Last Update 4/29/2022
- 2FA
- Two-factor Authentication
- 3DES
- Triple DES
- ABAC
- Attribute-Based Access Control
- ACL
- Access Control Lists
- AD CS
- Certificate Services
- AD DS
- Domain Services
- AD FS
- Federation Services
- AD LDS
- Lightweight Directory Services
- AD RMS
- Rights Management Services
- AD
- Active Directory
- AD
- Administrative Distance
- AD
- Microsoft Active Directory
- ADSL
- Asymmetrical Digital Subscriber Line
- AES
- Advanced Encryption Standard
- AES-CCMP
- AES-Counter Mode CBC-MAC Protocol
- AI
- Artificial Intelligence
- AICPA
- American Institute of Certified Public Accountants
- AIT
- Advanced Imaging Technology
- ALE
- Annualized Loss Expectancy
- ALE
- Application Level Events
- ALM
- Application life Cycle Management
- ALU
- Arithmetic / Logic Unit
- AMD-V
- AMD Virtualization
- AMI
- Amazon Machine Images
- A-MPDU
- Aggregated Mac Protocol Data Unit
- A-MSDU
- Aggregated Mac Service Data Unit
- AP
- Wireless Access Point
- API
- Application Programming Interface
- APT
- Advanced Persistent Threat
- AR
- Assisted Reality
- ARN
- Amazon Resource Number
- ARO
- Annualized Rate of Occurrence
- ARP
- Address Resolution Protocol
- ARPA
- Advanced Research Projects Agency
- AS
- Authentication Service
- ASD
- Adaptive Software Development
- ASG
- Application Security Group
- ASN
- Autonomous System Number
- ASP
- Application Service Provider
- ATM
- Asynchronous Transfer Mode
- AUP
- Acceptable Use Policy
- AWS
- Amazon Web Services
- AZ
- Availability Zones
A
- B2B
- Business-to-Business E-Commerce
- B2C
- Business-to-Consumer E-Commerce
- BC
- Business Continuity
- BCI
- Brain Computer Interface
- BCP
- Business Continuity Plan
- Bd
- Baud Rate
- BGP
- Border Gateway Protocol
- BIA
- Business Impact Analysis
- BIND
- Berkeley Internet Name Domain
- Blob
- Binary Large Object
- BPA
- Business Partnership Agreement
- BPDU
- Bridge Protocol Data Unit
- BSS
- Basic Service Set
- BSSID
- Basic Service Set Identifier
- BTRFS
- B-Tree File System
- BYOA
- Bring Your Own Application
- BYOC
- Bring Your Own Cloud
- BYOD
- Bring Your Own Device
B
- CA
- Call Agent
- CA
- Certificate Authority
- CAC
- Common Access Card
- CALEA
- Communications Assistance for Law Enforcement Act
- CAM
- Computer-Assisted Manufacturing
- CAM
- Content Addressable Memory
- CAPWAP
- Control and Provisioning of Wireless Access Points
- CASB
- Cloud Access Security Broker
- CASB
- Cloud Application Security Broker
- CASE
- Computer-Aided Software Engineering
- CBIS
- Computer Based Information System
- CBT
- Computer-Based Training
- CCN
- Content-Centric Networking
- CCTV
- Closed Circuit TV
- CD
- Carrier Detect Light
- CDMA
- Code Division Multiple Access
- CER
- Crossover Error Rate
- CET
- Carrier Ethernet Transport
- CFT
- Capture the Flag
- CGW
- Customer Gateway
- CHAP
- Challenge Handshake Authentication Protocol
- CIA
- Confidentiality, Integrity, Availability
- CIDR
- Classless Interdomain Routing Notation
- CIFS
- Common Internet File System
- CIM
- Computer-Integrated Manufacturing
- CIO
- Chief Information Officer
- CIR
- Committed Information Rate
- CIS
- Center for Internet Security
- CISO
- Chief Information Security Officer
- CKO
- Chief Knowledge Officer
- CLI
- Command Line Interface
- CM
- Configuration Management
- CMDB
- Configuration Management Database.
