AAA
Authentication, Authorization, and Accounting
Authentication, Authorization, and Accounting
ABAC
Attribute-based Access Control
Attribute-based Access Control
ACL
Access Control List
Access Control List
AES
Advanced Encryption Standard
Advanced Encryption Standard
AES256
Advanced Encryption Standards 256bit
Advanced Encryption Standards 256bit
AH
Authentication Header
Authentication Header
ALE
Annualized Loss Expectancy
Annualized Loss Expectancy
AP
Access Point
Access Point
API
Application Programming Interface
Application Programming Interface
APT
Advanced Persistent Threat
Advanced Persistent Threat
ARO
Annualized Rate of Occurrence
Annualized Rate of Occurrence
ARP
Address Resolution Protocol
Address Resolution Protocol
ASLR
Address Space Layout Randomization
Address Space Layout Randomization
ASP
Application Service Provider
Application Service Provider
AUP
Acceptable Use Policy
Acceptable Use Policy
AV
Antivirus
Antivirus
AV
Asset Value
Asset Value
BAC
Business Availability Center
Business Availability Center
BCP
Business Continuity Planning
Business Continuity Planning
BIA
Business Impact Analysis
Business Impact Analysis
BIOS
Basic Input/Output System
Basic Input/Output System
BPA
Business Partners Agreement
Business Partners Agreement
BPDU
Bridge Protocol Data Unit
Bridge Protocol Data Unit
BYOD
Bring Your Own Device
Bring Your Own Device
CA
Certificate Authority
Certificate Authority
CAC
Common Access Card
Common Access Card
CAN
Controller Area Network
Controller Area Network
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
Completely Automated Public Turing Test to Tell Computers and Humans Apart
CAR
Corrective Action Report
Corrective Action Report
CBC
Cipher Block Chaining
Cipher Block Chaining
CCMP
Counter-Mode/CBC-Mac Protocol
Counter-Mode/CBC-Mac Protocol
CCTV
Closed-circuit Television
Closed-circuit Television
CER
Certificate
Certificate
CER
Cross-over Error Rate
Cross-over Error Rate
CERT
Computer Emergency Response Team
Computer Emergency Response Team
CFB
Cipher Feedback
Cipher Feedback
CHAP
Challenge Handshake Authentication Protocol
Challenge Handshake Authentication Protocol
CIO
Chief Information Officer
Chief Information Officer
CIRT
Computer Incident Response Team
Computer Incident Response Team
CMS
Content Management System
Content Management System
COOP
Continuity of Operations Plan
Continuity of Operations Plan
COPE
Corporate Owned, Personally Enabled
Corporate Owned, Personally Enabled
CP
Contingency Planning
Contingency Planning
CRC
Cyclical Redundancy Check
Cyclical Redundancy Check
CRL
Certificate Revocation List
Certificate Revocation List
CSIRT
Computer Security Incident Response Team
Computer Security Incident Response Team
CSO
Chief Security Officer
Chief Security Officer
CSP
Cloud Service Provider ً
Cloud Service Provider ً
CSR
Certificate Signing Request
Certificate Signing Request
CSRF
Cross-site Request Forgery
Cross-site Request Forgery
CSU
Channel Service Unit
Channel Service Unit
CTM
Counter-Mode
Counter-Mode
CTO
Chief Technology Officer
Chief Technology Officer
جاري تحميل الاقتراحات...