зеркало из
				https://github.com/M82-project/Dictionnaire_Cyber.git
				synced 2025-10-30 05:26:09 +02:00 
			
		
		
		
	
		
			
				
	
	
		
			760 строки
		
	
	
		
			29 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			760 строки
		
	
	
		
			29 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
| ---
 | ||
| title: Acronymes cyber & réseaux télécoms
 | ||
| date: 2024-04-21
 | ||
| ---
 | ||
| 
 | ||
| Contribuez à la mise à jour de cette liste ici : [mise à jour](https://github.com/M82-project/Dictionnaire_Cyber_public/blob/main/2.%20Acronymes)
 | ||
| Les acronymes télécoms sont issus de l'excellent travail regroupé ici : [GLOTEL](http://abcdrfc.free.fr/ressources-vf/GLOTEL.html)
 | ||
| ## Chiffre 
 | ||
| * 2FA : Two Factor Authentication
 | ||
| * 3DES : Triple Data Encryption Standard
 | ||
| 
 | ||
| ## A
 | ||
| * AAA : Authentication, Authorization, Accounting.
 | ||
| * ABAC : Attributed-Based Access Control.
 | ||
| * ABCDE : Actors, Behaviour, Content, Degree, Effect.
 | ||
| * ACL : Access Control List.
 | ||
| * ACM : Access Control Matrix.
 | ||
| * ACS : Annual Cost of Safeguard.
 | ||
| * ACSSI : Article Contrôlé de la Sécurité des Systèmes d'Information.
 | ||
| * AD : Active Directory.
 | ||
| * ADSL : Asymmetrical Digital Subscriber Line.
 | ||
| * AES : Advanced Encryption Standard.
 | ||
| * AET : Advanced Evasion Techniques.
 | ||
| * AFF : Advanced Forensic Format.
 | ||
| * AFNIC : Association Française pour le Nommage Internet en Coopération.
 | ||
| * AFNOR : Association Française de NORmalisation.
 | ||
| * AH : Authentication Header.
 | ||
| * AIPD : Analyse d'Impact sur la Protection des Données
 | ||
| * ALE : Annualized Loss Expectancy
 | ||
| * AMRC : Accès Multiple par répartition en code.
 | ||
| * AMRF : Accès Multiple par répartition en fréquence.
 | ||
| * AMRT : Accès multiple par répartition temporelle.
 | ||
| * ANFR : Agence Nationale des Fréquences.
 | ||
| * ANSSI : Agence Nationale de la Sécurité des Systèmes d’Information.
 | ||
| * AP : Access Point.
 | ||
| * API : Application Programming Interface.
 | ||
| * APT : Advanced Persistant Threat.
 | ||
| * ARO : Annualized Rate Of Occurence.
 | ||
| * ARP : Address Resolution Protocol. 
 | ||
| * ARPANET : Advanced Research Projects Agency NETwork.
 | ||
| * ASCII : American Standard Code for Information Interchange.
 | ||
| * ASLR : Address Space Layout Randomizarion.
 | ||
| * ASVS : Application Security Verification Standard.
 | ||
| * ATT&CK : Adversarial Tactics, Techniques and Common Knowledge
 | ||
| * AuC : Authentication Center.
 | ||
| * AV : AntiVirus.
 | ||
| * AV : Asset Value.
 | ||
| * AV-NG : AntiVirus Next-Gen cf EDR, XDR
 | ||
|   
 | ||
| ## B
 | ||
| * BAN : Body Area Network.
 | ||
| * BAS : Breach Attack Simulations.
 | ||
| * BEC : Business Email Compromise.
 | ||
| * BECN : Backward explicit congestion notification.
 | ||
| * BGP : Border Gateway Protocol.
 | ||
| * BI : Business Intelligence.
 | ||
| * BIA : Business Impact Analysis.
 | ||
| * BIOS : Basic Input Output System.
 | ||
| * BRP : Business Recovery Plan.
 | ||
| * BSC : Base Station Controller.
 | ||
| * BSIMM : Business Security in Maturity Model.
 | ||
| * BSS : Base Station Subsystem.
 | ||
| * BTS : Base Transceiver Station.
 | ||
| * BYOD : Bring Your Own Device.
 | ||
| * BYOE : Bring Your Own Encryption.
 | ||
| * BYOK : Bring Your Own Key.
 | ||
| 
 | ||
| ## C
 | ||
| * C2 : Command and Control.
 | ||
| * CA : Certificate Auhority.
 | ||
| * CALID : Centre d’Analyse et de Lutte Informatique Défensive.
 | ||
| * CAPEC : Common Attack Pattern Enumeration and Classifica-tion.
 | ||
| * CAPTCHA : Completely Automated Public Turing test to tell Computers and Humans Apart
 | ||
| * CASB : Cloud Access Security Broker.
 | ||
| * CASE : Common Application Services Elements.
 | ||
| * CBAC : Context-Based Access Control.
 | ||
| * CBC : Cypher block chain.
 | ||
| * CBR : Constant Bit Rate.
 | ||
| * CC : Certified in Cybersecurity.
 | ||
| * CC : Common Criterias.
 | ||
| * CC : Creative Commons.
 | ||
| * CCC : Chaos Computer Club.
 | ||
| * CCM : Cloud Controls Matrix.
 | ||
| * CCMP : Counter-Mode/CBC-Mac protocol.
 | ||
| * CCRA : Cloud Computing Reference Architecture.
 | ||
| * CCSK : Cloud Computing Security Knowledge.
 | ||
| * CCTL : Common Criteria Testing Laboratories.
 | ||
| * CDMA : Code Division Multiple Access.
 | ||
| * CDN : Content Delivery Network.
 | ||
| * CEI : Commission Electrotechnique Internationale.
 | ||
| * CEN : Comité Européen de Normalisation.
