DDoS
Distributed Denial of Service
ACL
Access Control List
IaaS
Infrastructure as a Service
ABAC
Attribute-based Access Control
WPA
WiFi Protected Access
RAT
Remote Access Trojan
UTM
Unified Threat Management
SED
Self Encrypting Drive
SAML
Security Assertion Markup Language
SHA
Secure Hashing Algorithm
MITM
Man-in-the-Middle
HIDS
Host-based Intrusion Detection System
TPM
Trusted Platform Module
RADIUS
Remote Authentication Dial-In User Service
AES
Advanced Encryption Standard
NFC
Near-Field Communication
ESP
Encapsulated Security Payload
UEFI
Unified Extensible Firmware Interface
CHAP
Challenge Handshake Authentication Protocol
RSA
Rivest, Shamir, & Adleman
IV
Initialization Vector
SRTP
Secure Real-time Transport Protocol
RAID
Redundant Array of Inexpensive Disks
TACACS+
Terminal Access Controller Access-Control System Plus
CCMP
Counter-Mode with Cipher Block Chaining Message Authentication Protocol