Front | Back |
IPSEC | Internet Protocol Security |
CA | Certificate Authority |
MAC | Mandatory Access Control |
LAN | Local Area Network |
HIDS | Host Based Intrusion Detection System |
HIPS | Host Based Intrusion Prevention System |
NAC | Network Access Control |
PII | Personally Identifiable Information |
EAP | Extensible Authentication Protocol |
PGP | Pretty Good Privacy |
NIDS | Network Based Intrusion Detection System |
TPM | Trusted Platform Module |
HVAC | Heating, Ventilation Air Conditioning |
AUP | Acceptable Use Policy |
ALE | Annualized Loss Expectancy |
WLAN | Wireless Local Area Network |
PAT | Port Address Translation (Aka NAT Overload) |
ICMP | Internet Control Message Protocol |
WAN | Wide Area Network |
ACL | Access Control List |
DDOS | Distributed Denial of Service |
VLAN | Virtual Local Area Network |
WEP | Wired Equivalent Privacy |
NAT | Network Address Translation |
MD5 | Message Digest 5 |
MAC (Address) | Media Access Control |
WPA | Wi-Fi Protected Access |
PKI | Public Key Infrastructure |
ARP | Address Resolution Protocol |
RBAC | Role/Rule Based Access Control |
NIPS | Network Based Intrusion Prevention System |
DAC | Discretionary Access Control |
L2TP | Layer 2 Tunneling Protocol |
SHA | Secured Hash Algorithm |
AES | Advanced Encryption Standard |
WAP | Wireless Access Point |
DOS | Denial Of Service |
DMZ | Demilitarized Zone |
LANMAN | Local Area Network Manager |
DES | Digital Encryption Standard |