You are currently viewing CompTIA Security+: Acronyms Cheat Sheet
secPlus

CompTIA Security+: Acronyms Cheat Sheet

CompTIA Security+ logo

Useful Acronyms You Should Know

The world of cybersecurity and the CompTIA Security+ certification course is filled with a plethora of acronyms, each representing essential concepts, technologies, and standards. In this post, we present a comprehensive list of these acronyms to serve as a quick reference and guide for both newcomers and seasoned cybersecurity professionals.

AcronymDefinition
3DESTriple Data Encryption Standard
AAAAuthentication, Authorization, and Accounting
ABACAttribute-based Access Control
ACLAccess Control List
ADActive Directory
AESAdvanced Encryption Standard
AES256Advanced Encryption Standards 256bit
AHAuthentication Header
AIArtificial Intelligence
AISAutomated Indicator Sharing
ALEAnnualized Loss Expectancy
APAccess Point
APIApplication Programming Interface
APTAdvanced Persistent Threat
AROAnnualized Rate of Occurrence
ARPAddress Resolution Protocol
ASLRAddress Space Layout Randomization
ASPActive Server Pages
ATT&CKAdversarial Tactics, Techniques, and Common Knowledge
AUPAcceptable Use Policy
AVAntivirus
BASHBourne Again Shell
BCPBusiness Continuity Planning
BGPBorder Gateway Protocol
BIABusiness Impact Analysis
BIOSBasic Input/Output System
BPABusiness Partnership Agreement
BPDUBridge Protocol Data Unit
BSSIDBasic Service Set Identifier
BYODBring Your Own Device
CACertificate Authority
CAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart
CARCorrective Action Report
CASBCloud Access Security Broker
CBCCipher Block Chaining
CBTComputer-based Training
CCMPCounter-Mode/CBC-MAC Protocol
CCTVClosed-Circuit Television
CERTComputer Emergency Response Team
CFBCipher Feedback
CHAPChallenge-Handshake Authentication Protocol
CIOChief Information Officer
CIRTComputer Incident Response Team
CISCenter for Internet Security
CMSContent Management System
CNCommon Name
COOPContinuity of Operations Planning
COPECorporate-owned Personally Enabled
CPContingency Planning
CRCCyclic Redundancy Check
CRLCertificate Revocation List
CSACloud Security Alliance
CSIRTComputer Security Incident Response Team
CSOChief Security Officer
CSPCloud Service Provider
CSRCertificate Signing Request
CSRFCross-Site Request Forgery
CSUChannel Service Unit
CTMCounter-Mode
CTOChief Technology Officer
CVECommon Vulnerabilities and Exposures
CVSSCommon Vulnerability Scoring System
CYODChoose Your Own Device
DACDiscretionary Access Control
DBADatabase Administrator
DDoSDistributed Denial-of-Service
DEPData Execution Prevention
DERDistinguished Encoding Rules
DESData Encryption Standard
DHCPDynamic Host Configuration Protocol
DHEDiffie-Hellman Ephemeral
DKIMDomain Keys Identified Mail
DLLDynamic-link Library
DLPData Loss Prevention
DMARCDomain Message Authentication Reporting and Conformance
DNATDestination Network Address Transaction
DNSDomain Name System
DNSSECDomain Name System Security Extensions
DoSDenial-of-Service
DPOData Protection Officer
DRPDisaster Recovery Plan
DSADigital Signature Algorithm
DSLDigital Subscriber Line
EAPExtensible Authentication Protocol
ECBElectronic Code Book
ECCElliptic-curve Cryptography
ECDHEElliptic-curve Diffie-Hellman Ephemeral
ECDSAElliptic-curve Digital Signature Algorithm
EDREndpoint Detection and Response
EFSEncrypted File System
EIPExtended Instruction Pointer
EOLEnd of Life
EOSEnd of Service
ERPEnterprise Resource Planning
ESNElectronic Serial Number
ESPEncapsulating Security Payload
ESSIDExtended Service Set Identifier
FACLFile System Access Control List
FDEFull Disk Encryption
FIMFile Integrity Monitoring
FPGAField Programmable Gate Array
FTPFile Transfer Protocol
FTPSSecured File Transfer Protocol
GCMGalois/Counter Mode
GDPRGeneral Data Protection Regulation
GPGGNU Privacy Guard
GPOGroup Policy Object
GPSGlobal Positioning System
GPUGraphics Processing Unit
GREGeneric Routing Encapsulation
HAHigh Availability
HDDHard Disk Drive
HIDSHost-based Intrusion Detection System
HIPSHost-based Intrusion Prevention System
HMACHash-based Message Authentication Code
