Dictionnaire_Cyber/1. Acronymes.md
KurtOlrik 87c6c02403
Update 1. Acronymes.md
Update ## E
2024-04-27 12:22:58 +02:00

558 строки
22 KiB
Markdown
Исходник Ответственный История

Этот файл содержит неоднозначные символы Юникода

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

---
title: Acronymes cyber & réseaux télécoms
date: 2024-04-21
---
Contribuez à la mise à jour de cette liste ici : [mise à jour](https://github.com/M82-project/Dictionnaire_Cyber_public/blob/main/2.%20Acronymes)
Les acronymes télécoms sont issus de l'excellent travail regroupé ici : [GLOTEL](http://abcdrfc.free.fr/ressources-vf/GLOTEL.html)
## Chiffre
* 2FA : Two Factor Authentication
* 3DES : Triple Data Encryption Standard
## A
* AAA : Authentication, Authorization, Accounting.
* ABAC : Attributed-Based Access Control.
* ABCDE : Actors, Behaviour, Content, Degree, Effect.
* ACL : Access Control List.
* ACM : Access Control Matrix.
* ACS : Annual Cost of Safeguard.
* ACSSI : Article Contrôlé de la Sécurité des Systèmes d'Information.
* AD : Active Directory.
* ADSL : Asymmetrical Digital Subscriber Line.
* AES : Advanced Encryption Standard.
* AET : Advanced Evasion Techniques.
* AFF : Advanced Forensic Format.
* AFNIC : Association Française pour le Nommage Internet en Coopération.
* AFNOR : Association Française de NORmalisation.
* AH : Authentication Header.
* AIPD : Analyse d'Impact sur la Protection des Données
* ALE : Annualized Loss Expectancy
* AMRC : Accès Multiple par répartition en code.
* AMRF : Accès Multiple par répartition en fréquence.
* AMRT : Accès multiple par répartition temporelle.
* ANFR : Agence Nationale des Fréquences.
* ANSSI : Agence Nationale de la Sécurité des Systèmes dInformation.
* AP : Access Point.
* API : Application Programming Interface.
* APT : Advanced Persistant Threat.
* ARO : Annualized Rate Of Occurence.
* ARP : Address Resolution Protocol.
* ARPANET : Advanced Research Projects Agency NETwork.
* ASCII : American Standard Code for Information Interchange.
* ASLR : Address Space Layout Randomizarion.
* ASVS : Application Security Verification Standard.
* ATT&CK : Adversarial Tactics, Techniques and Common Knowledge
* AuC : Authentication Center.
* AV : AntiVirus.
* AV : Asset Value.
* AV-NG : AntiVirus Next-Gen cf EDR, XDR
## B
* BAN : Body Area Network.
* BAS : Breach Attack Simulations.
* BEC : Business Email Compromise.
* BECN : Backward explicit congestion notification.
* BGP : Border Gateway Protocol.
* BI : Business Intelligence.
* BIA : Business Impact Analysis.
* BIOS : Basic Input Output System.
* BRP : Business Recovery Plan.
* BSC : Base Station Controller.
* BSIMM : Business Security in Maturity Model.
* BSS : Base Station Subsystem.
* BTS : Base Transceiver Station.
* BYOD : Bring Your Own Device.
* BYOE : Bring Your Own Encryption.
* BYOK : Bring Your Own Key.
## C
* C2 : Command and Control.
* CA : Certificate Auhority.
* CALID : Centre dAnalyse et de Lutte Informatique Défensive.
* CAPEC : Common Attack Pattern Enumeration and Classifica-tion.
* CAPTCHA : Completely Automated Public Turing test to tell Computers and Humans Apart
* CASB : Cloud Access Security Broker.
* CASE : Common Application Services Elements.
* CBAC : Context-Based Access Control.
* CBC : Cypher block chain.
* CBR : Constant Bit Rate.
* CC : Certified in Cybersecurity.
* CC : Common Criterias.
* CC : Creative Commons.
* CCC : Chaos Computer Club.
* CCM : Cloud Controls Matrix.
* CCMP : Counter-Mode/CBC-Mac protocol.
* CCRA : Cloud Computing Reference Architecture.
* CCSK : Cloud Computing Security Knowledge.
* CCTL : Common Criteria Testing Laboratories.
