Two-Factor Authentication
Access Control List
Advanced Encryption Standard
Advanced Persistent Threat
Address Space Layout Randomization
Completely Automated Public Turing test to tell Computers and Humans Apart
Counter Mode Cipher Block Chaining Message Authentication Code Protocol
Challenge-Handshake Authentication Protocol
Cross-Origin Resource Sharing
Certificate Revocation List
Content Security Policy
Cross-Site Request Forgery
Discretionary Access Control
Dynamic ARP Inspection
Distributed Denial of Service
Data Loss Prevention
Domain-based Message Authentication, Reporting, and Conformance
Demilitarized Zone
Domain Name System Security Extensions
DNS over HTTPS
Denial of Service
Extensible Authentication Protocol
Encrypting File System
FTP over explicit TLS
GNU Privacy Guard
Host-based Intrusion Detection System
Hash-based Message Authentication Code
Hardware Security Module
HTTP Secure
Identity and Access Management
Intrusion Detection System
Intrusion Prevention System
Internet Protocol Security
JSON Web Token
Key Management Service
Lightweight Directory Access Protocol
Local File Inclusion
Media Access Control Security
Message Digest Algorithm 5
Multi-Factor Authentication
Network Address Translation
Network Intrusion Detection System
National Institute of Standards and Technology
Open Authorization
Online Certificate Status Protocol
OpenID Connect
Out-of-Band
One-Time Password
Privileged Access Management
Payment Card Industry
Pretty Good Privacy
Personally Identifiable Information
Rivest-Shamir-Adleman
Secure Copy Protocol
Secure File Transfer Protocol
Secure Hash Algorithm
Security Information and Event Management
Secure Shell
Secure Sockets Layer
Single Sign-On
Server-Side Request Forgery
Transport Layer Security
Unified Extensible Firmware Interface
Virtual Private Network
Web Application Firewall
Who Is
Cross-Site Scripting
Public Key Infrastructure
Virtual Local Area Network
DomainKeys Identified Mail