CompTIA Security+: Security Acronym List


3DESTriple Digital Encryption Standard
AAAAuthentication, Authorization, and Accounting
ABACAttribute-based Access Control
ACLAccess Control List
AESAdvanced Encryption Standard
AES256Advanced Encryption Standards 256bit
AHAuthentication Header
AIArtificial Intelligence
AISAutomated Indicator Sharing
ALEAnnualized Loss Expectancy
APAccess Point
APIApplication Programming Interface
APTAdvanced Persistent Threat
AROAnnualized Rate of Occurrence
ARPAddress Resolution Protocol
ASLRAddress Space Layout Randomization
ASPActive Server Page
ATT&CKAdversarial Tactics, Techniques, and Common Knowledge
AUPAcceptable Use Policy


Bourne Again Shell
BCPBusiness Continuity Planning
BGPBorder Gateway Protocol
BIABusiness Impact Analysis
BIOSBasic Input/Output System
BPABusiness Partnership Agreement
BPDUBridge Protocol Data Unit
BYODBring Your Own Device


Certificate Authority
CACCommon Access Card
CAPTCHACompletely Automated Public Turing Test to
CARCorrective Action Report
CASBCloud Access Security Broker
CBCCipher Block Chaining
CBTComputer-based Training
CCMPCounter-Mode/CBC-Mac Protocol
CCTVClosed-Circuit Television
CERTComputer Emergency Response Team
CFBCipher Feedback
CHAPChallenge Handshake Authentication Protocol
CIOChief Information Officer
CIRTComputer Incident Response Team
CISCenter for Internet Security
CMSContent Management System
COOPContinuity of Operation Planning
COPECorporate Owned Personal Enabled
CPContingency Planning
CRCCyclical Redundancy Check
CRLCertificate Revocation List
CSOChief Security Officer
CSPCloud Service Provider
CSRCertificate Signing Request
CSRFCross-Site Request Forgery
CSUChannel Service Unit
CTOChief Technology Officer
CVECommon Vulnerabilities and Exposures
CVSSCommon Vulnerability Scoring System
CYODChoose Your Own Device


Discretionary Access Control
DBADatabase Administrator
DDoSDistributed Denial of Service
DEPData Execution Prevention
DERDistinguished Encoding Rules
DESDigital Encryption Standard
DHCPDynamic Host Configuration Protocol
DHEDiffie-Hellman Ephemeral
DKIMDomain Keys Identified Mail
DLLDynamic Link Library
DLPData Loss Prevention
DMARCDomain Message Authentication Reporting and Conformance
DMZDemilitarized Zone
DNATDestination Network Address Transaction
DNSDomain Name Service (Server)
DNSSECDomain Name System Security Extensions
DoSDenial of Service
DPOData Privacy Officer
DRPDisaster Recovery Plan
DSADigital Signature Algorithm
DSLDigital Subscriber Line


Extensible Authentication Protocol
ECBElectronic Code Book
ECCElliptic Curve Cryptography
ECDHEElliptic Curve Diffie-Hellman Ephemeral
ECDSAElliptic Curve Digital Signature Algorithm
EDREndpoint Detection and Response
EFSEncrypted File System
EOLEnd of Life
EOSEnd of Service
ERPEnterprise Resource Planning
ESNElectronic Serial Number
ESPEncapsulated Security Payload


File System Access Control List
FDEFull Disk Encryption
FPGAField Programmable Gate Array
FQDNFully Qualified Domain Name
FRRFALSE Rejection Rate
FTPFile Transfer Protocol
FTPSSecured File Transfer Protocol


Galois Counter Mode
GDPRGeneral Data Protection Regulation
GPGGnu Privacy Guard
GPOGroup Policy Object
GPSGlobal Positioning System
GPUGraphics Processing Unit
GREGeneric Routing Encapsulation


High Availability
HDDHard Disk Drive
HIDSHost-Based Intrusion Detection System
HIPSHost-Based Intrusion Prevention System
HMACHashed Message Authentication Code
HOTPHMAC based One Time Password
HSMHardware Security Module
HTMLHyperText Markup Language
HTTPHypertext Transfer Protocol
HTTPSHypertext Transfer Protocol over SSL/TLS
HVACHeating, Ventilation, Air Conditioning