- CMP
- Cloud Management Platform
- CO
- Central Office
- CoAP
- Constrained Application Protocol Working Group
- Coax
- Coaxial Cable
- Colo
- Colocation
- COOP
- Continuity of Operations Plan
- COPE
- Corporate Owned Personally Enabled
- CoRe
- Constrained RESTful Environment Working Group
- CoS
- Class of Service
- CoT
- Cloud of Things
- CPU
- Central Processing Unit
- CRM
- Customer Relationship Management
- CRM
- Customer Resource Management
- CRT
- Cathode Ray Tube
- CSF
- Critical Success Factor
- CSF
- Cybersecurity Framework
- CSMA/CA
- Carrier Sense Multiple Access with Collision Avoidance
- CSP
- Cloud Service Provider
- CSP
- Content Security Policy
- CSRF
- Cross-site Request Forgery aka Client-side Forgery
- CSS
- Cascading Style Sheets
- CSU
- Channel Service Unit
- CTF
- Capture the Flag
- CTO
- Chief Technology Officer
- CVSS
- Common Vulnerability Scoring System
- CWDM
- Course Wavelength Division Multiplexing
- CYOD
- Choose Your Own Device
C
- DAC
- Discretionary Access Control
- DAI
- Dynamic ARP Inspection
- DAP
- Directory Access Protocol
- DAS
- Direct Attached Storage
- DASD
- Direct Access Storage Device
- DBA
- Database Administrator
- DBMS
- Database Management System
- DCE
- Data Communications Equipment
- DCS
- Distributed Control System
- DDL
- Data Definition Language
- DDNS
- Dynamic DNS
- DDoS
- Distributed Denial of Service Attack
- Demux
- Demultiplexer
- DES
- Data Encryption Standard
- DevOps
- Development and Operations
- DFD
- Data Flow Diagram
- DHCP
- Dynamic Host Configuration Protocol
- DHCPv6
- Dynamic Host Configuration Protocol version 6
- DiD
- Defense-in-Depth strategies
- DIX
- Ethernet II
- DLCI
- Data-Link Connection Identifier
- DLL
- Dynamic-Link Library
- DLP
- Data Loss Prevention
- DMZ
- Demilitarized Zone
- DNAT
- Dynamic Network Address Translation
- DNS
- Domain Name System
- DNSSEC
- Domain Name System Security Extensions
- DOCSIS
- Data Over Cable Service Interface Specification
- DoS
- Denial of Service Attack
- DR
- Disaster Recovery
- DRM
- Digital Rights Management
- DRP
- Disaster Recovery Plan
- DSL
- Digital Subscriber Line
- DSLAM
- DSL Access Multiplexer
- DSS
- Decision Support Systems
- DSU
- Data Service Unit
- DTE
- Data Terminal Equipment
- DVD
- Digital Video Disk
- DWDM
- Dense Wavelenth Division Multiplexing
D
- EAP
- Extensible Authentication Protocol
- EBS
- Elastic Block Storage
- E-Commerce
- Electronic Commerce
- EDGE
- Enhanced Data Rates for GSM Evolution (same as EGPRS)
- EDI
- Electronic Data Interchange
- eDiscovery
- electronic discovery
- EDR
- Endpoint Detection and Response
- EFS
- Elastic File System
- EFT
- Electronic Funds Transfer
- EGP
- Exterior Gateway Protocols
- EGPRS
- Enhanced GPRS
- EIGRP
- Enhanced Interior Gateway Routing Protocol
- EIS
- Executive Information Systems
- EMI
- Electromagnetic Interference
- EmSec
- Emission Security
- EOL
- End of Life
- EOQ
- Economic Order Quantity
- EOS
- End of Service
- EPC
- Electronic Product Code
- EPCIS
- EPC Information Service
- ER-D
- Entity-Relationship Diagram
- ERP
- Enterprise Resource Planning
- ES
- Expert Systems
- ESD
- Electrostatic Discharge
