| 3DES | Triple Data Encryption Standard |
| ACD | automatic call distributor |
| AES | Advanced Encryption Standard |
| ANSI | American National Standards Institute |
| AP | access point |
| API | application programming interface |
| B2B | business to business |
| B2C | business to consumer |
| BBB | Better Business Bureau |
| BCP | business continuity planning |
| C2C | consumer to consumer |
| CA | certificate authority |
| CAP | Certification and Accreditation Professional |
| CAUCE | Coalition Against Unsolicited Commercial Email |
| CCC | CERT Coordination Center |
| CCNA | Cisco Certified Network Associate |
| CERT | Computer Emergency Response Team |
| CFE | Certified Fraud Examiner |
| CISA | Certified Information Systems Auditor |
| CISM | Certified Information Security Manager |
| CISSP | Certified Information System Security Professional |
| CMIP | Common Management Information Protocol |
| COPPA | Children’s Online Privacy Protection Act of 1998 |
| CRC | cyclic redundancy check |
| CSI | Computer Security Institute |
| CTI | Computer Telephony Integration |
| DBMS | database management system |
| DDoS | distributed denial of service |
| DES | Data Encryption Standard |
| DMZ | demilitarized zone |
| DoS | denial of service |
| DPI | deep packet inspection |
| DRP | disaster recovery plan |
| DSL | digital subscriber line |
| DSS | Digital Signature Standard |
| DSU | data service unit |
| EDI | Electronic Data Interchange |
| EIDE | Enhanced IDE |
| FACTA | Fair and Accurate Credit Transactions Act |
| FAR | false acceptance rate |
| FBI | Federal Bureau of Investigation |
| FDIC | Federal Deposit Insurance Corporation |
| FEP | front-end processor |
| FRCP | Federal Rules of Civil Procedure |
| FRR | false rejection rate |
| FTC | Federal Trade Commission |
| FTP | File Transfer Protocol |
| GIAC | Global Information Assurance Certification |
| GLBA | Gramm-Leach-Bliley Act |
| HIDS | host-based intrusion detection system |
| HIPAA | Health Insurance Portability and Accountability Act |
| HIPS | host-based intrusion prevention system |
| HTML | Hypertext Markup Language |
| HTTP | Hypertext Transfer Protocol |
| HTTPS | HTTP over Secure Socket Layer |
| IAB | Internet Activities Board |
| IDEA | International Data Encryption Algorithm |
| IDPS | intrusion detection and prevention system |
| IDS | intrusion detection system |
| IEEE | Institute of Electrical and Electronics Engineers |
| IETF | Internet Engineering Task Force |
| InfoSec | information security |
| IP | Internet Protocol |
| IPS | intrusion prevention system |
| IPSec | IP Security |
| IRS | Internal Revenue Service |
| (ISC)2 | International Information System Security Certification Consortium |
| ISO | International Organization for Standardization |
| ISP | Internet service provider |
| ISS | Internet security system |
| ITRC | Identity Theft Resource Center |
| IVR | interactive voice response |
| JTAG | Joint Test Action Group (JTAG) methods |
| LAN | local area network |
| MAN | metropolitan area network |
| MD5 | Message Digest 5 |
| modem | modulator demodulator |
| NFIC | National Fraud Information Center |
| NIDS | network intrusion detection system |
| NIPS | network intrusion prevention system |
| NIST | National Institute of Standards and Technology |
| NMS | network management system |
| OS | operating system |
| OSI | Open System Interconnection |
| PBX | private branch exchange |
| PCI | Payment Card Industry |
| PGP | Pretty Good Privacy |
| PKI | public key infrastructure |
| RAID | redundant array of independent disks |
| RFC | request for comments |
| RSA | Rivest, Shamir, and Adleman (algorithm) |
| SAN | storage area network |
| SANCP | Security Analyst Network Connection Profiler |
| SANS | SysAdmin, Audit, Network, Security |
| SAP | service access point |
| SCSI | Small Computer System Interface |
| SET | secure electronic transaction |
| SGC | server-gated cryptography |
| SHA | Secure Hash Algorithm |
| S-HTTP | Secure HTTP |
| SLA | service-level agreement |
| SMFA | specific management functional area |
| SNMP | Simple Network Management Protocol |
| SOX | Sarbanes-Oxley Act of 2002 (also Sarbox) |
| SSA | Social Security Administration |
| SSCP | Systems Security Certified Practitioner |
| SSL | Secure Sockets Layer |
| SSO | single system sign-on |
| STP | shielded twisted cable |
| SWGDE | Scientific Working Group on Digital Evidence |
| TCP/IP | Transmission Control Protocol/Internet Protocol |
| TCSEC | Trusted Computer System Evaluation Criteria |
| TFTP | Trivial File Transfer Protocol |
| TNI | Trusted Network Interpretation |
| UDP | User Datagram Protocol |
| UPS | uninterruptible power supply |
| UTP | unshielded twisted cable |
| VLAN | virtual local area network |
| VOIP | Voice over Internet Protocol |
| VPN | virtual private network |
| W3C | World Wide Web Consortium |
| WAN | wide area network |
| WLAN | wireless local area network |
| WNIC | wireless network interface card |
| WWW | World Wide Web |