зеркало из
https://github.com/M82-project/Dictionnaire_Cyber.git
synced 2025-10-30 05:26:09 +02:00
Коммит
e0d2fba8d8
290
1. Acronymes.md
290
1. Acronymes.md
@ -5,11 +5,18 @@ date: 2024-04-21
|
|||||||
|
|
||||||
Contribuez à la mise à jour de cette liste ici : [mise à jour](https://github.com/M82-project/Dictionnaire_Cyber_public/blob/main/2.%20Acronymes)
|
Contribuez à la mise à jour de cette liste ici : [mise à jour](https://github.com/M82-project/Dictionnaire_Cyber_public/blob/main/2.%20Acronymes)
|
||||||
Les acronymes télécoms sont issus de l'excellent travail regroupé ici : [GLOTEL](http://abcdrfc.free.fr/ressources-vf/GLOTEL.html)
|
Les acronymes télécoms sont issus de l'excellent travail regroupé ici : [GLOTEL](http://abcdrfc.free.fr/ressources-vf/GLOTEL.html)
|
||||||
|
## Chiffre
|
||||||
|
* 2FA : Two Factor Authentication
|
||||||
|
* 3DES : Triple Data Encryption Standard
|
||||||
|
|
||||||
## A
|
## A
|
||||||
|
* AAA : Authentication, Authorization, Accounting.
|
||||||
|
* ABAC : Attributed-Based Access Control.
|
||||||
* ABCDE : Actors, Behaviour, Content, Degree, Effect.
|
* ABCDE : Actors, Behaviour, Content, Degree, Effect.
|
||||||
* ACL : Acces Control List.
|
* ACL : Access Control List.
|
||||||
* ACSSI : Article Contrôlé de la sécurité des informations.
|
* ACM : Access Control Matrix.
|
||||||
|
* ACS : Annual Cost of Safeguard.
|
||||||
|
* ACSSI : Article Contrôlé de la Sécurité des Systèmes d'Information.
|
||||||
* AD : Active Directory.
|
* AD : Active Directory.
|
||||||
* ADSL : Asymmetrical Digital Subscriber Line.
|
* ADSL : Asymmetrical Digital Subscriber Line.
|
||||||
* AES : Advanced Encryption Standard.
|
* AES : Advanced Encryption Standard.
|
||||||
@ -17,161 +24,292 @@ Les acronymes télécoms sont issus de l'excellent travail regroupé ici : [GLOT
|
|||||||
* AFF : Advanced Forensic Format.
|
* AFF : Advanced Forensic Format.
|
||||||
* AFNIC : Association Française pour le Nommage Internet en Coopération.
|
* AFNIC : Association Française pour le Nommage Internet en Coopération.
|
||||||
* AFNOR : Association Française de NORmalisation.
|
* AFNOR : Association Française de NORmalisation.
|
||||||
|
* AH : Authentication Header.
|
||||||
|
* AIPD : Analyse d'Impact sur la Protection des Données
|
||||||
|
* ALE : Annualized Loss Expectancy
|
||||||
* AMRC : Accès Multiple par répartition en code.
|
* AMRC : Accès Multiple par répartition en code.
|
||||||
* AMRF : Accès Multiple par répartition en fréquence.
|
* AMRF : Accès Multiple par répartition en fréquence.
|
||||||
* AMRT : Accès multiple par répartition temporelle.
|
* AMRT : Accès multiple par répartition temporelle.
|
||||||
* ANFR : Agence Nationale des Fréquences.
|
* ANFR : Agence Nationale des Fréquences.
|
||||||
* ANSSI : Agence Nationale de la Sécurité des Systèmes d’Information.
|
* ANSSI : Agence Nationale de la Sécurité des Systèmes d’Information.
|
||||||
|
* AP : Access Point.
|
||||||
* API : Application Programming Interface.
|
* API : Application Programming Interface.
|
||||||
* APT : Advanced Persistant Threat.
|
* APT : Advanced Persistant Threat.
|
||||||
|
* ARO : Annualized Rate Of Occurence.
|
||||||
|
* ARP : Address Resolution Protocol.
|
||||||
* ARPANET : Advanced Research Projects Agency NETwork.
|
* ARPANET : Advanced Research Projects Agency NETwork.
|
||||||
* ASCII : American Standard Code for Information Interchange.
|
* ASCII : American Standard Code for Information Interchange.
|
||||||
|
* ASLR : Address Space Layout Randomizarion.
|
||||||
|
* ASVS : Application Security Verification Standard.
|
||||||
|
* ATT&CK : Adversarial Tactics, Techniques and Common Knowledge
|
||||||
* AuC : Authentication Center.
|
* AuC : Authentication Center.
|
||||||
|
* AV : AntiVirus.
|
||||||
|
* AV : Asset Value.
|
||||||
|
* AV-NG : AntiVirus Next-Gen cf EDR, XDR
|
||||||
|
|
||||||
## B
|
## B
|
||||||
* BAN : Body Area Network.
|
* BAN : Body Area Network.
|
||||||
|
* BAS : Breach Attack Simulations.
|
||||||
|
* BEC : Business Email Compromise.
|
||||||
* BECN : Backward explicit congestion notification.
|
* BECN : Backward explicit congestion notification.
|
||||||
* BGP : Border Gateway Protocol.
|
* BGP : Border Gateway Protocol.
|
||||||
* BI : Business Intelligence.
|
* BI : Business Intelligence.
|
||||||
|
* BIA : Business Impact Analysis.
|
||||||
* BIOS : Basic Input Output System.
|
* BIOS : Basic Input Output System.
|
||||||
|
* BRP : Business Recovery Plan.
|
||||||
* BSC : Base Station Controller.
|
* BSC : Base Station Controller.
|
||||||
|
* BSIMM : Business Security in Maturity Model.
|
||||||
* BSS : Base Station Subsystem.
|
* BSS : Base Station Subsystem.
|
||||||
* BTS : Base Transceiver Station.
|
* BTS : Base Transceiver Station.
|
||||||
|
* BYOD : Bring Your Own Device.
|
||||||
|
* BYOE : Bring Your Own Encryption.
|
||||||
|
* BYOK : Bring Your Own Key.
