Zarówno w IT jak i w cyberbezpieczeństwie używamy bardzo wiele skrótów, których rozwinięcie i znaczenie nieraz wymaga dalszych poszukiwań. Z tego właśnie powodu, aby zebrać większość skrótów wraz ich rozwinięciami w jednym miejscu, powstał zbiór skrótów Cyber Security.
Znajdziesz tu także inne skróty, odnoszące się do technologii IT, które często możesz spotkać pracując w security.
Dodatkowo klikając na skrót lub jego rozwinięcie, będziesz mogła/mógł zapoznać się z jego pełną definicją.
3
3DES ➞ Triple DES
3LC ➞ Third Level Code
A
AA ➞ Attribute Authority
AARL ➞ Attribute Authority Revocation List
AC ➞ Access Control
ACC ➞ Access Control Center
ACI ➞ Access Control Information
ACL ➞ Access Control List
ACRL ➞ Attribute Certificate Revocation List
ACTR ➞ Average Call Traffic Rate
ADF ➞ Access Control Decision Function
ADI ➞ Access Control Decision Information
AEF ➞ Access Control EnForcement Function
AES ➞ Advanced Encryption Standard
AGW ➞ Access Gateway
AH ➞ Authentication Header
AI ➞ Authentication Information
AIDC ➞ Automatic Identification And Data Capture
AIS ➞ Automatic Identification System
ALE ➞ Annual Loss Expectancy
ALG ➞ Application Level Gateway
AP ➞ Access Point
APOP ➞ Authenticated Post Office Protocol
App ➞ Application
ARF ➞ Assessment Results Format
ASCII ➞ American Standard Code for Information Interchange
ASF ➞ Anti-Spam Function
ASN.1 ➞ Abstract Syntax Notation One
AU ➞ Authentication
AuF ➞ Authentication Function
AUP ➞ Acceptable Use Policy
AV ➞ Antivirus (-Al) Software
B
BBN ➞ BBN Technologies Corp.
BC ➞ Biometric Certificate
BCA ➞ Biometric Certificate Authority
BCA ➞ Brand Certification Authority
BCI ➞ Brand CRL Identifier
BCP ➞ Business Continuity Plan
BCRL ➞ Biometric Certificate Revocation List
BDC ➞ Biometric Device Certificate
BE ➞ Border Element
BER ➞ Basic Encoding Rules
BIA ➞ Business Continuity Planning
BIN ➞ Bank Identification Number
BO ➞ Buffer Overflow
BPC ➞ Biometric Policy Certificate
BR ➞ Border Router
BS7799 ➞ British Standard 7799
BSI ➞ Boot Sector Infector
BSV ➞ Boot Sector Virus
C
CA ➞ Certification Authority
CAM ➞ Certificate Arbitrator Module
CAPEC ➞ Common Attack Pattern Enumeration And Classification
CARL ➞ Certification Authority Revocation List
CASF ➞ Core Asf
CAST ➞ Carlisle Adams (C.A.) Stafford Tavares (S.T.)
