AAA制御Authentication Authorization Accounting
ACIDAtomicity Consistency Isolation Duraility
ACLAccess Control List
ADActive Directory
ADSLAsymmetric Digital Subscriber Line
AESAdvanced Encryption Standard
AHAuthentication Header
AHSAdvanced Hash Standard
AIArtificial Intelligence
AIDMAAttention Interest Desire Memory Action
ANSIAmerican National Standards Institute
APAccess Point
APIApplication Programming Interface
APOPAuthenticated Post Office Protocol
APT攻撃Advanced Persistent Threat
ARAugmented Reality
ARPAddress Resolution Protocol
ASCIIAmerican Standard Code for Information Interchange
ASLRAddress Space Layout Randomzation
ASPApplication Service Provider
ATAAdvanced Technology Attachment
AWSAmazon Web Services
B2BBusiness to Business
B2CBusiness to Consumer
BCMBusiness Continuity Management
BCPBusiness Continuity Plan
BIBusiness Intelligence
BIOSBasic Input / Output System
BNFBackus Naur Form
BPMBusiness Process Management
BPOBusiness Process Outsourcing
BPRBusiness Process Re-engineering
bpsbits per second
BSCBalanced Score Card
BYODBring Your Own Device
C&CCommand and Control
CACertificate Authority
CADComputer Aided Design
CAEComputer Aided Engineering
CALClient Access License
CALSCommerce At Light Speed
CAMComputer Aided Manufacturing
CDMACode Division Multiple Access
CDNContent Delivery Network
CGICommon Gateway Interface
CHAPChallenge Handshake Authentication Protocol
CIAConfidentiality Integrity Availability
CIDRClassless Inter-Domain Routing
CIMComputer Integrated Manufacturing
CIOChief Information Officer
CISCComplex Instruction Set Computer
CMMICapability Maturity Model Integration
CMSContents Management System
CMVPCryptographic Module Validation Program
CMYKCyan Magenta Yellow Key plate color model
CPIClock cycles Per Instruction
CPPMContent Protection for Prerecorded Media
CPRMContent Protection for Recordable Media
CPSCyber-Physical System
CPUCentral Processing Unit
CR/LFCarrige Return / Line Feed
CRCCyclic Redundancy Check
CRLCertificate Revocation List
CRMCustomer Relationship Management
CRTCathode Ray Tube
CSFCritical Success Factor
CSIRTComputer Security Incident Response Team
CSMA/CACarrier Sense Multiple Access with Collision Avoidance
CSMA/CDCarrier Sense Multiple Access / Collision Detection
CSMSCyber Security Management System
CSRCorporate Social Responsibility
CSRFCross-Site Request Forgeries
CSSCascading Style Sheets
CSVComma Separated Values
CTOChief Technology Officer
CUICharacter based User Interface
CVECommon Vulnerabilities and Exposures
CVSSCommon Vulnerability Scoring System
D2DDisk to Disk backup
D2TDisk to Tape backup
DaaSDesktop as a Service
DACDiscretionary Access Control
DATDigital Audio Tape
DATDynamic Address Translator
DBMSDataBase Management System
DDLData Definition Language
DDoS攻撃Distributed Denial of Services
DEPDevice Enrollment Program
DEPData Execution Prevention
DESData Encryption Standard
DFDData Flow Diagram
DHCPDynamic Host Configuration Protocol
DH法Diffie-Hellman key exchange
DKIMDomainKeys Identified Mail
DLNADigital Living Network Alliance
DMLData Manipulation Language
DMZDeMilitarized Zone
DNSDomain Name System
DOAData Oriented Approach
DOSDisk Operating System
DoS攻撃Denial of Services
dpidot per inch
DRAMDynamic Random Access Memory
DRMDigital Rights Management
DSADigital Signature Algorithm
DTPDeskTop Publishing
DVIDigital Visual Interface
DWHDate WareHouse
DXDigital Transformation
DXFDrawing Interchange Format
E-R図Entity Relationship diagram
EAEnterprise Architecture
EALEvaluation Assurance Level
EAPExtensible Authentication Protocol
ECElectronic Commerce
ECDHEElliptic Curve Diffie-Hellman key exchange Ephemeral
ECMEnterprise Contents Management
EDIElectronic Data Interchange
EDSAEmbedded Device Security Assurance
EMSElectronics Manufacturing Service
EOFEnd Of File
EOSElectronic Ordering System
ERMEnterprise Risk Management
ERPEnterprise Resource Planning
ESPEncapsulating Security Payload
ESSIDExtended Service Set IDentification
ETSIEuropean Telecommunications Standards Institute
EUCEnd User Computing
EUC(文字コード)Extended UNIX Code
EVMEarned Value Management
EWSEngineering WorkStation
ExifExchangeable image file
FAQFrequently Asked Questions
FARFalse Acceptance Rate
FATFile Allocation Table
FCFiber Channel
FEPFront End Processor
FIFOFirst In First Out
FIPSFederal Information Processing Standard
FQDNFully Qualified Domain Name
FRRFalse Rejection Rate
FTPFile Transfer Protocol
FTTHFiber To The Home
FWFire Wall
GDPRGeneral Data Protection Regulation
GIFGraphics Interchange Format
GISGeographical Information System
GPSGlobal Positioning System
GPUGraphics Processing Unit
GUIGraphical User Interface
GWGate Way
HaaSHardware as a Service
HDCPHigh-bandwidth Digital Content Protection
HDDHard Disk Drive
HDMIHigh Definition Multimedia Interface
HIDSHost-based Intrusion Detection System
HIPSHost-based Intrusion Prevention System
HMACHash-based Message Authentication Code
HRMHuman Resource Management
HSMHardware Security Module
HSTSHTTP(HyperText Transfer Protocol) Strict Transport Security
HTMLHyperText Markup Language
HTTPHyperText Transfer Protocol
HTTPSHTTP(HyperText Transfer Protocol) over SSL(Secure Sockets Layer) / TLS(Transport Layer Security)
I/OInput Output
IaaSInfrastructure as a Service
ICANNthe Internet Corporation for Assigned Names and Numbers
ICMPInternet Control Message Protocol
IDCInternet Data Center
IDEIntegrated Drive Electronics
IDSIntrusion Detection System
IECInternational Electrotechnical Commission
IEEEInstitute of Electrical and Electronic Engineers
IETFInternet Engineering Task Force
IISInternet Information Services
IKEInternet Key Exchange
IMAPInternet Message Access Protocol
IoEInternet of Everything
IoTInternet of Things
IPInternet Protocol
IPAInformation-technology Promotion Agency
IPSIntrusion Prevention System
ISDNIntegrated Services Digital Network
ISMSInformation Security Management System
ISPInternet Service Provider
ITILInformation Technology Infrastructure Library
JANJapanese Article Number
JISJapanese Industrial Standards
JPEGJoint Photographic Experts Group
JSONJavaScript Object Notation
JSTJapan Standard Time
JVMJava Virtual Machine
JVNJapan Vulnerability Notes
KPIKey Performance Indicator
LANLocal Area Network
LAPBLink Access Procedure Balanced
LCDLiquid Crystal Display
LCMLife Cycle Mnagement
LDAPLightweight Directory Access Protocol
LFULeast Frequently Used
LIFOLast In First Out
LPOLanding Page Optimization
LPWALow Power Wide Area
LRULeast Recently Used
LSILarge Scale Integration
LTELong Term Evolution
M2MMachine to Machine
MaaSMobility as a Service
MACMandatory Access Control
MACMessage Authentication Code
MAC(アドレス)Media Access Control
MD5Message Digest 5
MDAMail Delivery Agent
MDMMobile Device Management
MIDIMusical Instrument Digital Interface
MIMEMultipurpose Internet Mail Extensions
MIPSMillion Instruction Per Second
MITB攻撃Man In The Browser
MITM攻撃Man In The Middle
MOTManagement Of Technology
MPEGMoving Picture Experts Group
MRMixed Raality
MRAMail Retrieval Agent
MRPMaterial Requirements Planning
MTAMail Transfer Agent
MTBFMean Time Between Failure
MTTRMean Time To Repair
MUAMail User Agent
MVNOMobile Virtual Network Operator
NAPTNetwork Address Port Translation
NASNetwork Attached Storage
NATNetwork Address Translation
NDANon-Disclosure Agreement
NFCNear Field Communication
NFSNetwork File System
NFVNetwork Functions Virtualization
NICNetwork Interface Card
NIDSNetwork-based Intrusion Detection System
NIPSNetwork-based Intrusion Prevention System
NISCNational center of Incident readiness and Strategy for Cybersecurity
NISTNational Institute of Standards and Technology
NTPNetwork Time Protocol
O2OOnline to Offline
OASISOrganization for Advancement of Structured Information Standards
OCROptical Character Reader
OCSPOnline Certificate Status Protocol
ODBCOpen DataBase Connectivity
OLAPOnLine Analytical Processing
OLEObject Linking and Embedding
OP25BOutbound Port 25 Blocking
OSOperating System
OSI基本参照モデルOpen Systems Interconnection
OSSOpen Souece Software
OTPOne Time Password
P2PPeer to Peer
PaaSPlatform as a Service
PAPPassword Authentication Protocol
PBXPrivate Branch eXchange
PCMPulse Code Modulation
PDFPortable Document Format
PDMProduct Data Management
PERTProgram Evaluation and Review Technique
PFSPerfect Forward Secrecy
PINPersonal Identification Number
PKIPublic Key Infrastructure
PMBOKProject Management Body Of Knowledge
PMSPersonal information protection Management Systems
PNGPortable Network Graphics
POCProof Of Concept
PoEPower over Ethernet
POODLEPadding Oracle On Downgraded Legacy Encryption
POPPost Office Protocol
POSPoint Of Sales
PPMProduct Portfolio Management
PPPPoint to Point Protocol
PPTPPoint to Point Tunneling Protocol
PVPage Views
QoSQuality of Service
RARegistration Authority
RADRapid Application Development
RADIUSRemote Authentication Dial In User Service
RAIDRedundant Arrays of Inexpensive Disks
RAMRandom Access Memory
RARPReverse Address Resolution Protocol
RASRemote Access Server
RASISReliability Availability Serviceability Integrity Security
RDAPRegistration Data Access Protocol
RDBRelational DataBase
RDBMSRelational DataBase Management System
RDPRemote Desktop Protocol
RFCRequest For Comments
RFIRequest For Information
RFIDRadio Frequency IDentification
RFM分析Recency Frequency Monetary
RFPRequest For Proposal
RFQRequest For Quotation
RGBRed Green Blue color model
RISCReduced Instruction Set Computer
RLORight-to-Left Override
RMONRemote network MONitoring
rmprevolution per minute
ROAReturn On Assets
ROEReturn On Equity
ROIReturn On Investment
ROMRead Only Memory
RPARobotic Process Automation
RPORecovery Point Objective
RSARivest Shamir Adleman cryptosystem
RSSReally Simple Syndication
RSSRich Site Summary
RTORecovery Time Objective
S/MIMESecure / Multipurpose Internet Mail Extensions
SASecurity Association
SaaSSoftware as a Service
SAMLSecurity Assertion Markup Language
SANStorage Area Network
SASLSimple Authentication and Security Layer
SATASerial Advanced Technology Attachment
SCMSupply Chain Management
SCSISmall Computer System Interface
SDKSoftware Development Kit
SDNSoftware Defined Networking
SEOSearch Engine Optimization
SFASales Force Automation
SGMLStandard Generalized Markup Language
SHASecure Hash Algorithm
SISystem Integration
SIMSubscriber Identity Module
SLAService Level Agreement
SLMService Level Management
SMSShort Message Service
SMTPSimple Mail Transfer Protocol
SNMPSimple Network Management Protocol
SNSSocial Networking Service
SNTPSimple Network Time Protocol
SOAService Oriented Architecture
SOAPSimple Object Access Protocol
SPECStandard Performance Evaluation Corporation
SPFSender Policy Framework
SPOFSingle Point Of Failure
SQLStructred Query Language
SRAMStatic Random Access Memory
SSDSolid State Drive
SSHSecure SHell
SSIDService Set IDentifier
SSLSecure Sockets Layer
SSOSingle Sign On
STIXStructured Threat Information eXpression
SWOTStrength Weakness Opportunity Threat
TCGTrusted Computing Group
TCOTotal Cost of Ownership
TCP/IPTransmission Control Protocol / Internet Protocol
TDMATime Division Multiple Access
TKIPTemporal Key Integrity Protocol
TLDTop Level Domain
TLSTransport Layer Security
TOCTheory Of Constraints
TPMTrusted Platform Module
TSATime Stamping Authority
TTLTime To Live
UDPUser Datagram Protocol
UMLUnified Modeling Language
UPSUninterruptible Power Supply
URLUniform Resource Locator
USBUniversal Serial Bus
UTCUniversal Time Coordinated
UTPUnshielded Twist Pair cable
VDIVirtual Desktop Infrastructure
VGAVideo Graphics Array
VLANVirtual Local Area Network
VMVirtual Machine
VoIPVoice over Internet Protocol
VPNVirtual Private Network
VRVirtual Reality
VRAMVideo Random Access Memory
WAFWeb Application Firewall
WANWide Area Network
WBSWork Breakdown Structure
WEPWired Equivalent Privacy
WINSWindows Internet Name Service
WPAWi-Fi Protected Access
WWWWorld Wide Web
XBRLeXtensible Business Reporting Language
XKMSXML(eXtensible Markup Language) Key Management Specification
XMLeXtensible Markup Language
XSSCross [X] Site Scripting