Front | Back |
DMZ | Demilitarized Zone |
MAC | Mandatory Access Control |
WPA | Wi-Fi Protected Access |
AUP | Acceptable Use Policy |
DOS | Denial Of Service |
LAN | Local Area Network |
HIDS | Host Based Intrusion Detection System |
PAT | Port Address Translation (Aka NAT Overload) |
NIPS | Network Based Intrusion Prevention System |
IPSEC | Internet Protocol Security |
SHA | Secured Hash Algorithm |
WLAN | Wireless Local Area Network |
MD5 | Message Digest 5 |
WAN | Wide Area Network |
NIDS | Network Based Intrusion Detection System |
L2TP | Layer 2 Tunneling Protocol |
NAC | Network Access Control |
DAC | Discretionary Access Control |
WAP | Wireless Access Point |
ICMP | Internet Control Message Protocol |
VLAN | Virtual Local Area Network |
PII | Personally Identifiable Information |
LANMAN | Local Area Network Manager |
NAT | Network Address Translation |
AES | Advanced Encryption Standard |
DES | Digital Encryption Standard |
ACL | Access Control List |
RBAC | Role/Rule Based Access Control |
DDOS | Distributed Denial of Service |
TPM | Trusted Platform Module |
EAP | Extensible Authentication Protocol |
HVAC | Heating, Ventilation Air Conditioning |
PGP | Pretty Good Privacy |
ARP | Address Resolution Protocol |
MAC (Address) | Media Access Control |
HIPS | Host Based Intrusion Prevention System |
WEP | Wired Equivalent Privacy |
ALE | Annualized Loss Expectancy |
CA | Certificate Authority |
PKI | Public Key Infrastructure |