Looks like no one added any tags here yet for you.
Confidentiality, Integrity, Availability
CIA
Authentication, Authorization, Accounting
AAA
Access Control Lists
ACLs
Advanced Persistent Threats
APTs
Open-Source Intelligence
OSINT
Command & Control
C2
Remote Access Trojan
RAT
Intrusion Detection System
IDS
Host-based Intrusion Detection System
HIDS
Network-based Intrusion Detection System
NIDS
Intrusion Prevention System
IPS
Data Loss Prevention
DLP
Basic Input Output System
BIOS
Unified Extensible Firmware Interface
UEFI
Network Attached Storage
NAS
Storage Area Network
SAN
Self-Encrypting Drive
SED
Trusted Platform Module
TPM
Hardware Security Module
HSM
Anti-Virus
AV
Endpoint Protection Platform
EPP
Endpoint Detection and Response
EDR
User and Entity Behavior Analytics
UEBA
Artificial Intelligence
AI
Advanced Threat Protection
ATP
Advanced Endpoint Protection
AEP
NextGen Anti-virus
NGAV
Wi-Fi Protected Access 2
WPA2
Advanced Encryption Standard
AES
Subscriber Identity Module
SIM
International mobile Subscriber Identity
IMSI
Transport Layer Security
TLS
Bring Your Own Device
BYOD
Mobile Device Management
MDM
Choose Your Own Device
CYOD
File Transfer Protocl
FTP
Secure Shell
SSH
Simple Mail Transfer Protocol
SMTP
Domain Name System
DNS
Trivial File Transfer Protocol
TFTP
Hyper Text Transfer Protocol
HTTP
Post Office Protocol v3
POP3
Network News Transfer Protocol
NNTP
Remote Procedure Call
RPC
Internet Message Access Protocol
IMAP
Simple Network Management Protocol
SNMP
Lightweight Directory Access Protocol
LDAP
Server Message Block
SMB
Microsoft SQL server
ms-sql-s
Remote Authentication Dial-In Service
RADIUS
Layer 2 Tunnel Protocol
L2TP
Point-to-Point Tunneling Protocol
PPTP
Fibre Channel Internet Protocol
FCIP
Remote Desktop Protocol
RDP
Attribute-based Access Control
ABAC
Application Programming Interface
API
Address Resolution Protocol
ARP
Acceptable User Policy
AUP
Business Availability Center
BAC
Business Impact Analysis
BIA
Cloud Access Security Broker
CASB