[Cyber & Security] abbreviations

  • SDSI  (Computing > Cyber & Security)

    Stand For:  Simple Distributed Security Infrastructure

    • Example: How is Simple Distributed Security Infrastructure abbreviated? SDSI stands for Simple Distributed Security Infrastructure. SDSI is defined as Simple Distributed Security Infrastructure frequently.

    Example        More Details

  • ESP  (Computing > Cyber & Security)

    Stand For:  Encapsulating Security Payload

    • Example: The encapsulating security payload protocol provides confidentiality, authentication, integrity, and anti-replay service between a pair of hosts, between a pair of gateways, or between a gateway and a host.

    Example        More Details

  • SHA  (Computing > Cyber & Security)

    Stand For:  Secure Hash Algorithm

    • Example: 1 Secure Hash Algorithm • Goal is to compute a unique hash value for any input “message”, where a “message” can be anything. • SHA-256 (widely used) returns a 256-bit hash value (a.k.a.

    Example        More Details

  • MB  (Computing > Cyber & Security)

    Stand For:  MegaBytes

    • Example: Kilobytes Megabytes Gigabytes Terabytes. The size of information in the computer is measured in kilobytes, megabytes, gigabytes, and terabytes. In this section, we'll look at common sizes you would see in real life and learn how to reason about various numbers of bytes.

    Example        More Details

  • BT  (Computing > Cyber & Security)

    Stand For:  Back Trace

    • Example: The RtlCaptureStackBackTrace routine captures a stack back trace by walking up the stack and recording the information for each frame.

    Example        More Details

  • PKS  (Computing > Cyber & Security)

    Stand For:  Public Key Server

    • Example: MIT PGP Public Key Server Help: Extracting keys / Submitting keys / Email interface / About this server / FAQ Related Info: Information about PGP / Extract a key.

    Example        More Details

  • CHAP  (Computing > Cyber & Security)

    Stand For:  Challenge Handshake Authentication Protocol

    • Example: Point to point tunneling protocol is a Microsoft VPN technology that: Uses standard authentication protocols, such as Challenge Handshake Authentication Protocol (CHAP) or Password Authentication Protocol (PAP).

    Example        More Details

  • CCSP  (Computing > Cyber & Security)

    Stand For:  Cisco Certified Security Professional


    Example        More Details