 | ||
| * CERT : Computer Emergency Response Team.
 | ||
| * CESIN : Club des Experts de la Sécurité de l'Information et du Numérique.
 | ||
| * CFB : Cipher FeedBack Block.
 | ||
| * CFU : Call Forwarding Unconditional.
 | ||
| * CHAP : Challenge Handshake Authentication Protocol.
 | ||
| * CIDR : Classless Inter-Domain Routing.
 | ||
| * CIEM : Cloud Infrastructure Entitlement Management.
 | ||
| * CIRP : Cyber Incident Response Plan.
 | ||
| * CIS : Center for Internet Security.
 | ||
| * CISA : Certified Information Systems Auditor.
 | ||
| * CISA : Cybersecurity and Infrastructure Security Agency.
 | ||
| * CISO : Chief Information Security Officer.
 | ||
| * CISSP : Certified Information Systems Security Professional.
 | ||
| * CLUSIF : Club de la Sécurité de l'Information Français.
 | ||
| * CMM : Capability Maturity Model.
 | ||
| * CMMI : Capability Maturity Model Integration.
 | ||
| * CMS : Content Management System.
 | ||
| * CMS : Credential Management System.
 | ||
| * CNA : Computer Network Attack.
 | ||
| * CNAPP : Cloud Native Application Protection Plateform.
 | ||
| * CNE : Computer Network Exploitation.
 | ||
| * CNIL : Commission Nationale Informatique et Liberté.
 | ||
| * CNO : Computer Network Operation.
 | ||
| * COBIT : Control Objectives for Information and related Technology.
 | ||
| * COIN : Contre insurrection.
 | ||
| * COOP : Continuity Of Operations Plan.
 | ||
| * CORS : Cross-Origin Resource Sharing.
 | ||
| * COTS : Commercial Off-the-Shelf Software.
 | ||
| * CPE : Common Platform Enumeration.
 | ||
| * CPSO : Chief Product Security Officer.
 | ||
| * CPL : Courant Porteur en Ligne.
 | ||
| * CRL : Certificate Revocation List.
 | ||
| * CRLDP : Certificate Revocation List Distribution Point.
 | ||
| * CSA : Cloud Security Alliance.
 | ||
| * CSF : CyberSecurity Framework.
 | ||
| * CSIRT : Computer Security Incident Response Team.
 | ||
| * CSO : Chief Security Officer.
 | ||
| * CSO : Cloud Security Provider.
 | ||
| * CSP : Content Security Policy.
 | ||
| * CSPM : Cloud Security Posture Management.
 | ||
| * CSPN : Certification de Sécurité de Premier Niveau.
 | ||
| * CSR : Certificate Signing Request.
 | ||
| * CSRF : Cross Site Request Forgery.
 | ||
| * CSMA/CD : Carrier-Sense Multiple Access with Collision Detection.
 | ||
| * CSS : Cascading Style Sheets.
 | ||
| * CTI : Cyber Threat Intelligence.
 | ||
| * CTR : Common Technical Regulation.
 | ||
| * CVE : Common Vulnerabilities and Exposure.
 | ||
| * CVSS : Common Vulnerability Scoring System.
 | ||
| * CWE : Common Weakness Enumeration.
 | ||
| * CWPP : Cloud Workload Protection Platform.
 | ||
| * CWSS : Common Weakness Scoring System.
 | ||
| 
 | ||
| ## D
 | ||
| * DAM : Database Activity Monitoring.
 | ||
| * DAST : Dynamic Application Security Testing.
 | ||
| * DARPA : Departement of Advanced Research Projects Agency.
 | ||
| * DCS : Digital Communication System.
 | ||
| * DDOS : Distributed Deny Of Service.
 | ||
| * DEA : Data Encryption Algorithm.
 | ||
| * DECT : Digital Enhanced Cordless Telecommunication.
 | ||
| * DEFCON : DEFense readiness CONdition.
 | ||
| * DEP : Data Execution Prevention.
 | ||
| * DES : Data Encryption Standard.
 | ||
| * DHCP : Dynamic Host Configuration Protocol.
 | ||
| * DKIM : DomainKeys Identified Mail.
 | ||
| * DLCI : Data Link Channel Identifier.
 | ||
| * DLL : Dynamic Link Library, bibliothéque de liens dynamique.
 | ||
| * DLP : Data Loss Prevention.
 | ||
| * DMARC : Domain Message Authentication Reporting and Conformance.
 | ||
| * DMZ : DeMilitarized Zone.
 | ||
| * DNS : Domain Name System.
 | ||
| * DNSSEC : Domain Name System Security Extensions.
 | ||
| * DOS : Deny Of Service.
 | ||
| * DPD : Délégué à la Protection des Données.
 | ||
| * DPI : Deep Packet Inspection.
 | ||
| * DPIA : Data Protection Impact Assessment.
 | ||
| * DPO : Data Protection Officer.
 | ||
| * DR : Disaster Recovery.
 | ||
| * DREAD : Damage Reproducibility Exploitability Affected users Discoverability.
 | ||
| * DRM : Digital Right Management.
 | ||
| * DRP : Disaster Recovery Plan.
 | ||
| * DSA : Digital Signature Algorithm.
 | ||
| * DSS : Digital Signature Standard.
 | ||
| * DTLS : Datagram Transport Layer Security.
 | ||
| * DV : Domain Validation.
 | ||
| 
 | ||
| ## E
 | ||
| * E2EE : End-To-End Encryption.
 | ||
| * EAL : Evaluation Assurance Level.
 | ||
| * EAP : Extensible Authentication Protocol.
 | ||
| * EBIOS : Expression des Besoins et Identification des Objectifs de Sécurité.
 | ||
| * EBIOS RM : Expression des Besoins et Identification des Objectifs de Sécurité Risk Manager.
