Cyber security full form
Cyber Security Full Forms [ unit 1 to 5 ] :
DR - Disaster Recovery/ Data Recovery
ARPANET - Advance Research Projects Agency NETwork
TCP/IP - Transmission Control Protocol / Internet protocol
IXP - Internet eXchange Point
DNS - Domain Name system
ISP - Internet service provider
HTTP - Hyper Text Transfer Protocol
IPV6 - Internet protocol version 6
SSL - Secure Sockets Layer
AWS - Amazon web Services
VPNs - Virtual private networks
ISOC - Internet Society
IOT - Internet of Things
DOS - Denial of services
I4C - Indian cyber crime co-ordination center
IPC - Indian Panel code
TAU - Threat Analytics unit
NCFL - National cyber Forensic laboratory
NCTC - National Cybercrime Training Centre
2FA - Two Factor Authentication
CRM - Customer Relationship Management
BI - Business Intelligence
KPIs - Key Performance Indicators
UGC - User Generated Content
CTRs - Click Through Rates
ROAS - Return on ad Spend
OSNs - Online Social Networks
BEC - Business Email Compromise
B2C - Business to consumer
B2B - Business to Business
C2C - consumer to Consumer
C2B - Consumer to Business
B2G - Business to Government
C2G - Consumer to Government
ABC - Auction Based Commerce
FTC - Federal TradeCommission
IC3 - Internet Crime Complaint Center
ACCC - Australian Competition and Consumer Commission
OMS - Order Management System
CMS - Content Management System
EFT - Electronic Fund Transfer
FCA - Financial Conduct Authority
QR - Quick reference/ response
BNPL - Buy Now Pay Later
TPS - Transaction processing System
UPI - Unified Payment Interface
USSD - Unstructured Supplementary Service Data
TTPs - Tactics, Techniques, and Procedures
RDP - Remote Desktop Protocol
RATs - Remote Access Trojans
ICPC - International Cable Protection Committee
UID - Unique IDentifier
APTs - Advanced Persistent Threats
ICT - Information and Communications Technology
NEFT - National Electronic Funds Transfer
RTGS - Real Time Gross Settlement
IMPS - Immediate payment interface
NPCI - National Payment Corporation of India
MITM - man in the middle
NAC - Network Access Control
RBAC - Role-Based Access Control
ABAC - Attribute-Based Access Control
DAC - Discretionary Access Control
MFA - Multi factor authentication
ML - Machine Learning
AI - Artificial Intelligence
EDR - EndPoint Detection and Response
MTD - Mobile Threat Defense
UEM - Unified EndPoint Management
IOCs - Indicators Of Compromise
CMDB - Configuration Management Databases
RPO - Recovery Point Objective
IDPS - Intrusion Detection And Prevention System
IDS - Intrusion Detection System
IPS - Intrusion Prevention Systems
WPA3 - Wi-Fi Protected Access 3
WEP - Wired Equivalent Privacy
AES - Advanced Encryption Standard
MAC - Media Access Control
SSID - Service Set IDentifier
VR /AR - Virtual Reality / Augmented Reality
DSA - Digital Signature Algorithm
PCI DSS - Payment Card Industry Data Security Standard
PCI SSC - Payment Card Industry Security Standard Council
XSS - cross Site Scripting
WAF - web Application Firewalls
EFT - Electronic Fund Transfer
NFC - Near Field Communication
ACH - Automated Clearing House
URL - uniform resource Locator
SMTP - simple mail transfer protocol

Comments
Post a Comment