|
||||||
|
|
||||||
## C
|
## C
|
||||||
* CA : Certification Auhority.
|
* C2 : Command and Control.
|
||||||
|
* CA : Certificate Auhority.
|
||||||
* CALID : Centre d’Analyse et de Lutte Informatique Défensive.
|
* CALID : Centre d’Analyse et de Lutte Informatique Défensive.
|
||||||
* CAPEC : Common Attack Pattern Enumeration and Classifica-tion.
|
* CAPEC : Common Attack Pattern Enumeration and Classifica-tion.
|
||||||
|
* CAPTCHA : Completely Automated Public Turing test to tell Computers and Humans Apart
|
||||||
* CASB : Cloud Access Security Broker.
|
* CASB : Cloud Access Security Broker.
|
||||||
* CASE : Common Application Services Elements.
|
* CASE : Common Application Services Elements.
|
||||||
* CBAC : Context-Based Access Control.
|
* CBAC : Context-Based Access Control.
|
||||||
* CBC : Cypher block chain.
|
* CBC : Cypher block chain.
|
||||||
* CBR : Constant Bit Rate.
|
* CBR : Constant Bit Rate.
|
||||||
|
* CC : Certified in Cybersecurity.
|
||||||
|
* CC : Common Criterias.
|
||||||
* CC : Creative Commons.
|
* CC : Creative Commons.
|
||||||
* CCC : Chaos Computer Club.
|
* CCC : Chaos Computer Club.
|
||||||
|
* CCM : Cloud Controls Matrix.
|
||||||
|
* CCMP : Counter-Mode/CBC-Mac protocol.
|
||||||
|
* CCRA : Cloud Computing Reference Architecture.
|
||||||
|
* CCSK : Cloud Computing Security Knowledge.
|
||||||
|
* CCTL : Common Criteria Testing Laboratories.
|
||||||
* CDMA : Code Division Multiple Access.
|
* CDMA : Code Division Multiple Access.
|
||||||
* CDN : Content Delivery Network.
|
* CDN : Content Delivery Network.
|
||||||
* CEI : Commission Electrotechnique Internationale.
|
* CEI : Commission Electrotechnique Internationale.
|
||||||
* CEN : Comité Européen de Normalisation.
|
* CEN : Comité Européen de Normalisation.
|
||||||
* CERT : Computer emergency response team.
|
* CERT : Computer Emergency Response Team.
|
||||||
* CFB : Cipher FeedBack.
|
* CESIN : Club des Experts de la Sécurité de l'Information et du Numérique.
|
||||||
|
* CFB : Cipher FeedBack Block.
|
||||||
* CFU : Call Forwarding Unconditional.
|
* CFU : Call Forwarding Unconditional.
|
||||||
|
* CHAP : Challenge Handshake Authentication Protocol.
|
||||||
* CIDR : Classless Inter-Domain Routing.
|
* CIDR : Classless Inter-Domain Routing.
|
||||||
|
* CIEM : Cloud Infrastructure Entitlement Management.
|
||||||
|
* CIRP : Cyber Incident Response Plan.
|
||||||
|
* CIS : Center for Internet Security.
|
||||||
|
* CISA : Certified Information Systems Auditor.
|
||||||
|
* CISA : Cybersecurity and Infrastructure Security Agency.
|
||||||
|
* CISO : Chief Information Security Officer.
|
||||||
|
* CISSP : Certified Information Systems Security Professional.
|
||||||
|
* CLUSIF : Club de la Sécurité de l'Information Français.
|
||||||
|
* CMM : Capability Maturity Model.
|
||||||
|
* CMMI : Capability Maturity Model Integration.
|
||||||
* CMS : Content Management System.
|
* CMS : Content Management System.
|
||||||
|
* CMS : Credential Management System.
|
||||||
* CNA : Computer Network Attack.
|
* CNA : Computer Network Attack.
|
||||||
|
* CNAPP : Cloud Native Application Protection Plateform.
|
||||||
* CNE : Computer Network Exploitation.
|
* CNE : Computer Network Exploitation.
|
||||||
* CNIL : Commission Nationale Informatique et Liberté.
|
* CNIL : Commission Nationale Informatique et Liberté.
|
||||||
* CNO : Computer Network Operation.
|
* CNO : Computer Network Operation.
|
||||||
|
* COBIT : Control Objectives for Information and related Technology.
|
||||||
* COIN : Contre insurrection.
|
* COIN : Contre insurrection.
|
||||||
|
* COOP : Continuity Of Operations Plan.
|
||||||
|
* CORS : Cross-Origin Resource Sharing.
|
||||||
|
* COTS : Commercial Off-the-Shelf Software.
|
||||||
* CPE : Common Platform Enumeration.
|
* CPE : Common Platform Enumeration.
|
||||||
|
* CPSO : Chief Product Security Officer.
|
||||||
* CPL : Courant Porteur en Ligne.
|
* CPL : Courant Porteur en Ligne.
|
||||||
* CSMA/CD : Carrier Sense Multiple Acces with Collision Detec-tion.
|
* CRL : Certificate Revocation List.
|
||||||
|
* CRLDP : Certificate Revocation List Distribution Point.
|
||||||
|
* CSA : Cloud Security Alliance.
|
||||||
|
* CSF : CyberSecurity Framework.
|
||||||
|
* CSIRT : Computer Security Incident Response Team.
|
||||||
|
* CSO : Chief Security Officer.
|
||||||
|
* CSO : Cloud Security Provider.
|
||||||
|
* CSP : Content Security Policy.
|
||||||
|
* CSPM : Cloud Security Posture Management.
|
||||||
|
* CSPN : Certification de Sécurité de Premier Niveau.
|
||||||
|
* CSR : Certificate Signing Request.
|
||||||
|
* CSRF : Cross Site Request Forgery.
|
||||||
|
* CSMA/CD : Carrier-Sense Multiple Access with Collision Detection.
|
||||||
* CSS : Cascading Style Sheets.
|
* CSS : Cascading Style Sheets.
|
||||||
|
* CTI : Cyber Threat Intelligence.
|
||||||
* CTR : Common Technical Regulation.