HOTPHMAC-based One-time Password
HSMHardware Security Module
HSMaaSHardware Security Module as a Service
HTMLHypertext Markup Language
HTTPHypertext Transfer Protocol
HTTPSHypertext Transfer Protocol Secure
HVACHeating, Ventilation, Air Conditioning
IaaSInfrastructure as a Service
IAMIdentity and Access Management
ICMPInternet Control Message Protocol
ICSIndustrial Control Systems
IDEAInternational Data Encryption Algorithm
IDFIntermediate Distribution Frame
IdPIdentity Provider
IDSIntrusion Detection System
IEEEInstitute of Electrical and Electronics Engineers
IKEInternet Key Exchange
IMInstant Messaging
IMAP4Internet Message Access Protocol v4
IoCIndicators of Compromise
IoTInternet of Things
IPInternet Protocol
IPSIntrusion Prevention System
IPSecInternet Protocol Security
IRIncident Response
IRCInternet Relay Chat
IRPIncident Response Plan
ISAInterconnection Security Agreement
ISFWInternal Segmentation Firewall
ISOInternational Organization for Standardization
ISPInternet Service Provider
ISSOInformation Systems Security Officer
ITCPIT Contingency Plan
IVInitialization Vector
KDCKey Distribution Center
KEKKey Encryption Key
L2TPLayer 2 Tunneling Protocol
LANLocal Area Network
LDAPLightweight Directory Access Protocol
LEAPLightweight Extensible Authentication Protocol
MaaSMonitoring as a Service
MACMedia Access Control
MAMMobile Application Management
MANMetropolitan Area Network
MBRMaster Boot Record
MD5Message Digest 5
MDFMain Distribution Frame
MDMMobile Device Management
MFAMultifactor Authentication
MFDMultifunction Device
MFPMultifunction Printer
MLMachine Learning
MMSMultimedia Message Service
MOAMemorandum of Agreement
MOUMemorandum of Understanding
MPLSMultiprotocol Label Switching
MSAMeasurement Systems Analysis
MS-CHAPMicrosoft Challenge-Handshake Authentication Protocol
MSPManaged Service Provider
MSSPManaged Security Service Provider
MTBFMean Time Between Failures
MTTFMean Time to Failure
MTTRMean Time to Repair
MTUMaximum Transmission Unit
NACNetwork Access Control
NASNetwork-attached Storage
NATNetwork Address Translation
NDANon-disclosure Agreement
NFCNear-field Communication
NFVNetwork Function Virtualization
NGFWNext-generation Firewall
NG-SWGNext-generation Secure Web Gateway
NICNetwork Interface Card
NIDSNetwork-based Intrusion Detection System
NIPSNetwork-based Intrusion Prevention System
NISTNational Institute of Standards & Technology
NOCNetwork Operations Center
NTFSNew Technology File System
NTLMNew Technology LAN Manager
NTPNetwork Time Protocol
OCSPOnline Certificate Status Protocol
OIDObject Identifier
OSOperating System
OSIOpen Systems Interconnection
OSINTOpen-source Intelligence
OSPFOpen Shortest Path First
OTOperational Technology
OTAOver-The-Air
OTGOn-The-Go
OVALOpen Vulnerability and Assessment Language
OWASPOpen Web Application Security Project
P12PKCS #12
P2PPeer-to-Peer
PaaSPlatform as a Service
PACProxy Auto Configuration
PAMPrivileged Access Management
PAMPluggable Authentication Modules
PAPPassword Authentication Protocol
PATPort Address Translation
PBKDF2Password-based Key Derivation Function 2
PBXPrivate Branch Exchange
PCAPPacket Capture
PCI DSSPayment Card Industry Data Security Standard
PDUPower Distribution Unit
PEPortable Executable
PEAPProtected Extensible Authentication Protocol
PEDPortable Electronic Device
PEMPrivacy Enhanced Mail
PFSPerfect Forward Secrecy
PGPPretty Good Privacy
PHIPersonal Health Information
PIIPersonally Identifiable Information
PINPersonal Identification Number
PIVPersonal Identity Verification
PKCSPublic Key Cryptography Standards
PKIPublic Key Infrastructure
PoCProof of Concept
POPPost Office Protocol
POTSPlain Old Telephone Service
PPPPoint-to-Point Protocol
PPTPPoint-to-Point Tunneling Protocol
PSKPreshared Key
PTZPan-Tilt-Zoom
PUPPotentially Unwanted Program
QAQuality Assurance
QoSQuality of Service
PUPPotentially Unwanted Program
RARegistration Authority
RADRapid Application Development
RADIUSRemote Authentication Dial-in User Service
RAIDRedundant Array of Inexpensive Disks
RAMRandom Access Memory
RASRemote Access Server
RATRemote Access Trojan
