Two-Factor Authentication
Access Control List
Advanced Encryption Standard
Advanced Persistent Threat
Address Space Layout Randomization
Completely Automated Public Turing test to tell Computers and Humans Apart
Counter Mode Cipher Block Chaining Message Authentication Code Protocol
Challenge-Handshake Authentication Protocol
Cross-Origin Resource Sharing