Java virtual machine
K
Key distribution center
Key encryption key
Key generator
Key generation and distribution
Key management facility
Key management message
Key stream generator
Key signing key
Key wrapping key
L
Local-area network
Link access procedure B
Liquid crystal display
Link control protocol
Local delivery agent
Lightweight directory access protocol
LanManager
Local multipoint distribution service
Link manager protocol
Line-of-sight
Local registration authority
Layer 2 tunneling protocol
Lightweight transport protocol
M
Mandatory Access Control/Media Access Control/Medium Access Control/ message authentication code
Metropolitan area network
Master boot record
Mobile commerce
Message digest
Media gateway control protocol
Message handling system
Message integrity check/message integrity code/mandatory integrity control
Musical instrument digital interface
Meet-in-the-middle (attack)
Multipurpose Internet mail extensions
Mobile identification number
Mobile Internet protocol
Man-in-the-middle (attack)
Million instructions per second
Multimedia messaging service
Management message
Memorandum of agreement
Memorandum of understanding
Moving picture coding experts group
Mobile subscriber
Module software interface
Mobile subscriber integrated services digital network
Message security protocol
Mean-time-between-failures
Mean-time-between-outages
Maximum tolerable downtime
Mobile trusted module
Mean-time-to-data loss
Mean-time-to-failure
Mean-time-to-recovery
Mean-time-to-repair
Mean-time-to-restore
N
Network Access Control
Negative acknowledgment
Network Access Protection
Network address and port translation
Network access server
Network Address Translation
Network behavior analysis
Network Control Protocol
Nondiscretionary access control
Network Basic Input/Output System
Network Forensic Analysis Tool
Network file system/network file sharing
Next header
National infrastructure advisory council
National information assurance partnership
Network interface card
Network interface device
National infrastructure protection center
Network information system
National Institute of Standards and Technology
National Institute of Standards and Technology Interagency Report
Nonline-of-sight (non LOS)
Network News Transfer Protocol
Name server
National Security Agency
NT file system
NT LanManager
Network Time Protocol
National Vulnerability Database
National Voluntary Laboratory Accreditation Program
O
Organization for the Advancement of Structured Information Standards
Online Certificate Status Protocol
Organization for Economic Co-operation and Development
Output feedback (mode)
Object linking and embedding
Object-oriented design
Object-oriented programming
Object naming service
Out-of-band
Open Specification for Pretty Good Privacy
Operating system
Open system environment
Open system interconnection
Open shortest path first
Open-source software
Over-the-air rekeying
One-time password
Open vulnerability and assessment language
P
Peer-to-peer
Platform for privacy preferences project
Protected access credential/privilege attribute certificate
Packet assembly and disassembly/peer authorization database
Personal-Area Network
Password authentication protocol/policy access point
Port address translation
Parallel ATA (advanced technology attachment)
Pre-boot authentication
Policy-Based Access Control
Pre-boot environment
Private branch exchange
Personal computer
Payment card industry/personal identity verification card issuer
Payment card industry data security standard
Personal computer memory card international association
Process control network
IP payload compression protocol
Process control system
Personal digital assistant
Portable document format
Policy decision point
Protective distribution systems
Protected Extensible Authentication Protocol
Privacy enhanced mail
Policy enforcement point
Program evaluation and review technique
Pretty Good Privacy
PHP hypertext preprocessor
Privacy impact assessment
Personally identifiable information
Personal identification number
Policy information point
Personal identity verification
Public key cryptography standard
Public key infrastructure
Privacy key management