* CDMA : Code Division Multiple Access.
* CDN : Content Delivery Network.
* CEI : Commission Electrotechnique Internationale.
* CEN : Comité Européen de Normalisation.
* CERT : Computer Emergency Response Team.
* CESIN : Club des Experts de la Sécurité de l'Information et du Numérique.
* CFB : Cipher FeedBack Block.
* CFU : Call Forwarding Unconditional.
* CHAP : Challenge Handshake Authentication Protocol.
* CIDR : Classless Inter-Domain Routing.
* CIEM : Cloud Infrastructure Entitlement Management.
* CIRP : Cyber Incident Response Plan.
* CIS : Center for Internet Security.
* CISA : Certified Information Systems Auditor.
* CISA : Cybersecurity and Infrastructure Security Agency.
* CISO : Chief Information Security Officer.
* CISSP : Certified Information Systems Security Professional.
* CLUSIF : Club de la Sécurité de l'Information Français.
* CMM : Capability Maturity Model.
* CMMI : Capability Maturity Model Integration.
* CMS : Content Management System.
* CMS : Credential Management System.
* CNA : Computer Network Attack.
* CNAPP : Cloud Native Application Protection Plateform.
* CNE : Computer Network Exploitation.
* CNIL : Commission Nationale Informatique et Liberté.
* CNO : Computer Network Operation.
* COBIT : Control Objectives for Information and related Technology.
* COIN : Contre insurrection.
* COOP : Continuity Of Operations Plan.
* CORS : Cross-Origin Resource Sharing.
* COTS : Commercial Off-the-Shelf Software.
* CPE : Common Platform Enumeration.
* CPSO : Chief Product Security Officer.
* CPL : Courant Porteur en Ligne.
* CRL : Certificate Revocation List.
* CRLDP : Certificate Revocation List Distribution Point.
* CSA : Cloud Security Alliance.
* CSF : CyberSecurity Framework.
* CSIRT : Computer Security Incident Response Team.
* CSO : Chief Security Officer.
* CSO : Cloud Security Provider.
* CSP : Content Security Policy.
* CSPM : Cloud Security Posture Management.
* CSPN : Certification de Sécurité de Premier Niveau.
* CSR : Certificate Signing Request.
* CSRF : Cross Site Request Forgery.
* CSMA/CD : Carrier-Sense Multiple Access with Collision Detection.
* CSS : Cascading Style Sheets.
* CTI : Cyber Threat Intelligence.
* CTR : Common Technical Regulation.
* CVE : Common Vulnerabilities and Exposure.
* CVSS : Common Vulnerability Scoring System.
* CWE : Common Weakness Enumeration.
* CWPP : Cloud Workload Protection Platform.
* CWSS : Common Weakness Scoring System.
## D
* DAM : Database Activity Monitoring.
* DAST : Dynamic Application Security Testing.
* DARPA : Departement of Advanced Research Projects Agency.
* DCS : Digital Communication System.
* DDOS : Distributed Deny Of Service.
* DEA : Data Encryption Algorithm.
* DECT : Digital Enhanced Cordless Telecommunication.
* DEFCON : DEFense readiness CONdition.
* DEP : Data Execution Prevention.
* DES : Data Encryption Standard.
* DHCP : Dynamic Host Configuration Protocol.
* DKIM : DomainKeys Identified Mail.
* DLCI : Data Link Channel Identifier.
* DLL : Dynamic Link Library, bibliothéque de liens dynamique.
* DLP : Data Loss Prevention.
* DMARC : Domain Message Authentication Reporting and Conformance.
* DMZ : DeMilitarized Zone.
* DNS : Domain Name System.
* DNSSEC : Domain Name System Security Extensions.
* DOS : Deny Of Service.
* DPD : Délégué à la Protection des Données.
* DPI : Deep Packet Inspection.
* DPIA : Data Protection Impact Assessment.
* DPO : Data Protection Officer.
* DR : Disaster Recovery.
* DREAD : Damage Reproducibility Exploitability Affected users Discoverability.
* DRM : Digital Right Management.
* DRP : Disaster Recovery Plan.
* DSA : Digital Signature Algorithm.
* DSS : Digital Signature Standard.
* DTLS : Datagram Transport Layer Security.
* DV : Domain Validation.
## E
* E2EE : End-To-End Encryption.