CBC ➞ Cipher Block Chaining
CBC (Mode) ➞ Cipher Block Chaining Mode
CBR ➞ Call Blocking Rate
CC ➞ Common Criteria
CCA ➞ Cardholder Certification Authority
CCE ➞ Common Configuration Enumeration
CCEP ➞ Commercial COMSEC Evaluation Program
CCI ➞ Controlled Cryptographic Item
CEE ➞ Common Event Expression
CER ➞ Crossover Error Rate
CERT ➞ Computer Emergency Response Team
CFB ➞ Cipher Feedback
CHAP ➞ Challenge Handshake Authentication Protocol
CIAC ➞ Computer Incident Advisory Capability
CIK ➞ Cryptographic Ignition Key
CIM ➞ Cryptographic Information Management
CKL ➞ Compromised Key List
CLEF ➞ Commercially Licensed Evaluation Facility
CMAC ➞ Cipher-Based Message Authentication Code
CMM ➞ Capability Maturity Model
CMOS ➞ Complementary Metal-Oxide-Semiconductor
CMS ➞ Cryptographic Message Syntax
CNSS ➞ Committee on National Security Systems
COBIT ➞ Control Objectives for Information and Related Technology
COI ➞ Community Of Interest
COMPUSEC ➞ Computer Security
COMSEC ➞ Communications Security
CRC ➞ Cyclic Redundancy Check
CRL ➞ Certificate Revocation List
CRL ➞ X.509 Certificate Revocation List
CRM ➞ Customer Relationship Management System
CRS ➞ Correlative Reacting System
CRSAP ➞ Correlative Reacting System Application Protocol
CSP ➞ Credential Service Provider
CSTVRP ➞ Computer Security Technical Vulnerability Reporting Program
CTR ➞ Counter Mode
CVE ➞ Common Vulnerabilities And Exposures
CVSS ➞ Common Vulnerability Scoring System
CW ➞ Control Word
CWE ➞ Common Weakness Enumeration
CWSS ➞ Common Weakness Scoring System
D
DAA ➞ Designated Approving Authority
DAC ➞ Discretionary Access Control
DBMS ➞ Database Management System
dCRL ➞ Delta-CRL
DDoS ➞ Distributed Denial of Service
DEA ➞ Data Encryption Algorithm
DEK ➞ Data Encryption Key
DER ➞ Distinguished Encoding Rules
DES ➞ Data Encryption Standard
DH ➞ Diffie-Hellman algorithm
DII ➞ Defense Information Infrastructure
DKIM ➞ Domain Keys Identified Mail
DMZ ➞ Demilitarized Zone
DN ➞ Distinguished Name
DNS ➞ Domain Name System
DoS ➞ Denial Of Service
DP ➞ Detecting Point
DPI ➞ Deep Packet Inspection
DPI-FE ➞ DPI Functional Entity
DPI-PE ➞ DPI Physical Entity
DRP ➞ Disaster Recovery Plan
DSA ➞ Digital Signature Algorithm
DSB ➞ Dedicated Security Device
DSS ➞ Digital Signature Standard
DWIM ➞ Do What I Mean
E
EAA ➞ Entity Authentication Assurance
EAC ➞ Entity Authentication Centre
EAL ➞ Evaluation Assurance Level
EAP ➞ Extensible Authentication Protocol
EARL ➞ End-Entity Attribute Certificate Revocation List
ECB ➞ Electronic Codebook
ECC ➞ Elliptic Curve Cryptography
EC-GDSA ➞ Elliptic Curve Digital Signature
ECU ➞ End Cryptographic Unit
EDI ➞ Electronic Data Interchange
EICAR ➞ European Institute for Computer Antivirus Research
EICAR ➞ EICAR Standard Antivirus Test File
EMSEC ➞ Electromagnetic Emanations Security
EMSEC ➞ Emanations Security
EMV ➞ Europay MasterCard Visa
EPL ➞ Evaluated Products List
EPRL ➞ End-Entity Public-Key Certificate Revocation List
ESP ➞ Encapsulating Security Payload
EUD ➞ End User Device
EVCERT ➞ Extended Validation Certificate Framework
F
FAR ➞ False Acceptance Rate
FAT ➞ File Allocation Table
FEAL ➞ Fast Data Encipherment Algorithm
FIPS ➞ Federal Information Processing Standards
FIPS 140 ➞ FIPS PUB 140
FIRST ➞ Forum of Incident Response and Security Teams
FOUO ➞ For Official Use Only
FPKI ➞ Federal Public-key Infrastructure
FRR ➞ False Rejection Rate
FTLS ➞ Formal Top-Level Specification
FTP ➞ File Transfer Protocol
G
GDOI ➞ Group Domain of Interpretation
GULS ➞ Generic Upper Layer Security
H
HIPAA ➞ Health Information Portability And Accountability
HMAC ➞ Hashed Message Authentication Code
HTML ➞ Hypertext Markup Language
HTTP ➞ Hypertext Transfer Protocol
HTTPS ➞ Hypertext Transfer Protocol Secure
I
IaaS ➞ Infrastructure As A Service
IANA ➞ Internet Assigned Numbers Authority
IAP ➞ Intercept Access Point
ICANN ➞ Internet Corporation for Assigned Names and Numbers
ICMP ➞ Internet Control Message Protocol
iCRL ➞ Indirect CRL
IDEA ➞ International Data Encryption Algorithm
IdP ➞ Identity Provider
IDS ➞ Intrusion Detection System
IdSP ➞ Identity Service Provider
IEEE ➞ Institute of Electrical and Electronics Engineers, Inc.