 | ||
| * ECC : Elliptic Curve Cryptography.
 | ||
| * ECDSA : Elliptic Curve Digital Signature Algorithm.
 | ||
| * EDR : Endpoint Detection and Response.
 | ||
| * EER : Equal Error Rate.
 | ||
| * EF : Exposure Fator.
 | ||
| * EFF : Electronic Fontier Foundation.
 | ||
| * EFS : Encryption File System.
 | ||
| * EGP : Exterior Gateway Protocol.
 | ||
| * eIDAS : electronic IDentification, Authentication and trust Services.
 | ||
| * EIGRP : Enhanced Interior Gateway Routing Protocol.
 | ||
| * EIR : Equipment Identity Register.
 | ||
| * EIR : Excess Information Rate.
 | ||
| * EIVP : Etude d'Impact sur la Vie Privée.
 | ||
| * ENISA : European Network for Information Security Agency.
 | ||
| * EPP : Endpoint Protection Platform.
 | ||
| * EPSS : Exploit Prediction Scoring System.
 | ||
| * ESN : Entreprise de Service du Numérique.
 | ||
| * ESP : Encapsulating Security Payload.
 | ||
| * ESSID : Extended Service Set Identifier.
 | ||
| * ETCD : Equipement de Terminaison de Circuits de Données.
 | ||
| * ETSI : European Telecommunications Standard Institute.
 | ||
| * ETTD : Equipement Terminal de Traitement de Données.
 | ||
| * EU5G : European Union 5G Cybersecurity Certification Scheme.
 | ||
| * EUCC : European Union Common Criteria.
 | ||
| * EUCS : European Union Cybersecurity Certification Scheme for Cloud Services.
 | ||
| * EV : Extended Validation.
 | ||
|   
 | ||
| ## F
 | ||
| * FAI : Fournisseur d’Accès à Internet.
 | ||
| * FDM : Frequency Division Multiplexing.
 | ||
| * FDE : Full Disk Encryption.
 | ||
| * FDMA : Frequency Division Multiple Access.
 | ||
| * FEC : Forwarding Equivalence Class.
 | ||
| * FECN : Forward Explicit Congestion Notification.
 | ||
| * FEK : File Encryption Key.
 | ||
| * FH : Frequency Hopping.
 | ||
| * FHSS : Frequency Hopping Spread Spectrum.
 | ||
| * FIDO : Fast IDentity Online Alliance.
 | ||
| * FIDO2 : Fast IDentity Online Alliance v2.
 | ||
| * FIFO : First in First out.
 | ||
| * FIPS : Federal Information Processing Standard.
 | ||
| * FIRST : Forum of Incident Response and Security Teams.
 | ||
| * FM : Frequency Modulation.
 | ||
| * FPS : Fast Packet Switching.
 | ||
| * FTP : File Transfert Protocol.
 | ||
| * FVEK : File Volume Encryption key.
 | ||
| * FW : FireWall.
 | ||
| 
 | ||
| ## G
 | ||
| * GAFAM : Google, Apple, Facebook, Amazon, Microsoft.
 | ||
| * GDPR : General Data Protection Regulation.
 | ||
| * GGSN : Gateway GPRS Support Node.
 | ||
| * GMSC : Gateway Mobile Switching Center.
 | ||
| * GMSK : Gaussian Minimum Shift Keying.
 | ||
| * GPG : GNU Privacy Guard.
 | ||
| * GPO : Group Policy Object.
 | ||
| * GPRS : General Packet Radio Service.
 | ||
| * GRC : Gouvernance Risk management and Compliance.
 | ||
| * GRE : Generic Routing Encapsulation.
 | ||
| * GSM : Global System for Mobile Communications.
 | ||
| 
 | ||
| ## H
 | ||
| * HD : Haut Débit.
 | ||
| * HDLC : Hight level Data Link Control.
 | ||
| * HIDS : Host-based Intrusion Detection System.
 | ||
| * HIPS : Host-based Intrusion Prevention System.
 | ||
| * HLR : Home Location Register.
 | ||
| * HMAC : Hash-based Message Authentication Code.
 | ||
| * HOTP : HMAC-based One time Password.
 | ||
| * HSDPA : High Speed Download Packet Access.
 | ||
| * HSM : Hardware Security Module.
 | ||
| * HSN : Hopping Sequence Number.
 | ||
| * HSUPA : High Speed Uplink Packet Access.
 | ||
| * HTML : HyperText Markup Language.
 | ||
| * HTTP : HyperText Transfer Protocol.
 | ||
| * HTTPS : HyperText Transfer Protocol Secured.
 | ||
| 
 | ||
| ## I
 | ||
| * IaaS : Infrastructure as a Service.
 | ||
| * IAB : Internet Activities Board.
 | ||
| * IAB : Internet Architecture Board.
 | ||
| * IAM : Identity and Access Management.
 | ||
| * IANA : Internet Assigned Numbers Authority.
 | ||
| * IAST : Interactive Application Security Test.
 | ||
| * ICANN : Internet Corporation for Assigned Names and Numbers.
 | ||
| * ICMP : Internet Control and error Message Protocol.
 | ||
| * ICP : Infrastructure à Clé Publique.
 | ||
| * IDoT : IDentity of things.
 | ||
| * IDP : Internet Datagram Protocol.
 | ||
| * IDS : Intrusion Detection Systems.
 | ||
| * IEC : International Electrotechnical Commission.
 | ||
| * IEEE : Institute of Electrical and Electronics Engineers.
 | ||
| * IETF : Internet Engineering Task Force.
 | ||
| * IGC : Infrastructure de Gestion de Clés.
 | ||
| * IGP : Interior Gateway Protocol.
 | ||
| * IHM : Interface Homme Machine.