- ESI
- Electronically Stored Information or Active Data
- ESS
- Executive Support Systems
- ESS
- Extended Service Set
- ESSID
- Extended Service Set Identifier
- ETSI
- European Telecommunication Standards Institute
- EUI-64
- 64-bit Extended Unique Identifier
- Ext4
- Fourth Extended File System
E
- FAR
- False Acceptance Rate
- FAT32
- File Allocation Table
- FC
- Fibre Channel
- FCS
- Frame Check Sequence
- FDM
- Frequency Division Multiplexing
- FIM
- Federated Identity Management or just Federation
- FIM
- File Integrity Monitoring
- FIT
- Failure in Time
- FMS
- Flexible Manufacturing System
- FP
- Fat Provisioning (aka thick provisioning)
- FP7
- Seventh Framework Program of the European Union
- FPGA
- Field-Programmable Gate Array
- FQDN
- Fully Qualified Domain Name
- FRR
- False Rejection Rate
- FSx
- Third Party File System
- FTP
- File Transfer Protocol
- FTP
- File Transfer Protocol
- FTPS
- File Transfer Protocol Secure
- FTTH
- Fiber to the Home
- FTTP
- Fiber to the Premises
F
- G.Lite
- a version of ADSL
- GBIC
- Gigabit Interface Converter
- GCP
- Google Cloud Platform
- GDSS
- Group Decision Support Systems
- GEO
- Geosynchronous Earth Orbit
- GIS
- Geographic Information System
- GPRS
- General Packet Radio Services
- GPS
- Global Positioning System
- GRE
- Generic Routing Encapsulation
- GSLB
- Global Server Load Balancing or Multi-Site Load Balancing
- GSM
- Global System for Mobile Communications
- GSS
- Group Support Systems
- GUI
- Graphical User Interface
G
- HA
- High Availability
- HAV
- Hardware-Assisted Virtualization
- HDSL
- High Bit-Rate DSL
- HFC
- Hybrid Fiber-Coax
- HIDS
- Host Intrusion Detection System
- HIPPA
- Health Insurance Portability and Accountability Act
- HIPS
- Host Intrusion Prevention System
- HMD
- Head-Mounted Display
- HSM
- Hardware Security Module
- HSPA+
- High Speed Packet Access Plus
- HSRP
- Hot Standby Routing Protocol
- HSTS
- HTTP Strict Transport Security
- HT
- Hyperthreading
- HTML
- Hypertext Markup Language
- HTTP
- Hypertext Transfer Protocol
- HTTPS
- HTTP secure
- HVAC
- Heating, Ventilation, and Air Conditioning
- HVD
- Holographic Versatile Disk
H
- IaaS
- Infrastructure as a Service
- IAB
- Internet Architecture Board
- IaC
- Infrastructure as Code
- IAM
- Identity and Access Management
- ICANN
- Internet Corporation for Assigned Numbers and Names
- ICMP
- Internet Control Message Protocol
- ICN
- Information Centric Networking
- ICS
- Industrial Control System
- ICT
- Information and Communications Technology
- IDF
- Intermediate Distribution Frame
- IDS
- Intrusion Detection System
- IETF
- Internet Engineering Task Force
- IG or IGW
- Internet Gateway
- IGMP
- Internet Group Management Protocol
- IGP
- Interior Gateway Protocol
- IGRP
- Interior Gateway Routing Protocol
- IMAP
- Internet Message Access Protocol
- IMAP4
- Internet Message Access Protocol v4
- Integrated IS-IS
- Intermediate System to Intermediate System
- IOC
- Indicator of Compromise
- IoE
- Internet of Everything
- IOPS
- Input/Output Operations Per Second
- IoT
- Internet of Things
- IoT-A
- IoT-Architecture
- IP
- Internet Protocol
- IPAM
