Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Abbrieviations"
From NetSec
(Created page with "An abbreviation is when a long set of words is shortened into a few letters. This is a list of abbrieviations and their long format as used in this wiki. {| class="wikitable" ! ...") |
(Added PCI) |
||
Line 196: | Line 196: | ||
| [[NIPS]] | | [[NIPS]] | ||
| Network-based Intrusion Prevention Systems | | Network-based Intrusion Prevention Systems | ||
+ | |- | ||
+ | | [[PCI]] | ||
+ | | Peripheral Component Interconnect | ||
|- | |- | ||
| [[PERL]] | | [[PERL]] |
Latest revision as of 10:47, 23 April 2013
An abbreviation is when a long set of words is shortened into a few letters. This is a list of abbrieviations and their long format as used in this wiki.
Abbreviation | In Full |
---|---|
AJAX | Asynchronous JavaScript And XML |
API | Application Programmable Interface |
ARP | Address Resolution Protocol |
AS | Autonomous System |
ASCII | American Standard Code for Information Interchange |
ASLR | Address Space Layout Randomization |
ASM | Assembly |
ASN | Autonomous System Number |
ASP | Active Server Pages |
AST | Abstract Syntax Tree |
BGP | Border Gateway Protocol |
Bash | Bourne-Again SHell |
BIOS | Basic Input Output System |
CC | C Compiler |
CD | Compact Disk |
CEH | Certified Ethical Hacker |
CFM | Cold Fusion Markup |
CGI | Common Gateway Interface |
CIDR | Classless Inter-Domain Routing |
CISA | Certified Information Systems Auditor |
CISO | Certified Information Security Officer |
CISSP | Certified Information Systems Security Professional |
CPAN | The Comprehensive Perl Archive Network |
CPP | C Plus Plus |
CPU | Central Processing Unit |
CSA | Cisco Security Agent |
CSRF | Cross-Site Referral Forgery |
CSS | Cascading Style Sheet |
DEP | Data Execution Prevention. |
DHCP | Dynamic Host Configuration Protocol |
DIG | Domain Information Groper |
DNS | Domain Name System |
FITD | Foot-In-The-Door |
FTP | File Transfer protocol |
GCIA | GIAC Certified Intrusion Analyst |
GCIH | GIAC Certified Incident Handler |
GIAC | Global Information Assurance Certification |
GSEC | GIAC Security Essentials Certification |
HIDS | Host-based Intrusion Detection System |
HIPS | Host Intrusion Prevention System |
HTML | Hyper-Text Markup Language |
HTTP | Hyper-Text Transfer Protocol |
HTTPS | Hypertext Transfer Protocol Secure |
IDS | Intrusion Detection Systems |
ICMP | Internet Control Message Protocol |
IGMP | Internet Group Management Protocol |
IP | Internet Protocol |
IPS | Intrusion Prevention System |
IR | Intermediate Representation |
IRC | Internet Relay Chat |
ISACA | Information Systems Audit and Control Association |
(ISCA)2 | International Information Systems Security Certification Consortium |
LAN | Local Area Network |
LCD | Liquid Crystal Display |
LFD | Local File Disclosure |
LFI | Local File Inclusion |
Lisp | Locator/Identifier Separation Protocol |
MAC | Media Access Control |
MITM attack | Man In The Middle attack |
MS-DOS | MicroSoft Disk Operating System |
MSSQL | Microsoft Structured Query Language |
NGINX | eNGINeX |
NIDS | Network layer Intrusion Detection Systems |
NIPS | Network-based Intrusion Prevention Systems |
PCI | Peripheral Component Interconnect |
PERL | Practical Extraction and Report Language |
PGP | Pretty Good Privacy |
PHP | PHP Hypertext Preprocessor |
POP3 | Post Office Protocol version 3 |
RAT | Remote Administration Tool |
RFC | Request For Comment |
RFI | Remote File Inclusion |
RFID | Radio Frequency IDentification |
RIP | Routing Information Protocol |
ROP | Return Oriented Programming |
RoR | Ruby on Rails |
RPC | Remote Procedure Call |
RPN | Reverse Polish Notation |
SEO | Search Engine Optimization |
SIM | Security Infrastructure Management |
SIP | Session Initiation Protocol |
SMTP | Simple Mail Transfer Protocol |
SNMP | Simple Network Management Protocol |
SQL | Structured Query Language |
SSH | Secure SHell (protocol) |
SSI | Server Side Include |
TCL | Tool Command Language |
TCP | Transmission Control Protocol |
TFTP | Trivial File Transfer Protocol |
TLS | Transport Layer Security |
UDP | User Datagram Protocol |
URL | Uniform Resource Locator |
VOIP | Voice Over Internet Protocol |
XSCF | Cross-Site Content Forgery |
XSRF | Cross-Site Request Forgery |
XSS | Cross-Site Scripting |