Front | Back |
L2TP | Layer 2 Tunneling Protocol |
HIDS | Host Based Intrusion Detection System |
HIPS | Host Based Intrusion Prevention System |
AUP | Acceptable Use Policy |
NIPS | Network Based Intrusion Prevention System |
CA | Certificate Authority |
HVAC | Heating, Ventilation Air Conditioning |
LANMAN | Local Area Network Manager |
DMZ | Demilitarized Zone |
MD5 | Message Digest 5 |
VLAN | Virtual Local Area Network |
ARP | Address Resolution Protocol |
TPM | Trusted Platform Module |
ACL | Access Control List |
ICMP | Internet Control Message Protocol |
WPA | Wi-Fi Protected Access |
MAC (Address) | Media Access Control |
AES | Advanced Encryption Standard |
PAT | Port Address Translation (Aka NAT Overload) |
WEP | Wired Equivalent Privacy |
RBAC | Role/Rule Based Access Control |
ALE | Annualized Loss Expectancy |
DOS | Denial Of Service |
MAC | Mandatory Access Control |
NIDS | Network Based Intrusion Detection System |
NAT | Network Address Translation |
IPSEC | Internet Protocol Security |
WAN | Wide Area Network |
DAC | Discretionary Access Control |
DDOS | Distributed Denial of Service |
LAN | Local Area Network |
WAP | Wireless Access Point |
PKI | Public Key Infrastructure |
PGP | Pretty Good Privacy |
DES | Digital Encryption Standard |
NAC | Network Access Control |
SHA | Secured Hash Algorithm |
WLAN | Wireless Local Area Network |
EAP | Extensible Authentication Protocol |
PII | Personally Identifiable Information |