- IP Address Management
- IP-PBX
- Digital PBX
- IPS
- Intrusion Prevention System
- IPsec
- Internet Protocol Security
- IPv4
- Internet Protocol version 4
- IPv6
- Internet Protocol Version 6
- iSCSI
- Internet SSCI
- ISDN
- Integrated Services Digital Network
- IS-IS
- Intermediate System to Intermediate System
- ISMS
- Information Security Management System
- ISO
- International Organization for Standardization
- ISP
- Internet Service Provider
- IV
- Initialization Vector
- IX or IP
- Internet Exchange Point
I
- JBOD
- Just a Bunch of Disks
- JIT
- Just-In-Time Inventory
J
- KDC
- Key Distribution Center
- KMS
- Key Management System
- KMS
- Knowledge Management System
- KPI
- Key Performance Indicators
- KRI
- Key Risk Indicators
K
- L2TP
- Layer 2 Tunneling Protocol
- LAN
- Local Area Network
- LCD
- Liquid Crystal Display
- LDAP
- Lightweight Directory Access Protocol
- LEAP
- Lightweight EAP
- LLRP
- Low Level Reader Protocol
- LR-WPAN
- Low Rate Wireless Personal Area Networks
- LTE
- Long Term Evolution
- LUN
- Logical Unit Number
- LWAPP
- Lightweight Access Point Protocol
L
- M2M
- Machine-to-Machine
- MAC
- Mandatory Access Control
- MAC
- Media Access Control
- MAM
- Mobile Application Management
- MAN
- Metro Ethernet or Ethernet MAN Connections
- MAN
- Metropolitan Area Network
- MCM
- Mobile Content Management
- M-Commerce
- Mobile E-Commerce
- MCU
- Multipoint Control Unit
- MD5
- Message Digest algorithm 5
- MDF
- Main Distribution Frame
- MDM
- Mobile Device Management
- MEF
- Metro Ethernet Forum
- MFA
- Multifactor Authentication
- MGC
- Media Gateway Controller
- MGCP
- Media Gateway Control Protocol
- MIB
- Management Information Base
- MIC
- Mandatory Integrity Control
- MICR
- Magnetic Ink Character Recognition
- MIME
- Multipurpose Internet Mail Extensions
- MIMO
- Multiple Input-Multiple Output
- MIS
- Management Information Systems
- MITB
- Man-in-the-browser
- MitM
- Man in the Middle attack
- ML
- Machine Learning
- MLA
- Master License Agreement
- MMF
- Multimode Fiber
- MMS
- Multimedia Messaging Service
- MOU
- Memorandum of Understanding
- MPLS
- Multiprotocol Label Switching
- MRP
- Manufacturing Resource Planning
- MSA
- Master Service Agreement
- MSA
- Measurement System Analysis
- MSC
- Mobile Switching Center
- MS-CHAP
- Microsoft Challenge Handshake Authentication Protocol
- MSDS
- Materials Safety Data Sheet
- MSP
- Managed Service Provider
- MSSP
- Managed Security Service Provider
- MSTP
- Multiple Spanning Tree Protocol
- MTBF
- Mean Time Between Failure
- MTSO
- Mobile Telecommunications Switching Office
- MTTR
- Mean Time to Recovery
- MTTR
- Mean Time To Restore
- MTU
- Master Terminal Unit
- MTU
- Maximum Transmission Unit
- MU-MIMO
- Multiuser MIMO
M
- NAC
- Network Access Control
- NACL
- Network Access Control List
- NAS
- Network Attached Storage
- NAT mode
- Network Address Translation Mode
- NAT
- Network Address Translation
- NDA
- Nondisclosure Agreement
- NDN
- Named Data Networking
- NEXT
- Near End Cross Talk
- NFC
- Near Field Communication
- NFV
- Network Functions Virtualization
- NGFW
- Next Generation Firewalls
- NGW
- NAT Gateways