IEEE 802.10 ➞ IEEE 802.10 Committee
IEEE P1363 ➞ IEEE P1363 Standard
IETF ➞ Internet Engineering Task Force
IKE ➞ Internet Key Exchange
IM ➞ Instant Messaging
IMAP4 ➞ Internet Message Access Protocol Version 4
IMEI ➞ International Mobile Station Equipment Identity
IMUN ➞ International Mobile User Number
INFOCON ➞ Information Operations Condition
INFOSEC ➞ Information Security
IODEF ➞ Incident Object Description Exchange Format
IOTP ➞ Internet Open Trading Protocol
IP ➞ Intellectual Property
IP ➞ Intelligent Peripheral
IP ➞ Internet Protocol
IPRA ➞ Internet Policy Registration Authority
Ipsec ➞ Internet Protocol Security
IRAS ➞ Risk Analysis Service
IS ➞ Information System
ISAKMP ➞ Internet Security Association and Key Management Protocol
ISBN ➞ ISO 2108 International Standard Book Number
ISC2 ➞ The International Information System Security Certification Consortium
ISIRT ➞ Information Security Incident Response Team
ISMS ➞ Information Security Management System
ISO ➞ International Organization for Standardization
ISO 17799 ➞ ISO 17799 Standard
ISSA ➞ Information Systems Security Association
ISSN ➞ ISO 3297 International Standard Serial Number
ISSO ➞ Information System Security Officer
ITAR ➞ International Traffic in Arms Regulations
ITIL ➞ Information Technology Infrastructure Library
ItW ➞ Wild In The
IV ➞ Initialization Value
K
KDC ➞ Key Distribution Center
KEA ➞ Key Exchange Algorithm
KEK ➞ Key-Encrypting Key
KISS ➞ Keep It Simple, Stupid
KLIF ➞ Key Loading and Initialization Facility
KMID ➞ Keying Material Identifier
KMP ➞ Key Management Protocol
L
L2F ➞ Layer 2 Forwarding Protocol
L2TP ➞ Layer 2 Tunnelling Protocol
L3,4HI ➞ L3,4 Header Inspection
L4+HI ➞ L4+ Header Inspection
L4PI ➞ L4 Payload Inspection
L7PI ➞ L7 Payload Inspection
LDAP ➞ Lightweight Directory Access Protocol
LEAF ➞ Law Enforcement Access Field
LOTOS ➞ Language of Temporal Ordering Specification
M
MAC ➞ Mandatory Access Control
MAC ➞ Media Access Control
MAC ➞ Message Authentication Code
MAEC ➞ Malware Attribution Enumeration And Characterization Format
MAN ➞ Metropolitan Area Network
MBR ➞ Master Boot Record
MCA ➞ Merchant Certification Authority
MD2 ➞ The MD2 Message-Digest Algorithm
MD4 ➞ The MD4 Message-Digest Algorithm
MD5 ➞ The MD5 Message-Digest Algorithm
MF ➞ Master File
MHS ➞ Message Handling System
MIME ➞ Multipurpose Internet Mail Extensions
MISPC ➞ Minimum Interoperability Specification for PKI Components
MISSI ➞ Multilevel Information System Security Initiative
MitM ➞ Man-In-The-Middle
MitM ➞ Man-In-The-Middle Attack (On Otp)
MLS ➞ Multilevel Secure
MOSS ➞ MIME Object Security Services
MQV ➞ AJ Menezes, M. Qu, SA Vanstone
MSK ➞ Master Session Key
MSP ➞ Message Security Protocol
MtE ➞ MtE Engine
MTX ➞ MTX Virus
N
NaaS ➞ Network As A Service
NAC ➞ Network Access Controller