* EAL : Evaluation Assurance Level.
* EAP : Extensible Authentication Protocol.
* EBIOS : Expression des Besoins et Identification des Objectifs de Sécurité.
* EBIOS RM : Expression des Besoins et Identification des Objectifs de Sécurité Risk Manager.
* ECC : Elliptic Curve Cryptography.
* ECDSA : Elliptic Curve Digital Signature Algorithm.
* EDR : Endpoint Detection and Response.
* EER : Equal Error Rate.
* EF : Exposure Fator.
* EFF : Electronic Fontier Foundation.
* EFS : Encryption File System.
* EGP : Exterior Gateway Protocol.
* eIDAS : electronic IDentification, Authentication and trust Services.
* EIGRP : Enhanced Interior Gateway Routing Protocol.
* EIR : Equipment Identity Register.
* EIR : Excess Information Rate.
* EIVP : Etude d'Impact sur la Vie Privée.
* ENISA : European Network for Information Security Agency.
* EPP : Endpoint Protection Platform.
* EPSS : Exploit Prediction Scoring System.
* ESN : Entreprise de Service du Numérique.
* ESP : Encapsulating Security Payload.
* ESSID : Extended Service Set Identifier.
* ETCD : Equipement de Terminaison de Circuits de Données.
* ETSI : European Telecommunications Standard Institute.
* ETTD : Equipement Terminal de Traitement de Données.
* EU5G : European Union 5G Cybersecurity Certification Scheme.
* EUCC : European Union Common Criteria.
* EUCS : European Union Cybersecurity Certification Scheme for Cloud Services.
* EV : Extended Validation.
## F
* FAI : Fournisseur dAccès à Internet.
* FDM : Frequency Division Multiplexing.
* FDMA : Frequency Division Multiple Access.
* FEC : Forwarding Equivalence Class.
* FECN : Forward Explicit Congestion Notification.
* FH : Frequency Hopping.
* FHSS : Frequency Hopping Spread Spectrum.
* FIFO : First in First out.
* FM : Frequency Modulation.
* FPS : Fast Packet Switching.
* FTP : File Transfert Protocol.
## G
* GAFAM : Google, Apple, Facebook, Amazon, Microsoft.
* GGSN : Gateway GPRS Support Node.
* GMSC : Gateway Mobile Switching Center.
* GMSK : Gaussian Minimum Shift Keying.
* GPRS : General Packet Radio Service.
* GRE : Generic Routing Encapsulation.
* GSM : Global System for Mobile Communications.
## H
* HD : Haut débit
* HDLC : Hight level Data Link Control.
* HIDS : Host Intrusion Detection System.
* HIPS : Host-based Intrusion Prevention System.
* HLR : Home Location Register.
* HSDPA : High Speed Download Packet Access
* HSN : Hopping Sequence Number.
* HSUPA : High Speed Uplink Packet Access.
* HTML : HyperText Markup Language.
* HTTP : Hypertext transfer protocol.
* HTTPS : Hypertext transfer protocol secured.
## I
* IAB : Internet Activities Board.
* IAB : Internet Architecture Board.
* IANA : Internet Assigned Numbers Authority.
* ICANN : Internet Corporation for Assigned Names and Num-bers.
* ICMP : Internet Control and error Message Protocol.
* IDoT : Identity of things.
* IDP : Internet Datagram Protocol
* IDS : Intrusion Detection Systems,
* IEC : International Electrotechnical Commission.
* IEEE : Institute of Electrical and Electronics Engineers.
* IETF : Internet Engineering Task Force.
* IGP : Interior Gateway Protocol.
* IHM : Interface Homme Machine.
* IMEI : International Mobile Station Equipment Identity.
* IMS : IP Multimédia Subsystem.
* IMSI : International Mobile Subscriber Identity.
* IMT 2000 : International Mobile Telecommunications 2000.
* IOT : Internet Of Things.
* IPBX : Internet Protocol-Private Branch Exchange.
* IPS - Intrusion Prevention System.
* IPSEC : Internet Protocole Security.
* IRTF : Internet Research Task Force.
* ISDN : Integrates Services Digital Network.
* IS-IS : Intermediate Sytem to Intermediate System.
* ISL : Inter Switch Link.
* ISO : International Standard Organisation.
* ISOC : Internet SOCiety.