|
* CTR : Common Technical Regulation.
|
||||||
* CVE : Common Vulnerabilities and Exposure.
|
* CVE : Common Vulnerabilities and Exposure.
|
||||||
* CVSS : Common Vulnerability Scoring System.
|
* CVSS : Common Vulnerability Scoring System.
|
||||||
* CWE : Common Weakness Enumeration.
|
* CWE : Common Weakness Enumeration.
|
||||||
|
* CWPP : Cloud Workload Protection Platform.
|
||||||
|
* CWSS : Common Weakness Scoring System.
|
||||||
|
|
||||||
## D
|
## D
|
||||||
|
* DAM : Database Activity Monitoring.
|
||||||
|
* DAST : Dynamic Application Security Testing.
|
||||||
* DARPA : Departement of Advanced Research Projects Agency.
|
* DARPA : Departement of Advanced Research Projects Agency.
|
||||||
* DCS : Digital Communication System.
|
* DCS : Digital Communication System.
|
||||||
* DDOS : Distributed Deny Of Service.
|
* DDOS : Distributed Deny Of Service.
|
||||||
|
* DEA : Data Encryption Algorithm.
|
||||||
* DECT : Digital Enhanced Cordless Telecommunication.
|
* DECT : Digital Enhanced Cordless Telecommunication.
|
||||||
* DEFCON : Defense Condition.
|
* DEFCON : DEFense readiness CONdition.
|
||||||
* DEP : Data Execution Prevention.
|
* DEP : Data Execution Prevention.
|
||||||
* DES : Data encryptions Standard.
|
* DES : Data Encryption Standard.
|
||||||
* DHCP : Dynamic Host Configuration Protocol.
|
* DHCP : Dynamic Host Configuration Protocol.
|
||||||
|
* DKIM : DomainKeys Identified Mail.
|
||||||
* DLCI : Data Link Channel Identifier.
|
* DLCI : Data Link Channel Identifier.
|
||||||
* DLL : Dynamic Link Library, bibliothéque de liens dynamique.
|
* DLL : Dynamic Link Library, bibliothéque de liens dynamique.
|
||||||
|
* DLP : Data Loss Prevention.
|
||||||
|
* DMARC : Domain Message Authentication Reporting and Conformance.
|
||||||
* DMZ : DeMilitarized Zone.
|
* DMZ : DeMilitarized Zone.
|
||||||
* DNS : Domain Name System.
|
* DNS : Domain Name System.
|
||||||
|
* DNSSEC : Domain Name System Security Extensions.
|
||||||
* DOS : Deny Of Service.
|
* DOS : Deny Of Service.
|
||||||
* DPI : Deep packet inspection.
|
* DPD : Délégué à la Protection des Données.
|
||||||
|
* DPI : Deep Packet Inspection.
|
||||||
|
* DPIA : Data Protection Impact Assessment.
|
||||||
|
* DPO : Data Protection Officer.
|
||||||
|
* DR : Disaster Recovery.
|
||||||
|
* DREAD : Damage Reproducibility Exploitability Affected users Discoverability.
|
||||||
* DRM : Digital Right Management.
|
* DRM : Digital Right Management.
|
||||||
|
* DRP : Disaster Recovery Plan.
|
||||||
|
* DSA : Digital Signature Algorithm.
|
||||||
* DSS : Digital Signature Standard.
|
* DSS : Digital Signature Standard.
|
||||||
|
* DTLS : Datagram Transport Layer Security.
|
||||||
|
* DV : Domain Validation.
|
||||||
|
|
||||||
## E
|
## E
|
||||||
|
* E2EE : End-To-End Encryption.
|
||||||
|
* EAL : Evaluation Assurance Level.
|
||||||
* EAP : Extensible Authentication Protocol.
|
* EAP : Extensible Authentication Protocol.
|
||||||
* EBIOS : Expression des Besoins et Identification des Objectifs de Sécurité.
|
* EBIOS : Expression des Besoins et Identification des Objectifs de Sécurité.
|
||||||
|
* EBIOS RM : Expression des Besoins et Identification des Objectifs de Sécurité Risk Manager.
|
||||||
|
* ECC : Elliptic Curve Cryptography.
|
||||||
|
* ECDSA : Elliptic Curve Digital Signature Algorithm.
|
||||||
|
* EDR : Endpoint Detection and Response.
|
||||||
|
* EER : Equal Error Rate.
|
||||||
|
* EF : Exposure Fator.
|
||||||
* EFF : Electronic Fontier Foundation.
|
* EFF : Electronic Fontier Foundation.
|
||||||
|
* EFS : Encryption File System.
|
||||||
* EGP : Exterior Gateway Protocol.
|
* EGP : Exterior Gateway Protocol.
|
||||||
|
* eIDAS : electronic IDentification, Authentication and trust Services.
|
||||||
* EIGRP : Enhanced Interior Gateway Routing Protocol.
|
* EIGRP : Enhanced Interior Gateway Routing Protocol.
|
||||||
* EIR : Equipment Identity Register.
|
* EIR : Equipment Identity Register.
|
||||||
* EIR : Excess Information Rate.
|
* EIR : Excess Information Rate.
|
||||||
|
* EIVP : Etude d'Impact sur la Vie Privée.
|
||||||
* ENISA : European Network for Information Security Agency.
|
* ENISA : European Network for Information Security Agency.
|
||||||
|
* EPP : Endpoint Protection Platform.
|
||||||
|
* EPSS : Exploit Prediction Scoring System.
|
||||||
* ESN : Entreprise de Service du Numérique.
|
* ESN : Entreprise de Service du Numérique.
|
||||||
|
* ESP : Encapsulating Security Payload.
|
||||||
* ESSID : Extended Service Set Identifier.
|
* ESSID : Extended Service Set Identifier.
|
||||||
* ETCD : Equipement de Terminaison de Circuits de Données.
|
* ETCD : Equipement de Terminaison de Circuits de Données.
|
||||||
* ETSI : European Telecommunications Standard Institute.
|
* ETSI : European Telecommunications Standard Institute.
|
||||||
* ETTD : Equipement Terminal de Traitement de Données.
|
* ETTD : Equipement Terminal de Traitement de Données.