 | ||
| * IKE : Internet key Exchange.
 | ||
| * IMEI : International Mobile Station Equipment Identity.
 | ||
| * IMS : IP Multimédia Subsystem.
 | ||
| * IMSI : International Mobile Subscriber Identity.
 | ||
| * IMT 2000 : International Mobile Telecommunications 2000.
 | ||
| * IoA : Indicator of Attack.
 | ||
| * IoC : Indicator of Compromise.
 | ||
| * IOT : Internet Of Things.
 | ||
| * IP : Internet Protocol.
 | ||
| * IPBX : Internet Protocol-Private Branch Exchange.
 | ||
| * IPS : Intrusion Prevention System.
 | ||
| * IPsec : Internet Protocol Security.
 | ||
| * IR : Incident Response.
 | ||
| * IRT : Incident Response Team.
 | ||
| * IRTF : Internet Research Task Force.
 | ||
| * IS : Information Security.
 | ||
| * ISAKMP : Internet Security Association and Key Management Protocol
 | ||
| * ISC2 : International Information Systems Security Certification Consortium.
 | ||
| * ISCM : Information Security Continuous Monitoring.
 | ||
| * ISDN : Integrates Services Digital Network.
 | ||
| * IS-IS : Intermediate Sytem to Intermediate System.
 | ||
| * ISL : Inter Switch Link.
 | ||
| * ISMS : Information Security Management System.
 | ||
| * ISO : International Standard Organisation.
 | ||
| * ISOC : Internet SOCiety.
 | ||
| * ISTAR : Intelligence, Surveillance, Target Acquisition, and Reconnaissance.
 | ||
| * IT : Information Technology.
 | ||
| * ITA : Information Technology Agreement.
 | ||
| * ITIL : Information Technology Infrastructure Library.
 | ||
| * ITU : International Telecommunication Union.
 | ||
| * ITSEC : Information Technology Security Evaluation Criteria.
 | ||
| * IV : Initialization Vector.
 | ||
| * IXFR : Incremental Zone Transfer.
 | ||
| 
 | ||
| ## J
 | ||
| * J2SE : Java 2 Standard Edition.
 | ||
| * J2EE : Java 2 Entreprise Edition.
 | ||
| * J2ME : Java 2 Micro Edition.
 | ||
| * JPEG : Joint Picture Expert Group.
 | ||
| * JS : JavaScript.
 | ||
| * JSON : JavaScript Object Notation.
 | ||
| 
 | ||
| ## K
 | ||
| * KDC : Key Distribution Center.
 | ||
| * KDK : Key Derivation Function.
 | ||
| * KEK : Key Encryption Key.
 | ||
| * KMIP : Key Management Interoperability Protocol.
 | ||
| * KMS : Key Management System.
 | ||
| * KRACK : Key Reinstallation AttaCK.
 | ||
| * KRI : Key Risk Indicator.
 | ||
| 
 | ||
| ## L
 | ||
| * L2I : Lutte Informatique d'Influence.
 | ||
| * L2TP : Layer 2 Tunneling Protocol.
 | ||
| * LA : Location Area.
 | ||
| * LAC : Location Area Code.
 | ||
| * LAI : Location Area Identification.
 | ||
| * LAN - Local Area Network.
 | ||
| * LAP - Link Access Protocol.
 | ||
| * LAPB : Link Access Protocol D-channel.
 | ||
| * LAPD : Link Access Protocol D-channel.
 | ||
| * LCP : Link Control Protocol.
 | ||
| * LDAP : Lightweight Directory Access Protocol.
 | ||
| * LDP : Label Distribution Protocol.
 | ||
| * LEAP : Lightweight Extensible Authentication Protocol.
 | ||
| * LFI : Local File Inclusion.
 | ||
| * LIB : Label Information Base.
 | ||
| * LID : Lutte Informatique Défensive.
 | ||
| * LII : Lutte Informatique d'Influence.
 | ||
| * LIO : Lutte Informatique Offensive.
 | ||
| * LiFi : Light Fidelity.
 | ||
| * LLC : Logical Link Control.
 | ||
| * LLM : Large Language Model.
 | ||
| * LMI : Local Management Interface.
 | ||
| * LMI : Lutte contre la Manipulation de l'Information.
 | ||
| * LoTL : Living off The Land.
 | ||
| * LSA : Local Security Authority.
 | ||
| * LSR : Label Switching Router.
 | ||
| * LTE : Long Term Evolution.
 | ||
| 
 | ||
| ## M 
 | ||
| * MA : Mobile Allocation.
 | ||
| * MAC : Mandatory Access Control.
 | ||
| * MAC : Media Access Control.
 | ||
| * MAC : Message Authentication Code.
 | ||
| * MAEC : Malware Attribute Enumeration and Characterization.
 | ||
| * MAIO : Mobile Allocation Index Offset.
 | ||
| * MAN : Metropolitan Area Network.
 | ||
| * MBR : Master Boot Record.
 | ||
| * MCC : Mobile Country Code.
 | ||
| * MD5 : Message Digest 5.
 | ||
| * MDM : Mobile Device Management.
 | ||
| * MDR : Manage Detection and Response.
 | ||
| * MFA : Multi-Factor Authentication.
 | ||
| * MGCF : Media Gateway Control Function.
 | ||
| * MIB (SNMP) : Management Information Base.
 | ||
| * MIC : Message Integrity Check.
 | ||
| * MIC : Modulation par Impulsions Codées.
 | ||
| * MIME : Multipurpose Internet Mail Extensions.
 | ||
| * MIMO : Multiple Input / Multiple Output.
 | ||
| * MIPS : Menace Informatique et Pratique de Sécurité.
 | ||
| * MISO : Multiple In / Single Out.
 | ||
| * MITM : Man In The Middle.