NAPT ➞ Network Address Port Translation
NAT ➞ Network Address Translator
NCSC ➞ National Computer Security Center
NFC ➞ Near Field Communication
NGN ➞ Next Generation Network
NIAP ➞ National Information Assurance Partnership
NIPRNET ➞ The Non-Classified Internet Protocol (IP) Router Network
NIST ➞ National Institute of Standards and Technology
NLSP ➞ Network Layer Security Protocol
No-Op ➞ No Operation
NOP ➞ No Operation
NRIC ➞ National Reliability and Interoperability Council
NRT ➞ Non-Repudiation Token
NSA ➞ National Security Agency
nVir ➞ nVir Virus
O
OCSP ➞ Online Certificate Status Protocol
OFB ➞ Output Feedback
OID ➞ Object Identifier
OIDIRI ➞ OID-Internationalized Resource Identifier
OOB ➞ Out Of Band
OPSEC ➞ Operations Security
ORA ➞ Organizational Registration Authority
OSI ➞ Open Systems Interconnect
OSI ➞ Open Systems Interconnection
OSP ➞ OTP Service Provider
OSS/BSS ➞ Operation Support System/Business Support System
OTAR ➞ Over-The-Air Rekeying
OTP ➞ One Time Password
OTP ➞ One-Time Pad
OVAL ➞ Open Vulnerability And Assessment Language
P
P2P ➞ Peer-To-Peer
PAA ➞ Policy Approving Authority
PAAS ➞ Platform As A Service
PAN ➞ Primary Account Number
PAP ➞ Password Authentication Protocol
PAP ➞ Policy Administration Point
PCA ➞ Policy Certification Authority
PCA ➞ Policy Creation Authority
PDE ➞ Position Determining Entity
PDF ➞ Policy Decision Function
PDN ➞ Packet Data Network
PDP ➞ Packet Data Protocol
PDP ➞ Policy Decision Point
PDS ➞ Protective Distribution System
PDU ➞ Protocol Error
PDU ➞ Protocol-Data-Unit
PEM ➞ Privacy Enhanced Mail
PEP ➞ Policy Enforcement Point
PFS ➞ Perfect Forward Secrecy
PFS ➞ Public-Key Forward Secrecy
PGP ➞ Pretty Good Privacy
PII ➞ Personally Identifiable Information
PIN ➞ Personal Identification Number
PIP ➞ Policy Information Point
PKCS ➞ Public-Key Cryptography Standards
PKCS #10 ➞ Public Key Cryptography Standards #10
PKCS #11 ➞ Public Key Cryptography Standards #11
PKCS #5 ➞ Public Key Cryptography Standards #5
PKCS #7 ➞ Public Key Cryptography Standards #7
PKD ➞ Public Key Directory
PKI ➞ Public Key Infrastructure
PLI ➞ Private Line Interface
PLMN ➞ Public Land Mobile Network
PLMN operator ➞ Public Land Mobile Network Operator
PMA ➞ Policy Management Authority
PMK ➞ Pairwise Master Key
POP3 ➞ Post Office Protocol, Version 3
POSI ➞ Portable Operating System Interface
PPL ➞ Preferred Products List
PPP ➞ Point-To-Point Protocol
PPS ➞ Permission
PPTP ➞ Point-To-Point Tunneling Protocol
PPV ➞ Pay-Per-View
PSE ➞ Personal Security Environment
PSK ➞ Pre-Shared Key
PSTN ➞ Public Switched Telephone Network
PTK ➞ Pair-Wise Transient Key
R
RA ➞ Registration Authority
RADIUS ➞ Remote Authentication Dial-In User Service
RAF ➞ Risk Analysis Function
RAFE ➞ Risk Analysis Functional Entity