|
||||||
|
* EU5G : European Union 5G Cybersecurity Certification Scheme.
|
||||||
|
* EUCC : European Union Common Criteria.
|
||||||
|
* EUCS : European Union Cybersecurity Certification Scheme for Cloud Services.
|
||||||
|
* EV : Extended Validation.
|
||||||
|
|
||||||
## F
|
## F
|
||||||
* FAI : Fournisseur d’Accès à Internet.
|
* FAI : Fournisseur d’Accès à Internet.
|
||||||
* FDM : Frequency Division Multiplexing.
|
* FDM : Frequency Division Multiplexing.
|
||||||
|
* FDE : Full Disk Encryption.
|
||||||
* FDMA : Frequency Division Multiple Access.
|
* FDMA : Frequency Division Multiple Access.
|
||||||
* FEC : Forwarding Equivalence Class.
|
* FEC : Forwarding Equivalence Class.
|
||||||
* FECN : Forward Explicit Congestion Notification.
|
* FECN : Forward Explicit Congestion Notification.
|
||||||
|
* FEK : File Encryption Key.
|
||||||
* FH : Frequency Hopping.
|
* FH : Frequency Hopping.
|
||||||
* FHSS : Frequency Hopping Spread Spectrum.
|
* FHSS : Frequency Hopping Spread Spectrum.
|
||||||
|
* FIDO : Fast IDentity Online Alliance.
|
||||||
|
* FIDO2 : Fast IDentity Online Alliance v2.
|
||||||
* FIFO : First in First out.
|
* FIFO : First in First out.
|
||||||
|
* FIPS : Federal Information Processing Standard.
|
||||||
|
* FIRST : Forum of Incident Response and Security Teams.
|
||||||
* FM : Frequency Modulation.
|
* FM : Frequency Modulation.
|
||||||
* FPS : Fast Packet Switching.
|
* FPS : Fast Packet Switching.
|
||||||
* FTP : File Transfert Protocol.
|
* FTP : File Transfert Protocol.
|
||||||
|
* FVEK : File Volume Encryption key.
|
||||||
|
* FW : FireWall.
|
||||||
|
|
||||||
## G
|
## G
|
||||||
* GAFAM : Google, Apple, Facebook, Amazon, Microsoft.
|
* GAFAM : Google, Apple, Facebook, Amazon, Microsoft.
|
||||||
|
* GDPR : General Data Protection Regulation.
|
||||||
* GGSN : Gateway GPRS Support Node.
|
* GGSN : Gateway GPRS Support Node.
|
||||||
* GMSC : Gateway Mobile Switching Center.
|
* GMSC : Gateway Mobile Switching Center.
|
||||||
* GMSK : Gaussian Minimum Shift Keying.
|
* GMSK : Gaussian Minimum Shift Keying.
|
||||||
|
* GPG : GNU Privacy Guard.
|
||||||
|
* GPO : Group Policy Object.
|
||||||
* GPRS : General Packet Radio Service.
|
* GPRS : General Packet Radio Service.
|
||||||
|
* GRC : Gouvernance Risk management and Compliance.
|
||||||
* GRE : Generic Routing Encapsulation.
|
* GRE : Generic Routing Encapsulation.
|
||||||
* GSM : Global System for Mobile Communications.
|
* GSM : Global System for Mobile Communications.
|
||||||
|
|
||||||
## H
|
## H
|
||||||
* HD : Haut débit
|
* HD : Haut Débit.
|
||||||
* HDLC : Hight level Data Link Control.
|
* HDLC : Hight level Data Link Control.
|
||||||
* HIDS : Host Intrusion Detection System.
|
* HIDS : Host-based Intrusion Detection System.
|
||||||
* HIPS : Host-based Intrusion Prevention System.
|
* HIPS : Host-based Intrusion Prevention System.
|
||||||
* HLR : Home Location Register.
|
* HLR : Home Location Register.
|
||||||
* HSDPA : High Speed Download Packet Access
|
* HMAC : Hash-based Message Authentication Code.
|
||||||
|
* HOTP : HMAC-based One time Password.
|
||||||
|
* HSDPA : High Speed Download Packet Access.
|
||||||
|
* HSM : Hardware Security Module.
|
||||||
* HSN : Hopping Sequence Number.
|
* HSN : Hopping Sequence Number.
|
||||||
* HSUPA : High Speed Uplink Packet Access.
|
* HSUPA : High Speed Uplink Packet Access.
|
||||||
* HTML : HyperText Markup Language.
|
* HTML : HyperText Markup Language.
|
||||||
* HTTP : Hypertext transfer protocol.
|
* HTTP : HyperText Transfer Protocol.
|
||||||
* HTTPS : Hypertext transfer protocol secured.
|
* HTTPS : HyperText Transfer Protocol Secured.
|
||||||
|
|
||||||
## I
|
## I
|
||||||
|
* IaaS : Infrastructure as a Service.
|
||||||
* IAB : Internet Activities Board.
|
* IAB : Internet Activities Board.
|
||||||
* IAB : Internet Architecture Board.
|
* IAB : Internet Architecture Board.
|
||||||
|
* IAM : Identity and Access Management.
|
||||||
* IANA : Internet Assigned Numbers Authority.
|
* IANA : Internet Assigned Numbers Authority.
|
||||||
* ICANN : Internet Corporation for Assigned Names and Num-bers.
|
* IAST : Interactive Application Security Test.
|
||||||
|
* ICANN : Internet Corporation for Assigned Names and Numbers.
|
||||||
* ICMP : Internet Control and error Message Protocol.
|
* ICMP : Internet Control and error Message Protocol.
|
||||||
* IDoT : Identity of things.
|
* ICP : Infrastructure à Clé Publique.
|
||||||
* IDP : Internet Datagram Protocol
|
* IDoT : IDentity of things.
|
||||||
* IDS : Intrusion Detection Systems,
|
* IDP : Internet Datagram Protocol.
|
||||||
|
* IDS : Intrusion Detection Systems.
|
||||||
* IEC : International Electrotechnical Commission.
|
* IEC : International Electrotechnical Commission.
|
||||||
* IEEE : Institute of Electrical and Electronics Engineers.