- NICs
- Network Interface Card
- NID
- Network Interface Device
- NIDS
- Network Intrusion Detection System
- NIPS
- Network Intrusion Prevention System
- NIU
- Network Interface Unit
- NMS
- Network Management System
- NOS
- Network Operating System
- NSG
- Network Security Group
- nslookup
- Name space lookup
- NSP
- Network Service Provider
- NTFS
- New Technology File System
- NTLM
- NT LAN Manager Authentication Protocol
- NTP
- Network Time Protocol
- NUI
- Natural User Interface
- NVA
- Network Virtual Appliance
- NVMe
- Nonvolatile Memory Express
N
- OAuth
- Open Authentication
- OC
- Optical Carrier Level
- OCR
- Optical Character Recognition
- OLA
- Operational Level Agreement
- OLAP
- Online Analytical Processing
- OLED
- Organic Light-Emitting Diode
- OLT
- Optical Line Terminal
- OLTP
- Online Transaction Processing
- OMR
- Optical Mark Recognition
- ONS
- Object Naming Service
- ONU
- Optical Network Unit
- OODBS
- Object-Oriented Database Management System
- OOSD
- Object-Oriented Systems Development
- OPM
- Optical Power Meter
- ORDBMS
- Object-Relational Database Management System
- OS
- Operating System
- OSI
- Open Systems Interconnection
- OSINT
- Open Source Intelligence
- OSPF
- Open Shortest Path First
- OTP
- One-Time Password
- OUI
- Organizationally Unique Identifier, or block ID or company ID
- OVA
- Open Virtual Appliance
- OVF
- Open Virtualization Format
O
- P2P
- Peer-to-Peer
- P2P
- Physical to Physical
- P2V
- Physical to Virtual
- PaaS
- Platform as a Service
- PAC
- Proxy Automatic Configuration
- PAM
- Pluggable Authentication Modules
- PAN
- Personal Area Network
- PAP
- Password Authentication Protocol
- PAT
- Port Address Translation
- PBX
- Private Branch Exchange
- PCI DSS
- Payment Card Industry Data Security Standard
- PCI DSS
- Payment Card Industry Data Security Standards
- PCI
- Peripheral Component Interconnect
- PCIe
- PCI Express
- PDU
- Power Distribution Unit
- PDU
- Protocol Data Unit
- PEAP
- Protected EAP
- PERT
- Program Evaluation and Review Technique
- PHI
- Protected Health Information
- PII
- Personally Identifiable Information
- Ping
- Packet Internet Groper
- PIV
- Personal Identity Verification
- PKI
- Public Key Infrastructure
- PLC
- Programmable Logic Controller
- PLM
- Product Lifecycle Management
- PoE
- Power over Ethernet
- PON
- Passive Optical Network
- POP
- Point of Presence
- POP
- Post Office Protocol)
- POP3
- Post Office Protocol v3
- POS
- Point of Sale
- POTS
- Plain Old Telephone Service
- PPP
- Point-to-Point Protocol
- PPPoE
- PPP over Ethernet
- PPTP
- Point-to-Point Tunneling Protocol
- PSI
- Publish-Subscribe Internet
- PSK
- Preshared Key
- PSTN
- Public Switched Telephone Network
- PUP
- Potentially Unwanted Program
- PVC
- Permanent Virtual Circuit
P
- QBE
- Query By Example
- QoS
- Quality of Service
- QR
- Quick Response Codes
Q
- RAD
- Rapid Application Development
- RADIUS
- Remote Authentication Dial-In User Service
- RAID
- Redundant Array of Independent Drives
- RAM
- Random Access Memory
- RAS
- Remote Access Server
- RAT
- Remote Access Trojan
- RBAC
- Role-Based Access Control
- RB-RBAC