Infrastructure as a Service
ICMPInternet Control Message Protocol
ICSIndustrial Control Systems
IDEAInternational Data Encryption Algorithm
IDFIntermediate Distribution Frame
IdPIdentity Provider
IDSIntrusion Detection System
IEEEInstitute of Electrical and Electronics Engineers
IKEInternet Key Exchange
IMInstant Messaging
IMAP4Internet Message Access Protocol v4
IoCIndicators of Compromise
IoTInternet of Things
IPInternet Protocol
IPSecInternet Protocol Security
IRIncident Response
IRCInternet Relay Chat
IRPIncident Response Plan
ISOInternational Organization for Standardization
ISPInternet Service Provider
ISSOInformation Systems Security Officer
ITCPIT Contingency Plan
IVInitialization Vector


Key Distribution Center
KEKKey Encryption Key


Layer 2 Tunneling Protocol
LANLocal Area Network
LDAPLightweight Directory Access Protocol
LEAPLightweight Extensible Authentication Protocol


Monitoring as a Service
MACMandatory Access Control
MACMedia Access Control
MACMessage Authentication Code
MAMMobile Application Management
MANMetropolitan Area Network
MBRMaster Boot Record
MD5Message Digest 5
MDFMain Distribution Frame
MDMMobile Device Management
MFAMultifactor Authentication
MFDMulti-Function Device
MFPMulti-Function Printer
MITMMan in the Middle
MLMachine Learning
MMSMultimedia Message Service
MOAMemorandum of Agreement
MOUMemorandum of Understanding
MPLSMulti-Protocol Label Switching
MSAMeasurement Systems Analysis
MSCHAPMicrosoft Challenge Handshake Authentication Protocol
MSPManaged Service Provider
MSSPManaged Security Service Provider
MTBFMean Time Between Failures
MTTFMean Time to Failure
MTTRMean Time to Recover
MTUMaximum Transmission Unit


Network Access Control
NASNetwork Attached Storage
NATNetwork Address Translation
NDANon-Disclosure Agreement
NFCNear Field Communication
NFVNetwork Functions Virtualization
NICNetwork Interface Card
NIDSNetwork Based Intrusion Detection System
NIPSNetwork Based Intrusion Prevention System
NISTNational Institute of Standards & Technology
NIST RMFNIST Risk Management Framework
NTFSNew Technology File System
NTLMNew Technology LAN Manager
NTPNetwork Time Protocol


Open Authorization
OCSPOnline Certificate Status Protocol
OIDObject Identifier
OSOperating System
OSIOpen Systems Interconnection
OSINTOpen Source Intelligence
OSPFOpen Shortest Path First
OTOperational Technology
OTAOver The Air
OTGOn The Go
OVALOpen Vulnerability Assessment Language
OWASPOpen Web Application Security Project


PKCS #12
P2PPeer to Peer
PaaSPlatform as a Service
PACProxy Auto Configuration
PAMPrivileged Access Management
PAMPluggable Authentication Modules
PAPPassword Authentication Protocol
PATPort Address Translation
PBKDF2Password Based Key Derivation Function 2
PBXPrivate Branch Exchange
PCAPPacket Capture
PCIDSS Payment Card Industry Data Security
PDUPower Distribution Unit
PEAPProtected Extensible Authentication Protocol
PEDPersonal Electronic Device
PEMPrivacy Enhanced Mail
PFSPerfect Forward Secrecy
PFXPersonal Information Exchange
PGPPretty Good Privacy
PHIPersonal Health Information
PIIPersonally Identifiable Information
PIVPersonal Identity Verification
PKCSPublic Key Cryptography Standards
PKIPublic Key Infrastructure
POPPost Office Protocol
POTSPlain Old Telephone Service
PPPPoint-to-Point Protocol
PPTPPoint-to-Point Tunneling Protocol
PSKPre-Shared Key