|
* IEEE : Institute of Electrical and Electronics Engineers.
|
||||||
* IETF : Internet Engineering Task Force.
|
* IETF : Internet Engineering Task Force.
|
||||||
|
* IGC : Infrastructure de Gestion de Clés.
|
||||||
* IGP : Interior Gateway Protocol.
|
* IGP : Interior Gateway Protocol.
|
||||||
* IHM : Interface Homme Machine.
|
* IHM : Interface Homme Machine.
|
||||||
|
* IKE : Internet key Exchange.
|
||||||
* IMEI : International Mobile Station Equipment Identity.
|
* IMEI : International Mobile Station Equipment Identity.
|
||||||
* IMS : IP Multimédia Subsystem.
|
* IMS : IP Multimédia Subsystem.
|
||||||
* IMSI : International Mobile Subscriber Identity.
|
* IMSI : International Mobile Subscriber Identity.
|
||||||
* IMT 2000 : International Mobile Telecommunications 2000.
|
* IMT 2000 : International Mobile Telecommunications 2000.
|
||||||
|
* IoA : Indicator of Attack.
|
||||||
|
* IoC : Indicator of Compromise.
|
||||||
* IOT : Internet Of Things.
|
* IOT : Internet Of Things.
|
||||||
|
* IP : Internet Protocol.
|
||||||
* IPBX : Internet Protocol-Private Branch Exchange.
|
* IPBX : Internet Protocol-Private Branch Exchange.
|
||||||
* IPS - Intrusion Prevention System.
|
* IPS : Intrusion Prevention System.
|
||||||
* IPSEC : Internet Protocole Security.
|
* IPsec : Internet Protocol Security.
|
||||||
|
* IR : Incident Response.
|
||||||
|
* IRT : Incident Response Team.
|
||||||
* IRTF : Internet Research Task Force.
|
* IRTF : Internet Research Task Force.
|
||||||
|
* IS : Information Security.
|
||||||
|
* ISAKMP : Internet Security Association and Key Management Protocol
|
||||||
|
* ISC2 : International Information Systems Security Certification Consortium.
|
||||||
|
* ISCM : Information Security Continuous Monitoring.
|
||||||
* ISDN : Integrates Services Digital Network.
|
* ISDN : Integrates Services Digital Network.
|
||||||
* IS-IS : Intermediate Sytem to Intermediate System.
|
* IS-IS : Intermediate Sytem to Intermediate System.
|
||||||
* ISL : Inter Switch Link.
|
* ISL : Inter Switch Link.
|
||||||
|
* ISMS : Information Security Management System.
|
||||||
* ISO : International Standard Organisation.
|
* ISO : International Standard Organisation.
|
||||||
* ISOC : Internet SOCiety.
|
* ISOC : Internet SOCiety.
|
||||||
* ISTAR : Intelligence, surveillance, target acquisition, and recon-naissance.
|
* ISTAR : Intelligence, Surveillance, Target Acquisition, and Reconnaissance.
|
||||||
|
* IT : Information Technology.
|
||||||
* ITA : Information Technology Agreement.
|
* ITA : Information Technology Agreement.
|
||||||
* ITIL : Information Technology Infrastructure Library.
|
* ITIL : Information Technology Infrastructure Library.
|
||||||
* ITU : International Telecommunication Union.
|
* ITU : International Telecommunication Union.
|
||||||
|
* ITSEC : Information Technology Security Evaluation Criteria.
|
||||||
|
* IV : Initialization Vector.
|
||||||
* IXFR : Incremental Zone Transfer.
|
* IXFR : Incremental Zone Transfer.
|
||||||
|
|
||||||
## J
|
## J
|
||||||
@ -182,7 +320,18 @@ Les acronymes télécoms sont issus de l'excellent travail regroupé ici : [GLOT
|
|||||||
* JS : JavaScript.
|
* JS : JavaScript.
|
||||||
* JSON : JavaScript Object Notation.
|
* JSON : JavaScript Object Notation.
|
||||||
|
|
||||||
|
## K
|
||||||
|
* KDC : Key Distribution Center.
|
||||||
|
* KDK : Key Derivation Function.
|
||||||
|
* KEK : Key Encryption Key.
|
||||||
|
* KMIP : Key Management Interoperability Protocol.
|
||||||
|
* KMS : Key Management System.
|
||||||
|
* KRACK : Key Reinstallation AttaCK.
|
||||||
|
* KRI : Key Risk Indicator.
|
||||||
|
|
||||||
## L
|
## L
|
||||||
|
* L2I : Lutte Informatique d'Influence.
|
||||||
|
* L2TP : Layer 2 Tunneling Protocol.
|
||||||
* LA : Location Area.
|
* LA : Location Area.
|
||||||
* LAC : Location Area Code.
|
* LAC : Location Area Code.
|
||||||
* LAI : Location Area Identification.
|
* LAI : Location Area Identification.
|
||||||
@ -193,6 +342,8 @@ Les acronymes télécoms sont issus de l'excellent travail regroupé ici : [GLOT
|
|||||||
* LCP : Link Control Protocol.
|
* LCP : Link Control Protocol.
|
||||||
* LDAP : Lightweight Directory Access Protocol.
|
* LDAP : Lightweight Directory Access Protocol.
|
||||||
* LDP : Label Distribution Protocol.
|
* LDP : Label Distribution Protocol.
|
||||||
|
* LEAP : Lightweight Extensible Authentication Protocol.
|
||||||
|
* LFI : Local File Inclusion.
|
||||||
* LIB : Label Information Base.
|
* LIB : Label Information Base.
|
||||||
* LID : Lutte Informatique Défensive.
|
* LID : Lutte Informatique Défensive.
|
||||||
* LII : Lutte Informatique d'Influence.
|
* LII : Lutte Informatique d'Influence.
|
||||||
@ -201,25 +352,35 @@ Les acronymes télécoms sont issus de l'excellent travail regroupé ici : [GLOT
|
|||||||
* LLC : Logical Link Control.
|
* LLC : Logical Link Control.
|
||||||
* LLM : Large Language Model.
|
* LLM : Large Language Model.
