoor
SAC
— Security Access Console
SGC
— Server-Gated Cryptography
RDC
— Random Data Compression
TLC
— Trust Level Control
ITP
— Information Technology Probers
CPS
— Current Protection Subdomain
SKL
— Site Key Library
E
— Encryption
CE
— Communication Encryption
STS
— Sound Telecommunication Security
CMS
— Certificate Management Services
KU
— Keyed Unique
SSP
— Simple Security Policy
NL
— New Lock
CP
— Compact Policy
SSS
— Simple System Security
U
— Userid
VS
— Very Secure
DP
— Diverse Protection
CDS
— Certified Digital Signing
NPP
— National Privacy Principles
TAS
— Toshiba Authentication Service
SK
— Spatial Key
SRM
— Security Relationship Management
UTC
— User Tracking Cookie
EUSM
— End-User Spam Management
CRR
— Cyber Resilience Review
OEC
— Offshore Engineered Component
MS
— Malicious System
PEF
— Plain English Firewall
ASA
— Automatic System Access
NCC
— No Cycle Checking
IE
— Intelligent Encryption
SP
— Secure Proxy
ISSIP
— Information System Security Implementation Process
SIM
— Secure Intelligent Menu system
SBI
— Slip Bluetooth Interface
RAM
— Remote Authorization Mechanism
MOD
— Methods Of Destruction
FSS
— File System Safe
SK
— Strengthened Key
SSF
— Security Strength Factor
IMP
— Identifying, Monitoring, and Protecting
SIC
— Secure Identification Chip
AVS
— Anti-Virus Station
SEP
— Slashdot Effect Protection
EPOC
— Enhanced Protection of Content
RCE
— Region Content Encryption
RTP
— Real-Time Protection
UMA
— Unlocking Mechanical Apparatus
LE
— Live Encoding
SMC
— Super Map Controller
CMK
— Complete Match Key
PAD
— Private Alias Directory
SD
— Self Delete
Show More Results
33