* ISTAR : Intelligence, surveillance, target acquisition, and recon-naissance.
* ITA : Information Technology Agreement.
* ITIL : Information Technology Infrastructure Library.
* ITU : International Telecommunication Union.
* IXFR : Incremental Zone Transfer.
## J
* J2SE : Java 2 Standard Edition.
* J2EE : Java 2 Entreprise Edition.
* J2ME : Java 2 Micro Edition.
* JPEG : Joint Picture Expert Group.
* JS : Java Script.
* JSON : JavaScript Object Notation.
## L
* LA : Location Area.
* LAC : Location Area Code.
* LAI : Location Area Identification.
* LAN - Local Area Network.
* LAP - Link Access Protocol.
* LAPB : Link Access Protocol D-channel.
* LAPD : Link Access Protocol D-channel.
* LCP : Link Control Protocol.
* LDAP : Lightweight Directory Access Protocol.
* LDP : Label Distribution Protocol.
* LIB : Label Information Base.
* LID : Lutte Informatique Défensive.
* LII : Lutte Informatique d'Influence.
* LIO : Lutte Informatique Offensive.
* LiFi : Light Fidelity.
* LLC : Logical Link Control.
* LLM : Large Language Model.
* LMI : Local Management Interface.
* LMI : Lutte contre la Manipulation de l'Information
* LSR : Label Switching Router.
* LTE : Long Term Evolution.
## M
* MA : Mobile Allocation.
* MAC : Media Access Control.
* MAEC - Malware Attribute Enumeration and Characteriza-tion.
* MAIO : Mobile Allocation Index Offset.
* MAN : Metropolitan Area Network.
* MBR : Master Boot Record.
* MCC : Mobile Country Code.
* MD5 : Message Digest 5.
* MGCF : Media Gateway Control Function.
* MIB (SNMP) : Management Information Base.
* MIC : Modulation par Impulsions Codées.
* MIME : Multipurpose Internet Mail Extensions.
* MIMO : Multiple Input / Multiple Output.
* MISO : Multiple In / Single Out.
* MNC : Mobile Network Code.
* MMF : Multimode Fiber.
* MMS : Multimedia Messaging Service.
* MML : Man Machine Language.
* MOA : Maitrise d'OuvrAge.
* MOE : Maitrise dœuvre.
* MOSPF : Multicast extension Open Shortest Path First.
* MPLS - MultiProtocole Label Switching.
* MSC : Mobile Switching Center.
* MSIN : Mobile Subscriber Identification Number.
* MSISDN : Mobile station ISDN number.
* MTA : Message Transfer Agent.
* MTBF : Mean Time Between Failure.
* MTS : Message Transfer System.
* MTU : Maximum Transmission Unit.
* MVNO : Mobile Virtual Network Operator.
## N
* NAC : Network Access Control.
* NAP : Network Access Protection.
* NAS : Network Access Server.
* NAS : Network Attached Storage.
* NAT : Network Address Translation.
* NAT- PT : Network Address Translation - Protocol Translator.
* NBMA : Non-Broadcast Multi-Access.
* NCIRC : NATO Computer Incident Response Capability.
* NEB : Numérisation de lespace de bataille.
* NFC : Near Field Communication.
* NFS : Network File System.
* NIC : Network Information Center.
* NIC : Network Interface card.
* NIDP : Network Intrusion Detection and Prevention.
* NIDS : Network Intrusion Detection System.
* NIS : Network Information Services.
* NIST : National Institute of Standards and Technology.
* NMS : Network Management System.
* NNI : Network to Network Interface
* NNTP : Network News transfert Protocol
* NRA : Nœud de Raccordement dAbonné.
* NRO : Nœud de Raccordement Optique .
* NSA : National Security Agency.
* NSAP : Network Service Access Point.
* NSS : Network Sub System.
* NSS : Network Security Services.
* NTI : Nœud de Transit International.
* NTIC - Nouvelles Technologies de lInformation et de la Communication.
## O
* OBL : Opérateur de Boucle Locale.
* OFDM : Orthogonal Frequency Division Multiplexing.
* OIV : Opérateur dimportance vitale.
* OLSR : Optimized Link State Routing Protocol.
* OMG : Object Management Group.
* OODA : Observer, Orienter, Décider, Agir (Observe, Oriente, Decide, Act).
* OS : Operating System.
* OSI (modèle) : Open System Interconnexion.
* OSI : Open Source Initiative.
* OSPF : Open Shortest Path First.
* OSS : Operating System and Service.
* OTAN : Organisation du traité de latlantique nord.
* OTP : One Time Pad.
## P
* PABX : Private Automatic Branch Exchange.
* PAN : Personal Area Network
* PAP : Password Authentication Protocol.
* PBX : Private Branch Exchange.
* PCA : Plan de continuité dactivité.
* P-CSCF : Proxy Call Session Control Fonction
* PDN : Public Data Network.
* PGP : Pretty Good Privacy.
* PIN : Personnal Identification Number.
* PKI : Public Key Infrastructure.
* PKCS : Public Key Cryptography Standard.
* PLMN : Public Land Mobile Network.
* PMR : Professional Mobile Radio.
* PNNI : Private Network Network Interface.
* PoP : Point of Presence.
* POP3 : Post Office Protocol 3.
* POTS : Plain Old Telephone Service.
* PPP : Point to Point Protocol.
* PPTP : Point-to-Point Tunneling Protocol.
* PRA : Plan de Reprise dActivité.
* PRI : Primary Rate Interface.
* PSTN : Public Switched Telephone Network.
* PUK : PIN Unblocking Key.
## Q
* QOS : Quality Of Service.
## R
* RAM : Random Access Memory
* RARP : Reverse Address Resolution Protocol.
* RAT : Remote Acces Trojan.
* RAT : Remote Administration Tool.
* RBL : Realtime Blackhole List.
* RFC : Request For Comment.
* RFID : Radio Frequency Identification.
* RIC : Renseignement dintérêt Cyber.
* RIP : Routing Information Protocol.
* RIR : Registre Internet Régionaux, Regional Internet Registry.
* RLC : Radio Link Control.
* RNIS : Réseau Numérique à Intégration de Services.
* ROC : Renseignement dOrigine Cyber.
* ROM : Read Only Memory.
* RPC : Remote Procedure Call.
* RSA : Rivest, Shamir, Adelman.
* RSSI : Responsable de la Sécurité des Systèmes dInformation.
* RSVP : Resource Reservation Protocol.
* RTC : Réseau Téléphonique Commuté.
* RTCP : Real-time Transport Control Protocol.
* RTP : Real-time Transport Protocol.
* RTSP : Real Time Streaming Protocol.
## S
* S/MIME : Secure / Multipurpose Internet Mail Extensions.
* SA (Security Association) = association de sécurité.
* SA (Source Address) = adresse source;
* SA (Subnet Administrator) = administrateur de sous réseau (RFC4391);
* SABM (Set Asynchronous Balanced Mode) = mise en mode asynchrone équilibré (commande d'initialisation de protocole à la couche 2. Sauf mention contraire, SABM désigne aussi bien la forme simple que la forme étendue du message).
* SABM_ACK (Layer two acknowledgment to SABM) = acquittement de SABM à la couche 2.
* SAC (Service Access Code) = code d'accès au service ; 300 711.
* SAC (syntax-based arithmetic coding) = codage arithmétique syntaxique (H.263).
* SAC (Strict Avalanche Criterion) = critère strict d'avalanche (RFC2144).
* SACCH (Slow Associated Control Channel) = canal de signalisation associé lent ; GSM.
* SACCH/Cx (Slow, SDCCH/4 Associated, Control Channel) = canal de signalisation lent associé à un SDCCH/x ; GSM.
* SACCH/T (Slow, TCH-Associated, Control Channel) = canal de signalisation lent associé à un TCH ; GSM.
* SACF (single association control function) = fonction de contrôle à association unique ; fonction de contrôle dassociation simple.
* SACK (Selective Acknowledgment) = accusé de réception sélectif (RFC 2018).
* SACRED (Secure Availability of Credentials) = disponibilité sécurisée des accréditifs (RFC 3760).
* SAD (Security Association Database) = base de données d'association de sécurité (RFC3168).
* SADB (Security Association Database) = base de données des associations de sécurité (RFC3554).
* SAF (SACF auxiliary facility) = facilité auxiliaire de fonction SACF (X.862).
* SAFI (Subsequent Address Family Identifier) = identifiant de la famille d'adresse suivante (RFC 4760).
* SAI (Source Attachment Identifier) = identifiant de rattachement de source (RFC5003).
* SAI (satellite air interface) = trajet aérien par satellite.
* SAID (security association identifier) = identifiant d'association de sécurité.
* S-AIS (Section Alarm Indication Signal) = signal d'indication d'alarme sur la section.
* SAM (SCSI Architecture Model) = modèle darchitecture SCSI (RFC7143).
* SAM (subsequent address message) = message d'adresse à suivre ; RNIS/ISUP.
* SAML (Security Assertion Markup Language) = langage de balisage dassertion de sécurité (X.1142).
* SAN (Storage Area Networking/Network) = mise en réseau de zone de mémorisation/réseau à zone de mémorisation.
* SAN (Subject Alternative Name) = nom de remplacement de sujet (RFC4556).
* SAO (Single Association Objet) = objet d'association unique ; R.I.
* SAP : Service Advertising Protocol.
* SCADA : Supervisory Control And Data Acquisition.
* SDLC : Synchronous Data Link Control.
* SDMX : Statistical Data and MetaData eXchange.
* SDU : Service Data Unit.
* SGML : Standard Generalized Markup Language.
* SHA : Secure Hash Algorithm.
* SHTTP : Secure Hypertext Transfer Protocol.
* SIEM : Security Information and Event Management System.
* SIM : Subscriber Identity Mobile.
* SIP : Session Initiation Protocol.
* SMB : Server Message Block.
* SMF : Single Mode Fiber.
* SMS : Short Message Service.
* SMTP : Simple Mail Transfer Protocol.
* SNMP : Simple Network Management Protocol.
* SOA : Service Oriented Architecture.
* SOAP : Simple Object Access Protocol.
* SOC : Security Operations Center.
* SPX : Sequenced Packet eXchange.
* SQL : Structured Query Lanquage.
* SS7 : Signaling System 7.
* SSH : Secure Shell.
* SSO : Single Sign On.
* SSID : Service Set IDentifier.
* SSII : Société de Service et dIngénierie Informatique.
* SSL : Secure Socket Layer.
* SSL/TLS : Secure Socket Layer/Transport Layer Security.
* SSO : Single Sign-On.
* STAD : Système de traitement automatisé de données.
* STIX : Structured Threat Information eXpression.
## T
* TA : Time Advance.
* TAXII : Trusted Automated of Indicator Information.
* TCP : Transmission Control Protocol.
* TD/CDMA : Time Division / CDMA.
* TDM : Time Division Multiplexing.
* TDMA : Time Division Multiple Access.
* TKIP : Temporal Key Integrity Protocol.
* TLD : Top Level Domain.
* TLP : Tear Line Protocol.
* TOR : The Onion Router.
* TRAU : Transcoding Rate and Adaptation Unit.
* TTL : Time-To-Live.
* TTP : Tactique Technique Procedure.
## U
* UAC : Unified Access Control.
* UCS: Universal Character Set.
* UDP : User Datagram Protocol.
* UIT : Union Internationale des Télécommunications.
* UMTS : Universal Mobile Telecommunication System.
* UMTS -TDD : Universal Mobile Telecommunication System Time Division Duplex.
* UNI : User to Network Interface.
* URI : Uniform Resource Identifier.
* URL : Uniform Resource Locator.
* URN : Uniform Ressource Name.
* USB : Universal Serial Bus.
* USENET : UNIX user network.
* UTF: Unicode Transformation Format.
## V
* VBR : Variable bit rate.
* VLAN : Virtual Local Area Network.
* VLR : Visitor Location Register.
* VLSM - Variable-Length Subnet Mask.
* VOD : Video On Demand.
* VPN : Virtual Private Network.
* VPS : Virtual Private Server.
* VSAT : Very Small Aperture Terminal.
## W
* W3C : World Wide Web Consortium.
* WAN : Wide Area Network.
* WAP : Wireless Application Protocol.
* WCDMA : Wideband Code Division Multiple Access.
* WEP : Wired Equivalent Privacy.
* WLAN : Wireless Local Area Network.
* WPA : Wi-Fi Protected Access.
* WPAN : Wireless Personnal Area Network.
* WWW : World Wide Web.
## X
* XKMS : XML key management system.
* XLL : eXtensible Link Language.
* XML : eXtensible Markup Language.