- Rule-Based Role-Based Access
- RC5
- Rivest Cipher 5
- RCS
- Rich Communication Services
- RCSA
- Risk Control Self-Assessment
- RDP
- Remote Desktop Protocol
- ReFS
- Resilient File System
- REST
- REpresentational State Transfer
- RESTful
- that follows REST principles
- RFC
- Request for Comments
- RFI
- Radio Frequency Interference
- RFID
- Radio Frequency Identification
- RFP
- Request For Proposal
- RIP
- Routing Information Protocol
- RIPv2
- Routing Information Protocol v2
- RMF
- Risk Management Framework
- ROM
- Read-Only Memory
- ROP
- Reorder Point
- RPO
- Recovery Point Objective
- RSTP
- Rapid Spanning Tree Protocol
- RTCP
- Real-Time Transport Control Protocol
- RTO
- Recovery Time Objective
- RTP
- Real-Time Transport Protocol
- RTS/CTS
- Request to Send / Clear to Send Protocol
- RTT
- Round-Trip Time
- RTU
- Remote Terminal Units
R
- S3
- Simple Storage Service
- SAaas
- Sensing and Actuation as a Service
- SaaS
- Software as a Service
- SAE
- Simultaneous Authentication of Equals
- SAML
- Security Assertation Markup Language 2.0
- SAN
- Storage Area Network
- SAS
- Serial Attached SCSI
- SASD
- Sequential Access Storage Device
- SATA
- Serial Advanced Technology Attachment
- SCADA
- Supervisory Control and Data Acquisition
- SCM
- Supply Chain Management
- SCP
- Secure Copy Protocol
- SCSI
- Small Computer Systems Interface
- SDH
- Synchronous Digital Hierarchy
- SDLC
- Systems Development Life Cycle
- SDLS
- Symmetric DSL
- SDN
- Software Defined Networking
- SDV
- Software-Defined Visibility
- SECaaS
- Security as a Service
- SEND
- Secure Neighbor Discovery protocol
- SFP
- Small Form-Factor Pluggable Transceivers
- SFTP
- Secure File Transfer Protocol
- SHA
- Secure Hash Algorithm
- SHA-2
- Secure Hash Algorithm Version 2
- SHDSL
- Single Line High Bit Rate DSL
- SID
- Security Identifier
- SIEM
- Security Information and Event Management
- SIM
- Subscriber Identity Module
- SIP
- Session Initiation Protocol
- SLA
- Service Level Agreement
- SLIP
- Serial Line Internet Protocol
- SMB
- Server Message Block
- SMF
- Single Mode Fiber
- SMS
- Short Message Service
- SMT
- Simultaneous Multithreading
- SMTP
- Simple Mail Transfer Protocol
- SNAT
- Static Network Address Translation
- SNMP
- Simple Network Management Protocol
- SNMPv1
- Simple Network Management Protocol V1
- SNMPv2
- Simple Network Management Protocol V2
- SNMPv3
- Simple Network Management Protocol V3
- SNR or S/N
- Signal-to-Noise Ratio
- SNS
- Social Networks Service
- SOA
- Service Oriented Architecture
- SOAR
- Security Orchestration, Automation, and Response
- SoC
- System on a Chip
- SONET
- Synchronous Optical Network
- SOW
- Statement of Work
- SPB
- Shortest Path Bridging
- SQL
- Structured Query Language
- SR
- Super Router
- SSAE
- Statements On Standards for Attestation Engagements
- SSH
- Secure Shell
- SSID
- Service Set Identifier
- SSL
- Secure Sockets Layer
- SSN
- Semantic Sensor Network
- SSO
- Single Sign-On
- SSOT
- Single Source of Truth
- SSRF
- Server-Site Request Forgery
- STA
- IEEE 802.1d spanning-tree algorithm
- STIX
- Structured Threat Information Expression
- STP
- Shielded Twisted Pair