 | ||
| * MNC : Mobile Network Code.
 | ||
| * MMF : Multimode Fiber.
 | ||
| * MMS : Multimedia Messaging Service.
 | ||
| * MML : Man Machine Language.
 | ||
| * MOA : Maitrise d'OuvrAge.
 | ||
| * MOE : Maitrise d’œuvre.
 | ||
| * MOSPF : Multicast extension Open Shortest Path First.
 | ||
| * MPLS : MultiProtocole Label Switching.
 | ||
| * MSC : Mobile Switching Center.
 | ||
| * MSIN : Mobile Subscriber Identification Number.
 | ||
| * MSISDN : Mobile station ISDN number.
 | ||
| * MSSP : Managed Security Service Provider. 
 | ||
| * MTA : Message Transfer Agent.
 | ||
| * MTBF : Mean Time Between Failure.
 | ||
| * MTTD : Mean Time To Detect.
 | ||
| * MTTR : Mean Time To Remediate.
 | ||
| * MTS : Message Transfer System.
 | ||
| * MTU : Maximum Transmission Unit.
 | ||
| * MVNO : Mobile Virtual Network Operator.
 | ||
| 
 | ||
| ## N
 | ||
| * NAC : Network Access Control.
 | ||
| * NAP : Network Access Protection.
 | ||
| * NAP : Network Access Protocol.
 | ||
| * NAS : Network Access Server.
 | ||
| * NAS : Network Attached Storage.
 | ||
| * NAT : Network Address Translation.
 | ||
| * NAT- PT : Network Address Translation - Protocol Translator.
 | ||
| * NBMA : Non-Broadcast Multi-Access.
 | ||
| * NCIRC : NATO Computer Incident Response Capability.
 | ||
| * NDA : Non-Disclosure Agreement.
 | ||
| * NDR : Network Detection and Response.
 | ||
| * NEB : Numérisation de l’Espace de Bataille.
 | ||
| * NFC : Near Field Communication.
 | ||
| * NFS : Network File System.
 | ||
| * NIC : Network Information Center.
 | ||
| * NIC : Network Interface card.
 | ||
| * NIDP : Network Intrusion Detection and Prevention.
 | ||
| * NIDS : Network Intrusion Detection System.
 | ||
| * NIS : Network and Information Security.
 | ||
| * NIS2 : Network and Information Security v2.
 | ||
| * NIS : Network Information Services.
 | ||
| * NIST : National Institute of Standards and Technology.
 | ||
| * NMS : Network Management System.
 | ||
| * NNI : Network to Network Interface.
 | ||
| * NNTP : Network News transfert Protocol.
 | ||
| * NOC : Network Operations Center.
 | ||
| * NPS : Network Policy Server.
 | ||
| * NRA : Nœud de Raccordement d’Abonné.
 | ||
| * NRO : Nœud de Raccordement Optique.
 | ||
| * NSA : National Security Agency.
 | ||
| * NSAP : Network Service Access Point.
 | ||
| * NSS : Network Sub System.
 | ||
| * NSS : Network Security Services.
 | ||
| * NTA : Network Traffic Analysis.
 | ||
| * NTI : Nœud de Transit International.
 | ||
| * NTIC : Nouvelles Technologies de l’Information et de la Communication.
 | ||
| * NVD : National Vulnerability Database. 
 | ||
| 
 | ||
| ## O
 | ||
| * OATH : Open AuTHentication.
 | ||
| * OAUth : Open AUthorization.
 | ||
| * OBL : Opérateur de Boucle Locale.
 | ||
| * OCF : Open Certification Framework.
 | ||
| * OCSP : Open Certificate Status Protocol.
 | ||
| * OFDM : Orthogonal Frequency Division Multiplexing.
 | ||
| * OIV : Opérateur d’importance vitale.
 | ||
| * OLSR : Optimized Link State Routing Protocol.
 | ||
| * OMG : Object Management Group.
 | ||
| * OODA : Observer, Orienter, Décider, Agir (Observe, Oriente, Decide, Act).
 | ||
| * OpenSSL : Open Secure Socket Layer.
 | ||
| * OPSEC : OPerations SECurity.
 | ||
| * OS : Operating System.
 | ||
| * OSCP : Offensive Security Certified Professional.
 | ||
| * OSI (modèle) : Open Systems Interconnection.
 | ||
| * OSI : Open Source Initiative.
 | ||
| * OSPF : Open Shortest Path First.
 | ||
| * OSS : Operating System and Service.
 | ||
| * OT : Operational Technology.
 | ||
| * OTP : One Time Password.
 | ||
| * OTAN : Organisation du traité de l’atlantique nord.
 | ||
| * OTP : One Time Pad.
 | ||
| * OV : Organization Validation.
 | ||
| * OVAL : Open Vulnerability and Assessment Language.
 | ||
| * OWASP : Open Web Application Security Project.
 | ||
| 
 | ||
| ## P
 | ||
| * PAAS : Platform as a Service.
 | ||
| * PABX : Private Automatic Branch Exchange.
 | ||
| * PACS : Prestataires d’Accompagnement et de Conseil en Sécurité des systèmes d’information.
 | ||
| * PAN : Personal Area Network.
 | ||
| * PAM : Privilege Access Management.
 | ||
| * PAMS : Prestataire d'Administration et de Maintenance Sécurisées.
 | ||
| * PAP : Password Authentication Protocol.
 | ||
| * PASSI : Prestataire d'Audit en Sécurité des Systèmes d’Information.
 | ||
| * PBX : Private Branch Exchange.
 | ||
| * PCA : Plan de continuité d’activité.
 | ||
| * PCI-DSS : Payment Card Industry Data Security Standard.
 | ||
| * PCI-SSC : Payment Card Industry Security Standards Council.