|
||||||
* LMI : Local Management Interface.
|
* LMI : Local Management Interface.
|
||||||
* LMI : Lutte contre la Manipulation de l'Information
|
* LMI : Lutte contre la Manipulation de l'Information.
|
||||||
|
* LoTL : Living off The Land.
|
||||||
|
* LSA : Local Security Authority.
|
||||||
* LSR : Label Switching Router.
|
* LSR : Label Switching Router.
|
||||||
* LTE : Long Term Evolution.
|
* LTE : Long Term Evolution.
|
||||||
|
|
||||||
## M
|
## M
|
||||||
* MA : Mobile Allocation.
|
* MA : Mobile Allocation.
|
||||||
|
* MAC : Mandatory Access Control.
|
||||||
* MAC : Media Access Control.
|
* MAC : Media Access Control.
|
||||||
* MAEC - Malware Attribute Enumeration and Characteriza-tion.
|
* MAC : Message Authentication Code.
|
||||||
|
* MAEC : Malware Attribute Enumeration and Characterization.
|
||||||
* MAIO : Mobile Allocation Index Offset.
|
* MAIO : Mobile Allocation Index Offset.
|
||||||
* MAN : Metropolitan Area Network.
|
* MAN : Metropolitan Area Network.
|
||||||
* MBR : Master Boot Record.
|
* MBR : Master Boot Record.
|
||||||
* MCC : Mobile Country Code.
|
* MCC : Mobile Country Code.
|
||||||
* MD5 : Message Digest 5.
|
* MD5 : Message Digest 5.
|
||||||
|
* MDM : Mobile Device Management.
|
||||||
|
* MDR : Manage Detection and Response.
|
||||||
|
* MFA : Multi-Factor Authentication.
|
||||||
* MGCF : Media Gateway Control Function.
|
* MGCF : Media Gateway Control Function.
|
||||||
* MIB (SNMP) : Management Information Base.
|
* MIB (SNMP) : Management Information Base.
|
||||||
|
* MIC : Message Integrity Check.
|
||||||
* MIC : Modulation par Impulsions Codées.
|
* MIC : Modulation par Impulsions Codées.
|
||||||
* MIME : Multipurpose Internet Mail Extensions.
|
* MIME : Multipurpose Internet Mail Extensions.
|
||||||
* MIMO : Multiple Input / Multiple Output.
|
* MIMO : Multiple Input / Multiple Output.
|
||||||
|
* MIPS : Menace Informatique et Pratique de Sécurité.
|
||||||
* MISO : Multiple In / Single Out.
|
* MISO : Multiple In / Single Out.
|
||||||
|
* MITM : Man In The Middle.
|
||||||
* MNC : Mobile Network Code.
|
* MNC : Mobile Network Code.
|
||||||
* MMF : Multimode Fiber.
|
* MMF : Multimode Fiber.
|
||||||
* MMS : Multimedia Messaging Service.
|
* MMS : Multimedia Messaging Service.
|
||||||
@ -227,12 +388,15 @@ Les acronymes télécoms sont issus de l'excellent travail regroupé ici : [GLOT
|
|||||||
* MOA : Maitrise d'OuvrAge.
|
* MOA : Maitrise d'OuvrAge.
|
||||||
* MOE : Maitrise d’œuvre.
|
* MOE : Maitrise d’œuvre.
|
||||||
* MOSPF : Multicast extension Open Shortest Path First.
|
* MOSPF : Multicast extension Open Shortest Path First.
|
||||||
* MPLS - MultiProtocole Label Switching.
|
* MPLS : MultiProtocole Label Switching.
|
||||||
* MSC : Mobile Switching Center.
|
* MSC : Mobile Switching Center.
|
||||||
* MSIN : Mobile Subscriber Identification Number.
|
* MSIN : Mobile Subscriber Identification Number.
|
||||||
* MSISDN : Mobile station ISDN number.
|
* MSISDN : Mobile station ISDN number.
|
||||||
|
* MSSP : Managed Security Service Provider.
|
||||||
* MTA : Message Transfer Agent.
|
* MTA : Message Transfer Agent.
|
||||||
* MTBF : Mean Time Between Failure.
|
* MTBF : Mean Time Between Failure.
|
||||||
|
* MTTD : Mean Time To Detect.
|
||||||
|
* MTTR : Mean Time To Remediate.
|
||||||
* MTS : Message Transfer System.
|
* MTS : Message Transfer System.
|
||||||
* MTU : Maximum Transmission Unit.
|
* MTU : Maximum Transmission Unit.
|
||||||
* MVNO : Mobile Virtual Network Operator.
|
* MVNO : Mobile Virtual Network Operator.
|
||||||
@ -240,63 +404,100 @@ Les acronymes télécoms sont issus de l'excellent travail regroupé ici : [GLOT
|
|||||||
## N
|
## N
|
||||||
* NAC : Network Access Control.
|
* NAC : Network Access Control.
|
||||||
* NAP : Network Access Protection.
|
* NAP : Network Access Protection.
|
||||||
|
* NAP : Network Access Protocol.
|
||||||
* NAS : Network Access Server.
|
* NAS : Network Access Server.
|
||||||
* NAS : Network Attached Storage.
|
* NAS : Network Attached Storage.
|
||||||
* NAT : Network Address Translation.
|
* NAT : Network Address Translation.
|
||||||
* NAT- PT : Network Address Translation - Protocol Translator.
|
* NAT- PT : Network Address Translation - Protocol Translator.
|
||||||
* NBMA : Non-Broadcast Multi-Access.
|
* NBMA : Non-Broadcast Multi-Access.
|
||||||
* NCIRC : NATO Computer Incident Response Capability.
|
* NCIRC : NATO Computer Incident Response Capability.
|
||||||
* NEB : Numérisation de l’espace de bataille.
|
* NDA : Non-Disclosure Agreement.
|
||||||
|
* NDR : Network Detection and Response.
|
||||||
|
* NEB : Numérisation de l’Espace de Bataille.
|
||||||
* NFC : Near Field Communication.
|
* NFC : Near Field Communication.
|
||||||
* NFS : Network File System.
|
* NFS : Network File System.
|
||||||
* NIC : Network Information Center.
