Front | Back |
NIDS | Network Based Intrusion Detection System |
ICMP | Internet Control Message Protocol |
MAC | Mandatory Access Control |
DAC | Discretionary Access Control |
LAN | Local Area Network |
NIPS | Network Based Intrusion Prevention System |
VLAN | Virtual Local Area Network |
EAP | Extensible Authentication Protocol |
WAN | Wide Area Network |
WPA | Wi-Fi Protected Access |
WAP | Wireless Access Point |
HVAC | Heating, Ventilation Air Conditioning |
SHA | Secured Hash Algorithm |
NAT | Network Address Translation |
DES | Digital Encryption Standard |
NAC | Network Access Control |
WEP | Wired Equivalent Privacy |
HIDS | Host Based Intrusion Detection System |
LANMAN | Local Area Network Manager |
TPM | Trusted Platform Module |
WLAN | Wireless Local Area Network |
DMZ | Demilitarized Zone |
PAT | Port Address Translation (Aka NAT Overload) |
MD5 | Message Digest 5 |
HIPS | Host Based Intrusion Prevention System |
L2TP | Layer 2 Tunneling Protocol |
PII | Personally Identifiable Information |
IPSEC | Internet Protocol Security |
DDOS | Distributed Denial of Service |
CA | Certificate Authority |
PKI | Public Key Infrastructure |
ARP | Address Resolution Protocol |
DOS | Denial Of Service |
AES | Advanced Encryption Standard |
PGP | Pretty Good Privacy |
MAC (Address) | Media Access Control |
ALE | Annualized Loss Expectancy |
AUP | Acceptable Use Policy |
ACL | Access Control List |
RBAC | Role/Rule Based Access Control |