 | ||
| * P-CSCF : Proxy Call Session Control Fonction.
 | ||
| * PDIS : Prestataire en Détection des Incidents de Sécurité.
 | ||
| * PDN : Public Data Network.
 | ||
| * PEAP : Protected Extensible Authentication Protocol.
 | ||
| * PFS : Perfect Forward Secrecy.
 | ||
| * PGP : Pretty Good Privacy.
 | ||
| * PHI : Protect Health Information.
 | ||
| * PIA : Privacy Impact Assessment.
 | ||
| * PII : Personaly Identifiable Information.
 | ||
| * PIN : Personal Identification Number.
 | ||
| * PKCS : Public Key Cryptography Standard.
 | ||
| * PKI : Public Key Infrastructure.
 | ||
| * PLMN : Public Land Mobile Network.
 | ||
| * PMK : Pairwise Master Key.
 | ||
| * PMR : Professional Mobile Radio.
 | ||
| * PMS : Pre-Master Secret.
 | ||
| * PNNI : Private Network Network Interface.
 | ||
| * PoC : Proof of Concept.
 | ||
| * PoP : Point of Presence.
 | ||
| * POP3 : Post Office Protocol 3.
 | ||
| * POTS : Plain Old Telephone Service.
 | ||
| * PPP : Point to Point Protocol.
 | ||
| * PPTP : Point-to-Point Tunneling Protocol.
 | ||
| * PRA : Plan de Reprise d’Activité.
 | ||
| * PRI : Primary Rate Interface.
 | ||
| * PRIS : Prestataires de Réponse aux Incidents de Sécurité.
 | ||
| * PSK : Pre-Shared Key.
 | ||
| * PSSI : Politique de Sécurité des Systèmes d'Information.
 | ||
| * PSTN : Public Switched Telephone Network.
 | ||
| * PUK : PIN Unblocking Key.
 | ||
| * PVID : Prestataires de Vérification d'Identité à Distance. 
 | ||
| 
 | ||
| ## Q
 | ||
| * QOS : Quality Of Service.
 | ||
| * QKD : Quantum Key Distribution.
 | ||
| 
 | ||
| ## R
 | ||
| * RADIUS : Remote Authentication Dial-In User Service.
 | ||
| * RAID : Redundant Array of Independent Disks.
 | ||
| * RAM : Random Access Memory
 | ||
| * RARP : Reverse Address Resolution Protocol.
 | ||
| * RASP : Runtime Application Self-Protection.
 | ||
| * RAT : Remote Access Trojan.
 | ||
| * RAT : Remote Administration Tool.
 | ||
| * RBAC : Role-Based Access Control.
 | ||
| * RBL : Realtime Blackhole List.
 | ||
| * RC4 : Rivest Cipher 4.
 | ||
| * RCE : Remote Code Execution.
 | ||
| * RFC : Request For Comment.
 | ||
| * RFID : Radio Frequency Identification.
 | ||
| * RGPD : Règlement Général pour la Protection des Données.
 | ||
| * RGS : Référentiel Général de Sécurité.
 | ||
| * RIC : Renseignement d’intérêt Cyber.
 | ||
| * RIP : Routing Information Protocol.
 | ||
| * RIR : Registre Internet Régionaux, Regional Internet Registry.
 | ||
| * RLC : Radio Link Control.
 | ||
| * RMF : Risk Management Framework.
 | ||
| * RNG : Random Number Generator.
 | ||
| * RNIS : Réseau Numérique à Intégration de Services.
 | ||
| * ROC : Renseignement d’Origine Cyber.
 | ||
| * ROM : Read Only Memory.
 | ||
| * ROM : Return Of Mitigation.
 | ||
| * ROSI : Return On Security Investment.
 | ||
| * RPC : Remote Procedure Call.
 | ||
| * RPO : Recovery Point Objective.
 | ||
| * RSA : Rivest, Shamir, Adleman.
 | ||
| * RSSI : Responsable de la Sécurité des Systèmes d’Information.
 | ||
| * RSVP : Resource Reservation Protocol.
 | ||
| * RTC : Réseau Téléphonique Commuté.
 | ||
| * RTO : Recovery Time Objective.
 | ||
| * RTCP : Real-time Transport Control Protocol.
 | ||
| * RTP : Real-time Transport Protocol.
 | ||
| * RTSP : Real Time Streaming Protocol.
 | ||
| 
 | ||
| ## S
 | ||
| * S/MIME : Secure / Multipurpose Internet Mail Extensions.
 | ||
| * SA : Security Association.
 | ||
| * SA : Source Address.
 | ||
| * SA (Subnet Administrator) = administrateur de sous réseau (RFC4391).
 | ||
| * SaaS : Software as a Service.
 | ||
| * SABM (Set Asynchronous Balanced Mode) = mise en mode asynchrone équilibré (commande d'initialisation de protocole à la couche 2. Sauf mention contraire, SABM désigne aussi bien la forme simple que la forme étendue du message).
 | ||
| * SABM_ACK (Layer two acknowledgment to SABM) = acquittement de SABM à la couche 2.
 | ||
| * SAC (Service Access Code) = code d'accès au service.
 | ||
| * SAC (syntax-based arithmetic coding) = codage arithmétique syntaxique (H.263).
 | ||
| * SAC (Strict Avalanche Criterion) = critère strict d'avalanche (RFC2144).
 | ||
| * SACCH (Slow Associated Control Channel) = canal de signalisation associé lent ; GSM.
 | ||
| * SACCH/Cx (Slow, SDCCH/4 Associated, Control Channel) = canal de signalisation lent associé à un SDCCH/x ; GSM.
 | ||
| * SACCH/T (Slow, TCH-Associated, Control Channel) = canal de signalisation lent associé à un TCH ; GSM.