|
* NIC : Network Information Center.
|
||||||
* NIC : Network Interface card.
|
* NIC : Network Interface card.
|
||||||
* NIDP : Network Intrusion Detection and Prevention.
|
* NIDP : Network Intrusion Detection and Prevention.
|
||||||
* NIDS : Network Intrusion Detection System.
|
* NIDS : Network Intrusion Detection System.
|
||||||
|
* NIS : Network and Information Security.
|
||||||
|
* NIS2 : Network and Information Security v2.
|
||||||
* NIS : Network Information Services.
|
* NIS : Network Information Services.
|
||||||
* NIST : National Institute of Standards and Technology.
|
* NIST : National Institute of Standards and Technology.
|
||||||
* NMS : Network Management System.
|
* NMS : Network Management System.
|
||||||
* NNI : Network to Network Interface
|
* NNI : Network to Network Interface.
|
||||||
* NNTP : Network News transfert Protocol
|
* NNTP : Network News transfert Protocol.
|
||||||
|
* NOC : Network Operations Center.
|
||||||
|
* NPS : Network Policy Server.
|
||||||
* NRA : Nœud de Raccordement d’Abonné.
|
* NRA : Nœud de Raccordement d’Abonné.
|
||||||
* NRO : Nœud de Raccordement Optique.
|
* NRO : Nœud de Raccordement Optique.
|
||||||
* NSA : National Security Agency.
|
* NSA : National Security Agency.
|
||||||
* NSAP : Network Service Access Point.
|
* NSAP : Network Service Access Point.
|
||||||
* NSS : Network Sub System.
|
* NSS : Network Sub System.
|
||||||
* NSS : Network Security Services.
|
* NSS : Network Security Services.
|
||||||
|
* NTA : Network Traffic Analysis.
|
||||||
* NTI : Nœud de Transit International.
|
* NTI : Nœud de Transit International.
|
||||||
* NTIC - Nouvelles Technologies de l’Information et de la Communication.
|
* NTIC : Nouvelles Technologies de l’Information et de la Communication.
|
||||||
|
* NVD : National Vulnerability Database.
|
||||||
|
|
||||||
## O
|
## O
|
||||||
|
* OATH : Open AuTHentication.
|
||||||
|
* OAUth : Open AUthorization.
|
||||||
* OBL : Opérateur de Boucle Locale.
|
* OBL : Opérateur de Boucle Locale.
|
||||||
|
* OCF : Open Certification Framework.
|
||||||
|
* OCSP : Open Certificate Status Protocol.
|
||||||
* OFDM : Orthogonal Frequency Division Multiplexing.
|
* OFDM : Orthogonal Frequency Division Multiplexing.
|
||||||
* OIV : Opérateur d’importance vitale.
|
* OIV : Opérateur d’importance vitale.
|
||||||
* OLSR : Optimized Link State Routing Protocol.
|
* OLSR : Optimized Link State Routing Protocol.
|
||||||
* OMG : Object Management Group.
|
* OMG : Object Management Group.
|
||||||
* OODA : Observer, Orienter, Décider, Agir (Observe, Oriente, Decide, Act).
|
* OODA : Observer, Orienter, Décider, Agir (Observe, Oriente, Decide, Act).
|
||||||
|
* OpenSSL : Open Secure Socket Layer.
|
||||||
|
* OPSEC : OPerations SECurity.
|
||||||
* OS : Operating System.
|
* OS : Operating System.
|
||||||
* OSI (modèle) : Open System Interconnexion.
|
* OSCP : Offensive Security Certified Professional.
|
||||||
|
* OSI (modèle) : Open Systems Interconnection.
|
||||||
* OSI : Open Source Initiative.
|
* OSI : Open Source Initiative.
|
||||||
* OSPF : Open Shortest Path First.
|
* OSPF : Open Shortest Path First.
|
||||||
* OSS : Operating System and Service.
|
* OSS : Operating System and Service.
|
||||||
|
* OT : Operational Technology.
|
||||||
|
* OTP : One Time Password.
|
||||||
* OTAN : Organisation du traité de l’atlantique nord.
|
* OTAN : Organisation du traité de l’atlantique nord.
|
||||||
* OTP : One Time Pad.
|
* OTP : One Time Pad.
|
||||||
|
* OV : Organization Validation.
|
||||||
|
* OVAL : Open Vulnerability and Assessment Language.
|
||||||
|
* OWASP : Open Web Application Security Project.
|
||||||
|
|
||||||
## P
|
## P
|
||||||
|
* PAAS : Platform as a Service.
|
||||||
* PABX : Private Automatic Branch Exchange.
|
* PABX : Private Automatic Branch Exchange.
|
||||||
* PAN : Personal Area Network
|
* PACS : Prestataires d’Accompagnement et de Conseil en Sécurité des systèmes d’information.
|
||||||
|
* PAN : Personal Area Network.
|
||||||
|
* PAM : Privilege Access Management.
|
||||||
|
* PAMS : Prestataire d'Administration et de Maintenance Sécurisées.
|
||||||
* PAP : Password Authentication Protocol.
|
* PAP : Password Authentication Protocol.
|
||||||
|
* PASSI : Prestataire d'Audit en Sécurité des Systèmes d’Information.
|
||||||
* PBX : Private Branch Exchange.
|
* PBX : Private Branch Exchange.
|
||||||
* PCA : Plan de continuité d’activité.
|
* PCA : Plan de continuité d’activité.
|
||||||
* P-CSCF : Proxy Call Session Control Fonction
|
* PCI-DSS : Payment Card Industry Data Security Standard.
|
||||||
|
* PCI-SSC : Payment Card Industry Security Standards Council.
|
||||||
|
* P-CSCF : Proxy Call Session Control Fonction.
|
||||||
|
* PDIS : Prestataire en Détection des Incidents de Sécurité.
|
||||||
* PDN : Public Data Network.
|
* PDN : Public Data Network.
|
||||||
|
* PEAP : Protected Extensible Authentication Protocol.
|
||||||
|
* PFS : Perfect Forward Secrecy.
|
||||||
* PGP : Pretty Good Privacy.
|
* PGP : Pretty Good Privacy.