RASF ➞ Recipient-Side ASF
RAT ➞ Remote Access Trojan
RBAC ➞ Role Based Access Control
RBL ➞ Real-Time Blocking List
RC2 ➞ Rivest Cipher #2
RC4 ➞ Rivest Cipher #4
RC6 ➞ Rivest Cipher #6
RCFE ➞ Risk Classification Functional Entity
RDFE ➞ Risk Detection Functional Entity
RDN ➞ Relative Distinguished Name
ReSA ➞ Receiver Security Agent
RFC ➞ Request For Comment
RID ➞ Real-Time Inter-Network Defense
RKS ➞ Record Keeping Server
RMFE ➞ Risk Mitigation Functional Entity
RoE ➞ Risk Of Exposure
ROM ➞ Read-Only Memory
ROT13 ➞ Rotate 13
RP ➞ Relying Party
RPC ➞ Remote Procedure Call
RSA ➞ Rivest-Shamir-Adleman
RSF ➞ Risk Search Function
RSP ➞ Risk Service Profile
S
S/KEY ➞ System S/KEY
S/MIME ➞ Secure/MIME
SA ➞ Security Association
SAA ➞ Security Association Attributes
SaaS ➞ Software As A Service
SAD ➞ Security Association Database
SAID ➞ Security Association Identifier
SAML ➞ Security Assertion Markup Language
SANSW ➞ Secure Answering
SAP ➞ Service Access Point
SAP ➞ Special Access Program
SApp ➞ Security Application
SAS ➞ Security Application Software
SASF ➞ Sender-Side ASF
SASL ➞ Simple Authentication And Security Layer
SASUS ➞ Security Application Software Updating Server
S-BGP ➞ Secure BGP
SCA ➞ Security Correlation Agent
SCA ➞ Subordinate CA
SCF ➞ Security Communication Function
SCI ➞ Security Control Information
SCI ➞ Security Correlation Information
SCIF ➞ Sensitive Compartmented Information Facility
SCOMP ➞ Secure Communications Processor
SCS ➞ Security Correlation Server
SDE ➞ Secure Data Exchange
SDNS ➞ Secure Data Network System
SDSE ➞ Shadowed DSA Specific Entry
SDU ➞ Service Data Unit
SE ➞ Social Engineering
SEI ➞ Security Exchange Item
SENV ➞ Secure Envelope
SESE ➞ Security Exchange Service Element
SET ➞ SET Secure Electronic Transaction
SETCo ➞ SET Secure Electronic Transaction LLC
SHA1 ➞ Secure Hash Algorithm – Revision 1
SHS ➞ Secure Hash Standard
S-HTTP ➞ Secure Hypertext Transfer Protocol
SI ➞ Security Information
SILS ➞ Standards For Interoperable LAN/MAN Security
SIO ➞ Security Information Object
SIP ➞ Session Initiation Protocol
SKEME ➞ Secure Key Exchange Mechanism for Internet
SKIP ➞ Simple Key Management For Internet Protocols
SLA ➞ Service Level Agreement
SMF ➞ Service Management Function
SMI ➞ Security Management Infrastructure
SMS ➞ Security Management System
SMS ➞ Short Message Service
SMSC ➞ Short Message Service Centre
SMTP ➞ Simple Mail Transfer Protocol
SNMP ➞ Simple Network Management Protocol
SOA ➞ Source Of Authority
SOAP ➞ Simple Object Access Protocol/Service Oriented Architecture Protocol
SOP ➞ Self-Organizing Protocol
SORA ➞ SSO-PIN ORA
SP ➞ Service Provider
SP3 ➞ Security Protocol 3
SP4 ➞ Security Protocol 4
SPD ➞ Security Policy Database
SPI ➞ Security Parameters Index
SPIM ➞ Spam Over Instant Messaging
SPIT ➞ Spam Over Internet Telephony