- STP
- Spanning Tree Protocol
- SVC
- Switched Virtual Circuit
- SWG
- Next Generation Secure Web Gateway
S
- T-1
- Terrestrial Carrier Level 1
- TaaS
- Thing as a Service
- TACACS
- Terminal Access Control Access Control System
- TACACS+
- Terminal Access Controller Access Control System Plus
- TAXII
- Trusted Automated Exchange of Intelligence Information
- TCP/IP
- Transmission Control Protocol / Internet Protocol
- TCP
- Transmission Control Protocol
- T-CXR
- T-carrier standards
- TDM
- Time Division Multiplexing
- TEDS
- Transducer Electronic Data Sheets
- TFTP
- Trivial File Transfer Protocol
- TKIP
- Temporal Key Integrity Protocol
- TLS
- Transport Layer Security
- TOTP
- Time-Based One-Time Password
- TP
- Thin Provisioning
- TPM
- Trusted Platform Module
- TPS
- Transaction Processing Systems
- TRILL
- Transparent Interconnection of Lots of Links
- Trusted OS
- Trusted Operating System
- TTLS
- Tunneled Transport Layer Security
- TTP
- Adversary Tactics, Techniques, and Procedures
- TTRFB
- Time to First Byte
- TVC
- Video Teleconference
T
- UDP
- User Datagram Protocol
- UDR
- User-Defined Routing
- UEFI
- Unified Extensible Firmware Interface
- UEM
- Unified Endpoint Management
- UPS
- Uninterruptible Power Supply
- URI
- Universal Resource Identifier
- URL
- Uniform Resource Locator
- USB OTG
- USB On-The-Go
- UTC
- Coordinated Universal Time
- UTM
- Unified Threat Management
- UTP
- Unshielded Twisted Pair
U
- V2P
- Virtual to Physical
- V2V
- Virtual to Virtual
- VDI
- Virtual Desktop Infrastructure
- VDI
- Virtual Disk Image
- VDI
- Virtualized Desktop Infrastructure
- VDSL
- Very High Bit-Rate DSL
- VE
- Virtual Entity
- VGW
- Virtual Gateway Service
- VHD
- Virtual Hard Disk
- VIP
- Virtual IP address
- VLAN
- Virtual Local Area Network
- VM
- Virtual Machine
- VMDK
- Virtual Machine Disk
- VNI or VNID
- VXLAN Network ID
- vNIC
- Virtual Network Adaptor
- VoD
- Video on Demand
- VoIP
- Voice Over IP
- VPC
- Virtual Private Cloud
- VPN
- Virtual Private Network
- VR
- Virtual Reality
- vRAM
- Virtual RAM
- VRRP
- Virtual Router Redundancy Protocol
- Vswitch
- Virtual Switch
- VT
- Virtualization Technology
- VTEP
- VXLAN Tunnel Endpoint
- VXLAN
- Virtual Extensible LAN
V
- W3C
- World Wide Web Consortium
- WAF
- Web Application Firewall
- WAN
- Wide Area Network
- WAP
- Wireless Access Point
- WDM
- Wavelength Division Multiplexing
- WEP
- Wired Equivalent Privacy
- Wi-Fi Analyzer
- Wireless Analyzer
- WiMAX
- Worldwide Interoperability for Microwave Access
- WISP
- Wireless Identification and Sensing Platforms
- WMN
- Mesh WLAN or Wireless Mesh Network
- WoT
- Web of Things
- WPA/WPA2
- Wi-Fi Protected Access
- WPA
- Wi-Fi Protected Access
- WPS
- Wi-Fi Protected Setup
- WSAN
- Wireless Sensor and Actuator Networks
- WSN
- Wireless Sensor Networks
W
- XaaS
- Anything as a Service
- XaaS
- Anything as a Service / Everything as a Service
- XHTML
- Extensible Hyptertext Markup Language
- XML
- eXtensible Markup Language
- XML
- Extensible Markup Language
- XP
- eXtreme Programming
- XSS
- Cross-Site Scripting
- X-XSS
- Cross Site Scripting Protection
X
Y
- ZFS
- Z File System
Z