|
||||||
* PIN : Personnal Identification Number.
|
* PHI : Protect Health Information.
|
||||||
* PKI : Public Key Infrastructure.
|
* PIA : Privacy Impact Assessment.
|
||||||
|
* PII : Personaly Identifiable Information.
|
||||||
|
* PIN : Personal Identification Number.
|
||||||
* PKCS : Public Key Cryptography Standard.
|
* PKCS : Public Key Cryptography Standard.
|
||||||
|
* PKI : Public Key Infrastructure.
|
||||||
* PLMN : Public Land Mobile Network.
|
* PLMN : Public Land Mobile Network.
|
||||||
|
* PMK : Pairwise Master Key.
|
||||||
* PMR : Professional Mobile Radio.
|
* PMR : Professional Mobile Radio.
|
||||||
|
* PMS : Pre-Master Secret.
|
||||||
* PNNI : Private Network Network Interface.
|
* PNNI : Private Network Network Interface.
|
||||||
|
* PoC : Proof of Concept.
|
||||||
* PoP : Point of Presence.
|
* PoP : Point of Presence.
|
||||||
* POP3 : Post Office Protocol 3.
|
* POP3 : Post Office Protocol 3.
|
||||||
* POTS : Plain Old Telephone Service.
|
* POTS : Plain Old Telephone Service.
|
||||||
@ -304,32 +505,51 @@ Les acronymes télécoms sont issus de l'excellent travail regroupé ici : [GLOT
|
|||||||
* PPTP : Point-to-Point Tunneling Protocol.
|
* PPTP : Point-to-Point Tunneling Protocol.
|
||||||
* PRA : Plan de Reprise d’Activité.
|
* PRA : Plan de Reprise d’Activité.
|
||||||
* PRI : Primary Rate Interface.
|
* PRI : Primary Rate Interface.
|
||||||
|
* PRIS : Prestataires de Réponse aux Incidents de Sécurité.
|
||||||
|
* PSK : Pre-Shared Key.
|
||||||
|
* PSSI : Politique de Sécurité des Systèmes d'Information.
|
||||||
* PSTN : Public Switched Telephone Network.
|
* PSTN : Public Switched Telephone Network.
|
||||||
* PUK : PIN Unblocking Key.
|
* PUK : PIN Unblocking Key.
|
||||||
|
* PVID : Prestataires de Vérification d'Identité à Distance.
|
||||||
|
|
||||||
## Q
|
## Q
|
||||||
* QOS : Quality Of Service.
|
* QOS : Quality Of Service.
|
||||||
|
* QKD : Quantum Key Distribution.
|
||||||
|
|
||||||
## R
|
## R
|
||||||
|
* RADIUS : Remote Authentication Dial-In User Service.
|
||||||
|
* RAID : Redundant Array of Independent Disks.
|
||||||
* RAM : Random Access Memory
|
* RAM : Random Access Memory
|
||||||
* RARP : Reverse Address Resolution Protocol.
|
* RARP : Reverse Address Resolution Protocol.
|
||||||
* RAT : Remote Acces Trojan.
|
* RASP : Runtime Application Self-Protection.
|
||||||
|
* RAT : Remote Access Trojan.
|
||||||
* RAT : Remote Administration Tool.
|
* RAT : Remote Administration Tool.
|
||||||
|
* RBAC : Role-Based Access Control.
|
||||||
* RBL : Realtime Blackhole List.
|
* RBL : Realtime Blackhole List.
|
||||||
|
* RC4 : Rivest Cipher 4.
|
||||||
|
* RCE : Remote Code Execution.
|
||||||
* RFC : Request For Comment.
|
* RFC : Request For Comment.
|
||||||
* RFID : Radio Frequency Identification.
|
* RFID : Radio Frequency Identification.
|
||||||
|
* RGPD : Règlement Général pour la Protection des Données.
|
||||||
|
* RGS : Référentiel Général de Sécurité.
|
||||||
* RIC : Renseignement d’intérêt Cyber.
|
* RIC : Renseignement d’intérêt Cyber.
|
||||||
* RIP : Routing Information Protocol.
|
* RIP : Routing Information Protocol.
|
||||||
* RIR : Registre Internet Régionaux, Regional Internet Registry.
|
* RIR : Registre Internet Régionaux, Regional Internet Registry.
|
||||||
* RLC : Radio Link Control.
|
* RLC : Radio Link Control.
|
||||||
|
* RMF : Risk Management Framework.
|
||||||
|
* RNG : Random Number Generator.
|
||||||
* RNIS : Réseau Numérique à Intégration de Services.
|
* RNIS : Réseau Numérique à Intégration de Services.
|
||||||
* ROC : Renseignement d’Origine Cyber.
|
* ROC : Renseignement d’Origine Cyber.
|
||||||
* ROM : Read Only Memory.
|
* ROM : Read Only Memory.
|
||||||
|
* ROM : Return Of Mitigation.
|
||||||
|
* ROSI : Return On Security Investment.
|
||||||
* RPC : Remote Procedure Call.
|
* RPC : Remote Procedure Call.
|
||||||
* RSA : Rivest, Shamir, Adelman.
|
* RPO : Recovery Point Objective.
|
||||||
|
* RSA : Rivest, Shamir, Adleman.
|
||||||
* RSSI : Responsable de la Sécurité des Systèmes d’Information.
|
* RSSI : Responsable de la Sécurité des Systèmes d’Information.
|
||||||
* RSVP : Resource Reservation Protocol.
|
* RSVP : Resource Reservation Protocol.
|
||||||
* RTC : Réseau Téléphonique Commuté.
|
* RTC : Réseau Téléphonique Commuté.
|
||||||
|
* RTO : Recovery Time Objective.
|
||||||
* RTCP : Real-time Transport Control Protocol.
|
* RTCP : Real-time Transport Control Protocol.
|
||||||
* RTP : Real-time Transport Protocol.
|
* RTP : Real-time Transport Protocol.
|
||||||
* RTSP : Real Time Streaming Protocol.
|
* RTSP : Real Time Streaming Protocol.
|
||||||
|
|||||||
Загрузка…
x
Ссылка в новой задаче
Block a user