SPKI ➞ Simple Public Key Infrastructure
SRF ➞ Spam Recipient Function
SSA ➞ Security Information Sharing Agreement
SSA ➞ Sender Security Agent
SSC ➞ Subscriber Security Control
SSH ➞ Secure Shell
SSID ➞ Service Set Identifier
SSL ➞ Secure Sockets Layer
SSO ➞ Single Sign-On
SSO ➞ System Security Object
SSO PIN ➞ Single Sign On Password Identification Number
SSP ➞ Security Information Sharing Policy
T
TACACS ➞ Terminal Access Controller Access Control System
TACACS+ ➞ Terminal Access Controller Access-Control System Plus
TAI ➞ Telebiometrics Authentication Infrastructure
TAUT ➞ Terminal Authentication
TBA ➞ Telebiometric Authority
TCB ➞ Trusted Computing Base
TCC Field ➞ Transmission Control Code Field
TCG ➞ Trusted Computing Group
TCP ➞ Transmission Control Protocol
TCP/IP ➞ Transmission Control Protocol/Internet Protocol
TCSEC ➞ DoD Trusted Computer System Evaluation Criteria
TCSEC ➞ Trusted Computer System Evaluation Criteria
TCT ➞ Total Call Time
TD ➞ Terminal Device
TDEA ➞ Triple Data Encryption Algorithm
TESS ➞ The Exponential Encryption System
TFC ➞ Traffic-Flow Confidentiality
TFCI ➞ Transport Format Combination Indicator
TGS ➞ Ticket Granting Server
TOC/TOU ➞ Time-Of-Check To Time-Of-Use
TK ➞ Temporal Key
TKEY ➞ Transaction Key
TLP ➞ Traffic Light Protocol
TLS ➞ Transport Layer Security
TOAST ➞ The Only Antivirus Software That Won’t Be Obsolete By The Time You Finish Reading This Ad
TOE ➞ Target Of Evaluation
TPE ➞ Trident Polymorphic Engine
TPM ➞ Trusted Platform Module
TPM ➞ Trusted Platforms
TRANSEC ➞ Transmission Security
TSA ➞ Time Stamping Authority
TSEC ➞ Telecommunications Security Word System
TSIG ➞ Trusted Systems Interoperability Group
TTP ➞ Trusted Third Party
TTP ➞ Trusted Third Party For Confidentiality Facilities
U
UDP ➞ User Datagram Protocol
UICC ➞ Universal IC Card
UID ➞ User ID
UID ➞ User Identity
UNI ➞ User-To-Network Interface
URI ➞ Uniform Resource Identifier
URL ➞ Uniform Resource Locator
URN ➞ Uniform Resource Name
URS ➞ User Reputation System
UTC ➞ Coordinated Universal Time
UTC ➞ UTCTime
V
VAN ➞ Value-Added Network
VoD ➞ Video On Demand
VPN ➞ Virtual Private Network
VSPPS ➞ VoIP Spam Prevention Policy Server
VSPRBL ➞ RBL Central System For Voip Spam Prevention
VSPS ➞ VoIP Spam Prevention System
VX ➞ Virus eXchange
W
W3 ➞ WWW ➞ World Wide Web
W3C ➞ World Wide Web Consortium
WEP ➞ Wired Equivalent Privacy
WLAN UE ➞ WLAN User Equipment
WNE ➞ Wireless Network Entity
WSDL ➞ Web Services Description Language
WSH ➞ Windows Script Host
WSN ➞ Wireless Sensor Network
X
X,509 ➞ X.509
X.500 ➞ X.500 System
XAPI ➞ eXtensive Application Programming Interface
XCCDF ➞ eXtensible Configuration Checklist Description Format
xDSL ➞ Digital Subscriber Line Technologies
XML ➞ Extensible Markup Language
XOR ➞ Exclusive OR