 | ||
| * SACF (single association control function) = fonction de contrôle à association unique ; fonction de contrôle d’association simple.
 | ||
| * SACK (Selective Acknowledgment) = accusé de réception sélectif (RFC 2018).
 | ||
| * SACRED (Secure Availability of Credentials) = disponibilité sécurisée des accréditifs (RFC 3760).
 | ||
| * SAD (Security Association Database) = base de données d'association de sécurité (RFC3168).
 | ||
| * SADB (Security Association Database) = base de données des associations de sécurité (RFC3554).
 | ||
| * SAE : Simultaneous Authentication as Equals.
 | ||
| * SAF (SACF auxiliary facility) = facilité auxiliaire de fonction SACF (X.862).
 | ||
| * SAFI (Subsequent Address Family Identifier) = identifiant de la famille d'adresse suivante (RFC 4760).
 | ||
| * SAI (Source Attachment Identifier) = identifiant de rattachement de source (RFC5003).
 | ||
| * SAI (satellite air interface) = trajet aérien par satellite.
 | ||
| * SAID (security association identifier) = identifiant d'association de sécurité.
 | ||
| * S-AIS (Section Alarm Indication Signal) = signal d'indication d'alarme sur la section.
 | ||
| * SAM (SCSI Architecture Model) = modèle d’architecture SCSI (RFC7143).
 | ||
| * SAM (subsequent address message) = message d'adresse à suivre ; RNIS/ISUP.
 | ||
| * SAML (Security Assertion Markup Language) = langage de balisage d’assertion de sécurité (X.1142).
 | ||
| * SAN (Storage Area Networking/Network) = mise en réseau de zone de mémorisation/réseau à zone de mémorisation.
 | ||
| * SAN (Subject Alternative Name) = nom de remplacement de sujet (RFC4556).
 | ||
| * SAO (Single Association Objet) = objet d'association unique ; R.I.
 | ||
| * SAP : Service Advertising Protocol.
 | ||
| * SCADA : Supervisory Control And Data Acquisition.
 | ||
| * SCAP : Security Content Automation Protocol.
 | ||
| * SCIM : System for Cross-domain Identity Management.
 | ||
| * SCRM : Supply Chain Risk Management.
 | ||
| * SDL : Software Development Lifecycle.
 | ||
| * SDLC : Synchronous Data Link Control.
 | ||
| * SDLC : Software Development Life Cycle.
 | ||
| * SDMX : Statistical Data and MetaData eXchange.
 | ||
| * SDN : Software-Defined Networks.
 | ||
| * SDO : Software Delivery Objective. 
 | ||
| * SDU : Service Data Unit.
 | ||
| * SD-WAN : Software Defined Wide Area Network.
 | ||
| * SecaaS : Security as a Service.
 | ||
| * SGDSN : Secrétariat Général de la Défense et de la Sécurité Nationale.
 | ||
| * SGML : Standard Generalized Markup Language.
 | ||
| * SH : Safe Harbor.
 | ||
| * SHA : Secure Hash Algorithm.
 | ||
| * SHA-1 : Secure Hash Algorithm-1.
 | ||
| * SHA-2 : Secure Hash Algorithm-2.
 | ||
| * SHA-3 : Secure Hash Algorithm-3.
 | ||
| * SHTTP : Secure Hypertext Transfer Protocol.
 | ||
| * SIEM : Security Information and Event Management.
 | ||
| * SIM : Subscriber Identity Mobile.
 | ||
| * SIP : Session Initiation Protocol.
 | ||
| * SKIP : Simple Key Management for Internet Protocol.
 | ||
| * SLA : Service Level Agreement.
 | ||
| * SLE : Single-Loss Expectancy.
 | ||
| * SLR : Service Level Requirement
 | ||
| * SMB : Server Message Block.
 | ||
| * SMF : Single Mode Fiber.
 | ||
| * SMS : Short Message Service.
 | ||
| * SMSI : Système de Management de la Sécurité de l'Information.
 | ||
| * SMTP : Simple Mail Transfer Protocol.
 | ||
| * SNMP : Simple Network Management Protocol.
 | ||
| * SOA : Service Oriented Architecture.
 | ||
| * SOAP : Simple Object Access Protocol.
 | ||
| * SOAR : Security Orchestration Automation and Response.
 | ||
| * SOC : Security Operations Center.
 | ||
| * SOD : Separation of Duties.
 | ||
| * SOD : Segregation of Duties.
 | ||
| * SOP : Same Origin Policy.
 | ||
| * SPD : Security Policy Database.
 | ||
| * SPF : Sender Policy Framework.
 | ||
| * SPI : Sensitive Personal Information.
 | ||
| * SPI : Stateful Packet Inspection.
 | ||
| * SPI : Security Parameter Index.
 | ||
| * SPML : Service Provisioning Markup Language.
 | ||
| * SPOX : Single Point of Failure.
 | ||
| * SPX : Sequenced Packet eXchange.
 | ||
| * SQL : Structured Query Lanquage.
 | ||
| * SQLI : Structured Query Lanquage Injection.
 | ||
| * SS7 : Signaling System 7.
 | ||
| * S-SDLC : Secure Software Development Life Cycle.
 | ||
| * SSE : Security Service Edge.
 | ||
| * SSH : Secure Shell.
 | ||
| * SSID : Service Set IDentifier.
 | ||
| * SSO : Single Sign On.
 | ||
| * SSID : Service Set IDentifier.
 | ||
| * SSII : Société de Service et d’Ingénierie Informatique.
 | ||
| * SSL : Secure Socket Layer.
 | ||
| * SSL/TLS : Secure Socket Layer/Transport Layer Security.
 | ||
| * SSO : Single Sign-On.
 | ||
| * SSPM : SaaS Security Posture Management.
 | ||
| * SSRF :  Server-Side Request Forgery.