RC4Rivest Cipher version 4
RCSRich Communication Services
RFCRequest for Comments
RFIDRadio Frequency Identification
RIPEMDRACE Integrity Primitives Evaluation Message Digest
ROIReturn on Investment
RPORecovery Point Objective
RSARivest, Shamir, & Adleman
RTBHRemotely Triggered Black Hole
RTORecovery Time Objective
RTOSReal-time Operating System
RTPReal-time Transport Protocol
S/MIMESecure/Multipurpose Internet Mail Extensions
SaaSSoftware as a Service
SAESimultaneous Authentication of Equals
SAMLSecurity Assertions Markup Language
SCADASupervisory Control and Data Acquisition
SCAPSecurity Content Automation Protocol
SCEPSimple Certificate Enrollment Protocol
SDKSoftware Development Kit
SDLCSoftware Development Life Cycle
SDLMSoftware Development Life-cycle Methodology
SDNSoftware-defined Networking
SDPService Delivery Platform
SDVSoftware-defined Visibility
SEDSelf-Encrypting Drives
SEHStructured Exception Handling
SFTPSSH File Transfer Protocol
SHASecure Hashing Algorithm
SIEMSecurity Information and Event Management
SIMSubscriber Identity Module
SIPSession Initiation Protocol
SLAService-level Agreement
SLESingle Loss Expectancy
SMBServer Message Block
S/MIMESecure/Multipurpose Internet Mail Extensions
SMSShort Message Service
SMTPSimple Mail Transfer Protocol
SMTPSSimple Mail Transfer Protocol Secure
SNMPSimple Network Management Protocol
SOAPSimple Object Access Protocol
SOARSecurity Orchestration, Automation, Response
SoCSystem on Chip
SOCSecurity Operations Center
SPFSender Policy Framework
SPIMSpam over Instant Messaging
SQLStructured Query Language
SQLiSQL Injection
SRTPSecure Real-time Transport Protocol
SSDSolid State Drive
SSHSecure Shell
SSIDService Set Identifier
SSLSecure Sockets Layer
SSOSingle Sign-on
STIXStructured Threat Information eXpression
STPShielded Twisted Pair
SWGSecure Web Gateway
TACACS+Terminal Access Controller Access Control System
TAXIITrusted Automated eXchange of Intelligence Information
TCP/IPTransmission Control Protocol/Internet Protocol
TGTTicket Granting Ticket
TKIPTemporal Key Integrity Protocol
TLSTransport Layer Security
TOTPTime-based One Time Password
TPMTrusted Platform Module
TSIGTransaction Signature
TTPTactics, Techniques, and Procedures
UATUser Acceptance Testing
UDPUser Datagram Protocol
UEBAUser and Entity Behavior Analytics
UEFIUnified Extensible Firmware Interface
UEMUnified Endpoint Management
UPSUninterruptible Power Supply
URIUniform Resource Identifier
URLUniversal Resource Locator
USBUniversal Serial Bus
USB OTGUSB On-The-Go
UTMUnified Threat Management
UTPUnshielded Twisted Pair
VBAVisual Basic for Applications
VDEVirtual Desktop Environment
VDIVirtual Desktop Infrastructure
VLANVirtual Local Area Network
VLSMVariable-length Subnet Masking
VMVirtual Machine
VoIPVoice over IP
VPCVirtual Private Cloud
VPNVirtual Private Network
VTCVideo Teleconferencing
WAFWeb Application Firewall
WAPWireless Access Point
WEPWired Equivalent Privacy
WIDSWireless Intrusion Detection System
WIPSWireless Intrusion Prevention System
WORMWrite Once Read Many
WPAWiFi Protected Access
WPSWiFi Protected Setup
XaaSAnything as a Service
XMLExtensible Markup Language
XORExclusive OR
XSRFCross-site Request Forgery
XSSCross-site Scripting

This list is pretty exhaustive and serves as a valuable starting point for anyone navigating the complex world of cybersecurity and the CompTIA Security+ certification.

  • Bookmark this resource for quick reference as you continue your journey in this ever-evolving field.

You can find all of our CompTIA Sec+ guides here: CompTIA Sec+

We also have guides for the CompTIA A+ here: CompTIA A+

Recommendation:

Basic Security Testing with Kali Linux: https://amzn.to/3S0t7Vq

Luke Barber

Hey there! I’m Luke, a tech enthusiast simplifying Arduino, Python, Linux, and Ethical Hacking for beginners. With creds like CompTIA A+, Sec+, and CEH, I’m here to share my coding and tinkering adventures. Join me on Meganano for easy guides and a fun dive into tech, no genius required!
0 0 votes
Article Rating
Subscribe
Notify of
guest

0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments