зеркало из
https://github.com/M82-project/Dictionnaire_Cyber.git
synced 2025-10-29 21:16:14 +02:00
24 KiB
24 KiB
| title | date |
|---|---|
| Acronymes cyber & réseaux télécoms | 2024-04-21 |
Contribuez à la mise à jour de cette liste ici : mise à jour Les acronymes télécoms sont issus de l'excellent travail regroupé ici : GLOTEL
Chiffre
- 2FA : Two Factor Authentication
- 3DES : Triple Data Encryption Standard
A
- AAA : Authentication, Authorization, Accounting.
- ABAC : Attributed-Based Access Control.
- ABCDE : Actors, Behaviour, Content, Degree, Effect.
- ACL : Access Control List.
- ACM : Access Control Matrix.
- ACS : Annual Cost of Safeguard.
- ACSSI : Article Contrôlé de la Sécurité des Systèmes d'Information.
- AD : Active Directory.
- ADSL : Asymmetrical Digital Subscriber Line.
- AES : Advanced Encryption Standard.
- AET : Advanced Evasion Techniques.
- AFF : Advanced Forensic Format.
- AFNIC : Association Française pour le Nommage Internet en Coopération.
- AFNOR : Association Française de NORmalisation.
- AH : Authentication Header.
- AIPD : Analyse d'Impact sur la Protection des Données
- ALE : Annualized Loss Expectancy
- AMRC : Accès Multiple par répartition en code.
- AMRF : Accès Multiple par répartition en fréquence.
- AMRT : Accès multiple par répartition temporelle.
- ANFR : Agence Nationale des Fréquences.
- ANSSI : Agence Nationale de la Sécurité des Systèmes d’Information.
- AP : Access Point.
- API : Application Programming Interface.
- APT : Advanced Persistant Threat.
- ARO : Annualized Rate Of Occurence.
- ARP : Address Resolution Protocol.
- ARPANET : Advanced Research Projects Agency NETwork.
- ASCII : American Standard Code for Information Interchange.
- ASLR : Address Space Layout Randomizarion.
- ASVS : Application Security Verification Standard.
- ATT&CK : Adversarial Tactics, Techniques and Common Knowledge
- AuC : Authentication Center.
- AV : AntiVirus.
- AV : Asset Value.
- AV-NG : AntiVirus Next-Gen cf EDR, XDR
B
- BAN : Body Area Network.
- BAS : Breach Attack Simulations.
- BEC : Business Email Compromise.
- BECN : Backward explicit congestion notification.
- BGP : Border Gateway Protocol.
- BI : Business Intelligence.
- BIA : Business Impact Analysis.
- BIOS : Basic Input Output System.
- BRP : Business Recovery Plan.
- BSC : Base Station Controller.
- BSIMM : Business Security in Maturity Model.
- BSS : Base Station Subsystem.
- BTS : Base Transceiver Station.
- BYOD : Bring Your Own Device.
- BYOE : Bring Your Own Encryption.
- BYOK : Bring Your Own Key.
C
- C2 : Command and Control.
- CA : Certificate Auhority.
- CALID : Centre d’Analyse et de Lutte Informatique Défensive.
- CAPEC : Common Attack Pattern Enumeration and Classifica-tion.
- CAPTCHA : Completely Automated Public Turing test to tell Computers and Humans Apart
- CASB : Cloud Access Security Broker.
- CASE : Common Application Services Elements.
- CBAC : Context-Based Access Control.
- CBC : Cypher block chain.
- CBR : Constant Bit Rate.
- CC : Certified in Cybersecurity.
- CC : Common Criterias.
- CC : Creative Commons.
- CCC : Chaos Computer Club.
- CCM : Cloud Controls Matrix.
- CCMP : Counter-Mode/CBC-Mac protocol.
- CCRA : Cloud Computing Reference Architecture.
- CCSK : Cloud Computing Security Knowledge.
- CCTL : Common Criteria Testing Laboratories.
- CDMA : Code Division Multiple Access.
- CDN : Content Delivery Network.
- CEI : Commission Electrotechnique Internationale.
- CEN : Comité Européen de Normalisation.
- CERT : Computer Emergency Response Team.
- CESIN : Club des Experts de la Sécurité de l'Information et du Numérique.
- CFB : Cipher FeedBack Block.
- CFU : Call Forwarding Unconditional.
- CHAP : Challenge Handshake Authentication Protocol.
- CIDR : Classless Inter-Domain Routing.
- CIEM : Cloud Infrastructure Entitlement Management.
- CIRP : Cyber Incident Response Plan.
- CIS : Center for Internet Security.
- CISA : Certified Information Systems Auditor.
- CISA : Cybersecurity and Infrastructure Security Agency.
- CISO : Chief Information Security Officer.
- CISSP : Certified Information Systems Security Professional.
- CLUSIF : Club de la Sécurité de l'Information Français.
- CMM : Capability Maturity Model.
- CMMI : Capability Maturity Model Integration.
- CMS : Content Management System.
- CMS : Credential Management System.
- CNA : Computer Network Attack.
- CNAPP : Cloud Native Application Protection Plateform.
- CNE : Computer Network Exploitation.
- CNIL : Commission Nationale Informatique et Liberté.
- CNO : Computer Network Operation.
- COBIT : Control Objectives for Information and related Technology.
- COIN : Contre insurrection.
- COOP : Continuity Of Operations Plan.
- CORS : Cross-Origin Resource Sharing.
- COTS : Commercial Off-the-Shelf Software.
- CPE : Common Platform Enumeration.
- CPSO : Chief Product Security Officer.
- CPL : Courant Porteur en Ligne.
- CRL : Certificate Revocation List.
- CRLDP : Certificate Revocation List Distribution Point.
- CSA : Cloud Security Alliance.
- CSF : CyberSecurity Framework.
- CSIRT : Computer Security Incident Response Team.
- CSO : Chief Security Officer.
- CSO : Cloud Security Provider.
- CSP : Content Security Policy.
- CSPM : Cloud Security Posture Management.
- CSPN : Certification de Sécurité de Premier Niveau.
- CSR : Certificate Signing Request.
- CSRF : Cross Site Request Forgery.
- CSMA/CD : Carrier-Sense Multiple Access with Collision Detection.
- CSS : Cascading Style Sheets.
- CTI : Cyber Threat Intelligence.
- CTR : Common Technical Regulation.
- CVE : Common Vulnerabilities and Exposure.
- CVSS : Common Vulnerability Scoring System.
- CWE : Common Weakness Enumeration.
- CWPP : Cloud Workload Protection Platform.
- CWSS : Common Weakness Scoring System.
D
- DAM : Database Activity Monitoring.
- DAST : Dynamic Application Security Testing.
- DARPA : Departement of Advanced Research Projects Agency.
- DCS : Digital Communication System.
- DDOS : Distributed Deny Of Service.
- DEA : Data Encryption Algorithm.
- DECT : Digital Enhanced Cordless Telecommunication.
- DEFCON : DEFense readiness CONdition.
- DEP : Data Execution Prevention.
- DES : Data Encryption Standard.
- DHCP : Dynamic Host Configuration Protocol.
- DKIM : DomainKeys Identified Mail.
- DLCI : Data Link Channel Identifier.
- DLL : Dynamic Link Library, bibliothéque de liens dynamique.
- DLP : Data Loss Prevention.
- DMARC : Domain Message Authentication Reporting and Conformance.
- DMZ : DeMilitarized Zone.
- DNS : Domain Name System.
- DNSSEC : Domain Name System Security Extensions.
- DOS : Deny Of Service.
- DPD : Délégué à la Protection des Données.
- DPI : Deep Packet Inspection.
- DPIA : Data Protection Impact Assessment.
- DPO : Data Protection Officer.
- DR : Disaster Recovery.
- DREAD : Damage Reproducibility Exploitability Affected users Discoverability.
- DRM : Digital Right Management.
- DRP : Disaster Recovery Plan.
- DSA : Digital Signature Algorithm.
- DSS : Digital Signature Standard.
- DTLS : Datagram Transport Layer Security.
- DV : Domain Validation.
E
- E2EE : End-To-End Encryption.
- EAL : Evaluation Assurance Level.
- EAP : Extensible Authentication Protocol.
- EBIOS : Expression des Besoins et Identification des Objectifs de Sécurité.
- EBIOS RM : Expression des Besoins et Identification des Objectifs de Sécurité Risk Manager.
- ECC : Elliptic Curve Cryptography.
- ECDSA : Elliptic Curve Digital Signature Algorithm.
- EDR : Endpoint Detection and Response.
- EER : Equal Error Rate.
- EF : Exposure Fator.
- EFF : Electronic Fontier Foundation.
- EFS : Encryption File System.
- EGP : Exterior Gateway Protocol.
- eIDAS : electronic IDentification, Authentication and trust Services.
- EIGRP : Enhanced Interior Gateway Routing Protocol.
- EIR : Equipment Identity Register.
- EIR : Excess Information Rate.
- EIVP : Etude d'Impact sur la Vie Privée.
- ENISA : European Network for Information Security Agency.
- EPP : Endpoint Protection Platform.
- EPSS : Exploit Prediction Scoring System.
- ESN : Entreprise de Service du Numérique.
- ESP : Encapsulating Security Payload.
- ESSID : Extended Service Set Identifier.
- ETCD : Equipement de Terminaison de Circuits de Données.
- ETSI : European Telecommunications Standard Institute.
- ETTD : Equipement Terminal de Traitement de Données.
- EU5G : European Union 5G Cybersecurity Certification Scheme.
- EUCC : European Union Common Criteria.
- EUCS : European Union Cybersecurity Certification Scheme for Cloud Services.
- EV : Extended Validation.
F
- FAI : Fournisseur d’Accès à Internet.
- FDM : Frequency Division Multiplexing.
- FDE : Full Disk Encryption.
- FDMA : Frequency Division Multiple Access.
- FEC : Forwarding Equivalence Class.
- FECN : Forward Explicit Congestion Notification.
- FEK : File Encryption Key.
- FH : Frequency Hopping.
- FHSS : Frequency Hopping Spread Spectrum.
- FIDO : Fast IDentity Online Alliance.
- FIDO2 : Fast IDentity Online Alliance v2.
- FIFO : First in First out.
- FIPS : Federal Information Processing Standard.
- FIRST : Forum of Incident Response and Security Teams.
- FM : Frequency Modulation.
- FPS : Fast Packet Switching.
- FTP : File Transfert Protocol.
- FVEK : File Volume Encryption key.
- FW : FireWall.
G
- GAFAM : Google, Apple, Facebook, Amazon, Microsoft.
- GDPR : General Data Protection Regulation.
- GGSN : Gateway GPRS Support Node.
- GMSC : Gateway Mobile Switching Center.
- GMSK : Gaussian Minimum Shift Keying.
- GPG : GNU Privacy Guard.
- GPO : Group Policy Object.
- GPRS : General Packet Radio Service.
- GRC : Gouvernance Risk management and Compliance.
- GRE : Generic Routing Encapsulation.
- GSM : Global System for Mobile Communications.
H
- HD : Haut Débit.
- HDLC : Hight level Data Link Control.
- HIDS : Host-based Intrusion Detection System.
- HIPS : Host-based Intrusion Prevention System.
- HLR : Home Location Register.
- HMAC : Hash-based Message Authentication Code.
- HOTP : HMAC-based One time Password.
- HSDPA : High Speed Download Packet Access.
- HSM : Hardware Security Module.
- HSN : Hopping Sequence Number.
- HSUPA : High Speed Uplink Packet Access.
- HTML : HyperText Markup Language.
- HTTP : HyperText Transfer Protocol.
- HTTPS : HyperText Transfer Protocol Secured.
I
- IaaS : Infrastructure as a Service.
- IAB : Internet Activities Board.
- IAB : Internet Architecture Board.
- IAM : Identity and Access Management.
- IANA : Internet Assigned Numbers Authority.
- IAST : Interactive Application Security Test.
- ICANN : Internet Corporation for Assigned Names and Numbers.
- ICMP : Internet Control and error Message Protocol.
- ICP : Infrastructure à Clé Publique.
- IDoT : IDentity of things.
- IDP : Internet Datagram Protocol.
- IDS : Intrusion Detection Systems.
- IEC : International Electrotechnical Commission.
- IEEE : Institute of Electrical and Electronics Engineers.
- IETF : Internet Engineering Task Force.
- IGC : Infrastructure de Gestion de Clés.
- IGP : Interior Gateway Protocol.
- IHM : Interface Homme Machine.
- IKE : Internet key Exchange.
- IMEI : International Mobile Station Equipment Identity.
- IMS : IP Multimédia Subsystem.
- IMSI : International Mobile Subscriber Identity.
- IMT 2000 : International Mobile Telecommunications 2000.
- IoA : Indicator of Attack.
- IoC : Indicator of Compromise.
- IOT : Internet Of Things.
- IP : Internet Protocol.
- IPBX : Internet Protocol-Private Branch Exchange.
- IPS : Intrusion Prevention System.
- IPsec : Internet Protocol Security.
- IR : Incident Response.
- IRT : Incident Response Team.
- IRTF : Internet Research Task Force.
- IS : Information Security.
- ISAKMP : Internet Security Association and Key Management Protocol
- ISC2 : International Information Systems Security Certification Consortium.
- ISCM : Information Security Continuous Monitoring.
- ISDN : Integrates Services Digital Network.
- IS-IS : Intermediate Sytem to Intermediate System.
- ISL : Inter Switch Link.
- ISMS : Information Security Management System.
- ISO : International Standard Organisation.
- ISOC : Internet SOCiety.
- ISTAR : Intelligence, Surveillance, Target Acquisition, and Reconnaissance.
- IT : Information Technology.
- ITA : Information Technology Agreement.
- ITIL : Information Technology Infrastructure Library.
- ITU : International Telecommunication Union.
- ITSEC : Information Technology Security Evaluation Criteria.
- IV : Initialization Vector.
- IXFR : Incremental Zone Transfer.
J
- J2SE : Java 2 Standard Edition.
- J2EE : Java 2 Entreprise Edition.
- J2ME : Java 2 Micro Edition.
- JPEG : Joint Picture Expert Group.
- JS : JavaScript.
- JSON : JavaScript Object Notation.
K
- KDC : Key Distribution Center.
- KDK : Key Derivation Function.
- KEK : Key Encryption Key.
- KMIP : Key Management Interoperability Protocol.
- KMS : Key Management System.
- KRACK : Key Reinstallation AttaCK.
- KRI : Key Risk Indicator.
L
- L2I : Lutte Informatique d'Influence.
- L2TP : Layer 2 Tunneling Protocol.
- LA : Location Area.
- LAC : Location Area Code.
- LAI : Location Area Identification.
- LAN - Local Area Network.
- LAP - Link Access Protocol.
- LAPB : Link Access Protocol D-channel.
- LAPD : Link Access Protocol D-channel.
- LCP : Link Control Protocol.
- LDAP : Lightweight Directory Access Protocol.
- LDP : Label Distribution Protocol.
- LEAP : Lightweight Extensible Authentication Protocol.
- LFI : Local File Inclusion.
- LIB : Label Information Base.
- LID : Lutte Informatique Défensive.
- LII : Lutte Informatique d'Influence.
- LIO : Lutte Informatique Offensive.
- LiFi : Light Fidelity.
- LLC : Logical Link Control.
- LLM : Large Language Model.
- LMI : Local Management Interface.
- LMI : Lutte contre la Manipulation de l'Information.
- LoTL : Living off The Land.
- LSA : Local Security Authority.
- LSR : Label Switching Router.
- LTE : Long Term Evolution.
M
- MA : Mobile Allocation.
- MAC : Mandatory Access Control.
- MAC : Media Access Control.
- MAC : Message Authentication Code.
- MAEC : Malware Attribute Enumeration and Characterization.
- MAIO : Mobile Allocation Index Offset.
- MAN : Metropolitan Area Network.
- MBR : Master Boot Record.
- MCC : Mobile Country Code.
- MD5 : Message Digest 5.
- MDM : Mobile Device Management.
- MDR : Manage Detection and Response.
- MFA : Multi-Factor Authentication.
- MGCF : Media Gateway Control Function.
- MIB (SNMP) : Management Information Base.
- MIC : Message Integrity Check.
- MIC : Modulation par Impulsions Codées.
- MIME : Multipurpose Internet Mail Extensions.
- MIMO : Multiple Input / Multiple Output.
- MIPS : Menace Informatique et Pratique de Sécurité.
- MISO : Multiple In / Single Out.
- MITM : Man In The Middle.
- MNC : Mobile Network Code.
- MMF : Multimode Fiber.
- MMS : Multimedia Messaging Service.
- MML : Man Machine Language.
- MOA : Maitrise d'OuvrAge.
- MOE : Maitrise d’œuvre.
- MOSPF : Multicast extension Open Shortest Path First.
- MPLS : MultiProtocole Label Switching.
- MSC : Mobile Switching Center.
- MSIN : Mobile Subscriber Identification Number.
- MSISDN : Mobile station ISDN number.
- MSSP : Managed Security Service Provider.
- MTA : Message Transfer Agent.
- MTBF : Mean Time Between Failure.
- MTTD : Mean Time To Detect.
- MTTR : Mean Time To Remediate.
- MTS : Message Transfer System.
- MTU : Maximum Transmission Unit.
- MVNO : Mobile Virtual Network Operator.
N
- NAC : Network Access Control.
- NAP : Network Access Protection.
- NAP : Network Access Protocol.
- NAS : Network Access Server.
- NAS : Network Attached Storage.
- NAT : Network Address Translation.
- NAT- PT : Network Address Translation - Protocol Translator.
- NBMA : Non-Broadcast Multi-Access.
- NCIRC : NATO Computer Incident Response Capability.
- NDA : Non-Disclosure Agreement.
- NDR : Network Detection and Response.
- NEB : Numérisation de l’Espace de Bataille.
- NFC : Near Field Communication.
- NFS : Network File System.
- NIC : Network Information Center.
- NIC : Network Interface card.
- NIDP : Network Intrusion Detection and Prevention.
- NIDS : Network Intrusion Detection System.
- NIS : Network and Information Security.
- NIS2 : Network and Information Security v2.
- NIS : Network Information Services.
- NIST : National Institute of Standards and Technology.
- NMS : Network Management System.
- NNI : Network to Network Interface.
- NNTP : Network News transfert Protocol.
- NOC : Network Operations Center.
- NPS : Network Policy Server.
- NRA : Nœud de Raccordement d’Abonné.
- NRO : Nœud de Raccordement Optique.
- NSA : National Security Agency.
- NSAP : Network Service Access Point.
- NSS : Network Sub System.
- NSS : Network Security Services.
- NTA : Network Traffic Analysis.
- NTI : Nœud de Transit International.
- NTIC : Nouvelles Technologies de l’Information et de la Communication.
- NVD : National Vulnerability Database.
O
- OBL : Opérateur de Boucle Locale.
- OFDM : Orthogonal Frequency Division Multiplexing.
- OIV : Opérateur d’importance vitale.
- OLSR : Optimized Link State Routing Protocol.
- OMG : Object Management Group.
- OODA : Observer, Orienter, Décider, Agir (Observe, Oriente, Decide, Act).
- OS : Operating System.
- OSI (modèle) : Open System Interconnexion.
- OSI : Open Source Initiative.
- OSPF : Open Shortest Path First.
- OSS : Operating System and Service.
- OTAN : Organisation du traité de l’atlantique nord.
- OTP : One Time Pad.
P
- PABX : Private Automatic Branch Exchange.
- PAN : Personal Area Network
- PAP : Password Authentication Protocol.
- PBX : Private Branch Exchange.
- PCA : Plan de continuité d’activité.
- P-CSCF : Proxy Call Session Control Fonction
- PDN : Public Data Network.
- PGP : Pretty Good Privacy.
- PIN : Personnal Identification Number.
- PKI : Public Key Infrastructure.
- PKCS : Public Key Cryptography Standard.
- PLMN : Public Land Mobile Network.
- PMR : Professional Mobile Radio.
- PNNI : Private Network Network Interface.
- PoP : Point of Presence.
- POP3 : Post Office Protocol 3.
- POTS : Plain Old Telephone Service.
- PPP : Point to Point Protocol.
- PPTP : Point-to-Point Tunneling Protocol.
- PRA : Plan de Reprise d’Activité.
- PRI : Primary Rate Interface.
- PSTN : Public Switched Telephone Network.
- PUK : PIN Unblocking Key.
Q
- QOS : Quality Of Service.
R
- RAM : Random Access Memory
- RARP : Reverse Address Resolution Protocol.
- RAT : Remote Acces Trojan.
- RAT : Remote Administration Tool.
- RBL : Realtime Blackhole List.
- RFC : Request For Comment.
- RFID : Radio Frequency Identification.
- RIC : Renseignement d’intérêt Cyber.
- RIP : Routing Information Protocol.
- RIR : Registre Internet Régionaux, Regional Internet Registry.
- RLC : Radio Link Control.
- RNIS : Réseau Numérique à Intégration de Services.
- ROC : Renseignement d’Origine Cyber.
- ROM : Read Only Memory.
- RPC : Remote Procedure Call.
- RSA : Rivest, Shamir, Adelman.
- RSSI : Responsable de la Sécurité des Systèmes d’Information.
- RSVP : Resource Reservation Protocol.
- RTC : Réseau Téléphonique Commuté.
- RTCP : Real-time Transport Control Protocol.
- RTP : Real-time Transport Protocol.
- RTSP : Real Time Streaming Protocol.
S
- S/MIME : Secure / Multipurpose Internet Mail Extensions.
- SA (Security Association) = association de sécurité.
- SA (Source Address) = adresse source;
- SA (Subnet Administrator) = administrateur de sous réseau (RFC4391);
- SABM (Set Asynchronous Balanced Mode) = mise en mode asynchrone équilibré (commande d'initialisation de protocole à la couche 2. Sauf mention contraire, SABM désigne aussi bien la forme simple que la forme étendue du message).
- SABM_ACK (Layer two acknowledgment to SABM) = acquittement de SABM à la couche 2.
- SAC (Service Access Code) = code d'accès au service ; 300 711.
- SAC (syntax-based arithmetic coding) = codage arithmétique syntaxique (H.263).
- SAC (Strict Avalanche Criterion) = critère strict d'avalanche (RFC2144).
- SACCH (Slow Associated Control Channel) = canal de signalisation associé lent ; GSM.
- SACCH/Cx (Slow, SDCCH/4 Associated, Control Channel) = canal de signalisation lent associé à un SDCCH/x ; GSM.
- SACCH/T (Slow, TCH-Associated, Control Channel) = canal de signalisation lent associé à un TCH ; GSM.
- SACF (single association control function) = fonction de contrôle à association unique ; fonction de contrôle d’association simple.
- SACK (Selective Acknowledgment) = accusé de réception sélectif (RFC 2018).
- SACRED (Secure Availability of Credentials) = disponibilité sécurisée des accréditifs (RFC 3760).
- SAD (Security Association Database) = base de données d'association de sécurité (RFC3168).
- SADB (Security Association Database) = base de données des associations de sécurité (RFC3554).
- SAF (SACF auxiliary facility) = facilité auxiliaire de fonction SACF (X.862).
- SAFI (Subsequent Address Family Identifier) = identifiant de la famille d'adresse suivante (RFC 4760).
- SAI (Source Attachment Identifier) = identifiant de rattachement de source (RFC5003).
- SAI (satellite air interface) = trajet aérien par satellite.
- SAID (security association identifier) = identifiant d'association de sécurité.
- S-AIS (Section Alarm Indication Signal) = signal d'indication d'alarme sur la section.
- SAM (SCSI Architecture Model) = modèle d’architecture SCSI (RFC7143).
- SAM (subsequent address message) = message d'adresse à suivre ; RNIS/ISUP.
- SAML (Security Assertion Markup Language) = langage de balisage d’assertion de sécurité (X.1142).
- SAN (Storage Area Networking/Network) = mise en réseau de zone de mémorisation/réseau à zone de mémorisation.
- SAN (Subject Alternative Name) = nom de remplacement de sujet (RFC4556).
- SAO (Single Association Objet) = objet d'association unique ; R.I.
- SAP : Service Advertising Protocol.
- SCADA : Supervisory Control And Data Acquisition.
- SDLC : Synchronous Data Link Control.
- SDMX : Statistical Data and MetaData eXchange.
- SDU : Service Data Unit.
- SGML : Standard Generalized Markup Language.
- SHA : Secure Hash Algorithm.
- SHTTP : Secure Hypertext Transfer Protocol.
- SIEM : Security Information and Event Management System.
- SIM : Subscriber Identity Mobile.
- SIP : Session Initiation Protocol.
- SMB : Server Message Block.
- SMF : Single Mode Fiber.
- SMS : Short Message Service.
- SMTP : Simple Mail Transfer Protocol.
- SNMP : Simple Network Management Protocol.
- SOA : Service Oriented Architecture.
- SOAP : Simple Object Access Protocol.
- SOC : Security Operations Center.
- SPX : Sequenced Packet eXchange.
- SQL : Structured Query Lanquage.
- SS7 : Signaling System 7.
- SSH : Secure Shell.
- SSO : Single Sign On.
- SSID : Service Set IDentifier.
- SSII : Société de Service et d’Ingénierie Informatique.
- SSL : Secure Socket Layer.
- SSL/TLS : Secure Socket Layer/Transport Layer Security.
- SSO : Single Sign-On.
- STAD : Système de traitement automatisé de données.
- STIX : Structured Threat Information eXpression.
T
- TA : Time Advance.
- TAXII : Trusted Automated of Indicator Information.
- TCP : Transmission Control Protocol.
- TD/CDMA : Time Division / CDMA.
- TDM : Time Division Multiplexing.
- TDMA : Time Division Multiple Access.
- TKIP : Temporal Key Integrity Protocol.
- TLD : Top Level Domain.
- TLP : Tear Line Protocol.
- TOR : The Onion Router.
- TRAU : Transcoding Rate and Adaptation Unit.
- TTL : Time-To-Live.
- TTP : Tactique Technique Procedure.
U
- UAC : Unified Access Control.
- UCS: Universal Character Set.
- UDP : User Datagram Protocol.
- UIT : Union Internationale des Télécommunications.
- UMTS : Universal Mobile Telecommunication System.
- UMTS -TDD : Universal Mobile Telecommunication System Time Division Duplex.
- UNI : User to Network Interface.
- URI : Uniform Resource Identifier.
- URL : Uniform Resource Locator.
- URN : Uniform Ressource Name.
- USB : Universal Serial Bus.
- USENET : UNIX user network.
- UTF: Unicode Transformation Format.
V
- VBR : Variable bit rate.
- VLAN : Virtual Local Area Network.
- VLR : Visitor Location Register.
- VLSM - Variable-Length Subnet Mask.
- VOD : Video On Demand.
- VPN : Virtual Private Network.
- VPS : Virtual Private Server.
- VSAT : Very Small Aperture Terminal.
W
- W3C : World Wide Web Consortium.
- WAN : Wide Area Network.
- WAP : Wireless Application Protocol.
- WCDMA : Wideband Code Division Multiple Access.
- WEP : Wired Equivalent Privacy.
- WLAN : Wireless Local Area Network.
- WPA : Wi-Fi Protected Access.
- WPAN : Wireless Personnal Area Network.
- WWW : World Wide Web.
X
- XKMS : XML key management system.
- XLL : eXtensible Link Language.
- XML : eXtensible Markup Language.