 | ||
| * SSTP : Secure Socket Tunneling Protocol.
 | ||
| * STAD : Système de Traitement Automatisé de Données.
 | ||
| * STAR : Security, Trust and Assurance Registry.
 | ||
| * STIX : Structured Threat Information eXpression.
 | ||
| * STRIDE : Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege.
 | ||
| * STS : Security Token Service.
 | ||
| * SWG : Secure Web Gateway.
 | ||
| 
 | ||
| ## T
 | ||
| * TA : Threat Agent.
 | ||
| * TA : Time Advance.
 | ||
| * TAXII : Trusted Automated eXchange of Intelligence Information.
 | ||
| * TCB : Trusted Computing Base.
 | ||
| * TCP : Transmission Control Protocol.
 | ||
| * TD/CDMA : Time Division / CDMA.
 | ||
| * TDE : Transparent Data Encryption.
 | ||
| * TDEA : Transparent Data Encryption Algorithm.
 | ||
| * TDM : Time Division Multiplexing.
 | ||
| * TDMA : Time Division Multiple Access.
 | ||
| * TKIP : Temporal Key Integrity Protocol.
 | ||
| * TLD : Top Level Domain.
 | ||
| * TLP : Tear Line Protocol.
 | ||
| * TLP : Traffic Light Protocol.
 | ||
| * TLS : Transport Layer Security.
 | ||
| * TOC : Time Of Change.
 | ||
| * TOCTOU : Time Of Check Time Of Use.
 | ||
| * TOU : Time Of Use.
 | ||
| * TOR : The Onion Router.
 | ||
| * TOTP : Time-based One Time Password.
 | ||
| * TPM : Trusted Platform Module.
 | ||
| * TRAU : Transcoding Rate and Adaptation Unit.
 | ||
| * TTL : Time-To-Live.
 | ||
| * TTP : Tactics Techniques and Procedures.
 | ||
| 
 | ||
| ## U
 | ||
| * U2F : Universal Second Factor.
 | ||
| * UAC : User Account Contro.
 | ||
| * UAC : Unified Access Control.
 | ||
| * UAF : Universal Authentication Framework.
 | ||
| * UCS: Universal Character Set.
 | ||
| * UDP : User Datagram Protocol.
 | ||
| * UEBA : User and Entity Behavior Analytics.
 | ||
| * UIT : Union Internationale des Télécommunications.
 | ||
| * UMTS : Universal Mobile Telecommunication System.
 | ||
| * UMTS -TDD : Universal Mobile Telecommunication System Time Division Duplex.
 | ||
| * UNI : User to Network Interface.
 | ||
| * UPS : Uninterruptible Power Supply.
 | ||
| * URI : Uniform Resource Identifier.
 | ||
| * URL : Uniform Resource Locator.
 | ||
| * URN : Uniform Ressource Name.
 | ||
| * USB : Universal Serial Bus.
 | ||
| * USENET : UNIX user network.
 | ||
| * UTF: Unicode Transformation Format.
 | ||
| * UTM : Unified Threat Management.
 | ||
| 
 | ||
| ## V
 | ||
| * VBR : Variable Bit Rate.
 | ||
| * VLAN : Virtual Local Area Network.
 | ||
| * VLR : Visitor Location Register.
 | ||
| * VLSM : Variable-Length Subnet Mask.
 | ||
| * VMK : Volume Master Key.
 | ||
| * VOD : Video On Demand.
 | ||
| * VoIP : Voice over Internet Protocol.
 | ||
| * VPN : Virtual Private Network.
 | ||
| * VPS : Virtual Private Server.
 | ||
| * VSAT : Very Small Aperture Terminal.
 | ||
| * VXLAN : Virtual Extensible Local Area Network.
 | ||
| 
 | ||
| ## W
 | ||
| * W3C : World Wide Web Consortium.
 | ||
| * WAAP : Web Application and API Protection.
 | ||
| * WAAS : Wide Area Augmentation System.
 | ||
| * WAF : Web Application Firewall.
 | ||
| * WAN : Wide Area Network.
 | ||
| * WAP : Wireless Application Protocol.
 | ||
| * WCDMA : Wideband Code Division Multiple Access.
 | ||
| * WEP : Wired Equivalent Privacy.
 | ||
| * WLAN : Wireless Local Area Network.
 | ||
| * WORM : Write Once Read Many.
 | ||
| * WPA : Wi-Fi Protected Access.
 | ||
| * WPA2 : Wi-Fi Protected Access 2.
 | ||
| * WPA3 : Wi-Fi Protected Access 3.
 | ||
| * WPAN : Wireless Personnal Area Network.
 | ||
| * WPS : Wi-Fi Protected Setup.
 | ||
| * WRT : Work Recovery Time.
 | ||
| * WWW : World Wide Web.
 | ||
| 
 | ||
| ## X
 | ||
| * XACML : eXtensible Access Control Markup Language.
 | ||
| * XDR : eXtended Detection and Response.
 | ||
| * XKMS : XML key management system.
 | ||
| * XLL : eXtensible Link Language.
 | ||
| * XML : eXtensible Markup Language.
 | ||
| * XSRF : Cross Site Request Forgery.
 | ||
| * XSS : Cross Site Scripting.
 | ||
| 
 | ||
| ## Y
 | ||
| * YAML : Yet Another Markup Language.
 | ||
| * YARA : Yet Another Recursive Acronym.
 | ||
| 
 | ||
| ## Z
 | ||
| * ZKF : Zero-Knowledge Proof.
 | ||
| * ZKF : Zero-Knowledge Protocol.
 | ||
| * ZT : Zero Trust.
 | ||
| * ZTA : Zero Trust Architecture.
 | ||
| * ZTNA : Zero Trust Network Architecture.
 | 