Quality Assurance
QoSQuality of Service
PUPPotentially Unwanted Program


Recovery Agent
RARegistration Authority
RACEResearch and Development in Advanced Communications
RADRapid Application Development
RADIUSRemote Authentication Dial-in User Server
RAIDRedundant Array of Inexpensive Disks
RAMRandom Access Memory
RASRemote Access Server
RATRemote Access Trojan
RC4Rivest Cipher version 4
RCSRich Communication Services
RFCRequest for Comments
RFIDRadio Frequency Identifier
RIPEMDRACE Integrity Primitives Evaluation Message Digest
ROIReturn on Investment
RPORecovery Point Objective
RSARivest, Shamir, & Adleman
RTBHRemote Triggered Black Hole
RTORecovery Time Objective
RTOSReal-Time Operating System
RTOSReal-Time Operating System
RTPReal-Time Transport Protocol


Secure/Multipurpose Internet Mail Extensions
SaaSSoftware as a Service
SAESimultaneous Authentication of Equals
SAMLSecurity Assertions Markup Language
SANStorage Area Network
SANSubject Alternative Name
SCADASystem Control and Data Acquisition
SCAPSecurity Content Automation Protocol
SCEPSimple Certificate Enrollment Protocol
SDKSoftware Development Kit
SDLCSoftware Development Life Cycle
SDLMSoftware Development Life-cycle Methodology
SDNSoftware Defined Networking
SDVSoftware Defined Visibility
SEDSelf-Encrypting Drives
SEHStructured Exception Handler
SFTPSecured File Transfer Protocol
SHASecure Hashing Algorithm
SHTTPSecure Hypertext Transfer Protocol
SIEMSecurity Information and Event Management
SIMSubscriber Identity Module
SIPSession Initiation Protocol
SLAService Level Agreement
SLESingle Loss Expectancy
S/MIMESecure/Multipurpose Internet Mail Exchanger
SMSShort Message Service
SMTPSimple Mail Transfer Protocol
SMTPSSimple Mail Transfer Protocol Secure
SNMPSimple Network Management Protocol
SOAPSimple Object Access Protocol
SOARSecurity Orchestration, Automation, Response
SoCSystem on Chip
SOCSecurity Operations Center
SPFSender Policy Framework
SPIMSpam over Internet Messaging
SQLStructured Query Language
SQLiSQL Injection
SRTPSecure Real-Time Protocol
SSAE SOC 2 Type I/IIStatement on Standards for Attestation Engagements Security Operations Center 2
SSDSolid State Drive
SSHSecure Shell
SSLSecure Sockets Layer
SSOSingle Sign On
STIXStructured Threat Information eXchange
STPShielded Twisted Pair
SWGSecure Web Gateway


Terminal Access Controller Access Control System
TAXIITrusted Automated eXchange of Indicator Information
TCP/IPTransmission Control Protocol/Internet Protocol
TGTTicket Granting Ticket
TKIPTemporal Key Integrity Protocol
TLSTransport Layer Security
TOTPTime-based One Time Password
TPMTrusted Platform Module
TSIGTransaction Signature
TTPTactics, Techniques, and Procedures


User Acceptance Testing
UAVUnmanned Aerial Vehicle
UDPUser Datagram Protocol
UEFIUnified Extensible Firmware Interface
UEMUnified Endpoint Management
UPSUninterruptable Power Supply
URIUniform Resource Identifier
URLUniversal Resource Locator
USBUniversal Serial Bus
UTMUnified Threat Management
UTPUnshielded Twisted Pair


Visual Basic
VDEVirtual Desktop Environment
VDIVirtual Desktop Infrastructure
VLANVirtual Local Area Network
VLSMVariable Length Subnet Masking
VMVirtual Machine
VoIPVoice over IP
VPCVirtual Private Cloud
VPNVirtual Private Network
VTCVideo Teleconferencing


Web Application Firewall
WAPWireless Access Point
WEPWired Equivalent Privacy
WIDSWireless Intrusion Detection System
WIPSWireless Intrusion Prevention System
WORMWrite Once Read Many
WPAWiFi Protected Access
WPSWiFi Protected Setup
WTLSWireless TLS


Anything as a Service
XMLExtensible Markup Language
XORExclusive Or
XSRFCross-Site Request Forgery
XSSCross-Site Scripting

CompTIA Security+ SY0-601

Below are posts that work through the topics listed in the CompTIA Security+ Certification Exam Objectives.

View Exam Objectives