CVV Full Form
(Customer Verification Value)
The card security code (CSC), sometimes called Card Verification Data (CVD), Card Verification Value (CVV or CVV2), Card Verification Value Code (CVVC), Card Verification Code (CVC or CVC2), Verification Code (V-Code or V Code), or Card Code Verification (CCV) are different terms for security features for credit or debit card transactions, providing increased protection against credit card fraud.
Short Form | CVV |
Full Form | Customer Verification Value |
Category | Computing > Security |
Country | Worldwide |
Popularity | |
Other Full Form list in same category - Security
S.No. | Short Form | Full Form | Country | Popularity |
1 |
CVV |
Customer Verification Value |
Worldwide |
|
2 |
PIN |
Personal Identification Number |
Worldwide |
|
3 |
PTZ |
Pan Tilt Zoom |
Worldwide |
|
4 |
UAC |
User Account Control |
Worldwide |
|
5 |
VCK |
Visual Cryptography Kit |
Worldwide |
|
6 |
VIRUS |
Vital Information Resources Under Siege |
Worldwide |
|
7 |
WPS |
Wi-Fi Protected Setup |
Worldwide |
|
8 |
Y2K |
Year 2000 |
Worldwide |
|
9 |
SSL |
Secure Sockets Layer |
Worldwide |
|
10 |
AES |
Advanced Encryption Standard |
Worldwide |
|
11 |
MD5 |
Message-Digest algorithm 5 |
Worldwide |
|
12 |
TGT |
Ticket Granting Ticket |
Worldwide |
|
13 |
SAP |
Systems, Applications, Products |
Worldwide |
|
14 |
ECC |
Elliptical Curve Cryptography |
Worldwide |
|
15 |
CSA |
Cisco Security Agent |
Worldwide |
|
16 |
WFP |
Windows File Protection |
Worldwide |
|
17 |
NBAD |
Network Behavior Anomaly Detection |
Worldwide |
|
18 |
IDEA |
International Data Encryption Algorithm |
Worldwide |
|
19 |
CSF |
Content Sealed Format |
Worldwide |
|
20 |
PSK |
Pre-Shared Key |
Worldwide |
|
21 |
NSS |
Network Security Services |
Worldwide |
|
22 |
EFS |
Encrypting File System |
Worldwide |
|
23 |
SOP |
Same Origin Policy |
Worldwide |
|
24 |
OTP |
One Time Password |
Worldwide |
|
25 |
IDS |
Intrusion Detection System |
Worldwide |
|
26 |
MD4 |
Message-Digest algorithm 4 |
Worldwide |
|
27 |
MD |
Message Digest |
Worldwide |
|
28 |
CSS |
Content Scrambling System |
Worldwide |
|
29 |
SPF |
Sender Policy Framework |
Worldwide |
|
30 |
CSV |
Certified Server Validation |
Worldwide |
|
31 |
CA |
Certificate Authority |
Worldwide |
|
32 |
KMC |
Key Management Center |
Worldwide |
|
33 |
PCC |
Proof-Carrying Code |
Worldwide |
|
34 |
SSH |
Secure Shell |
Worldwide |
|
35 |
RAT |
Remote Access Trojan |
Worldwide |
|
36 |
Malware |
Malicious Software |
Worldwide |
|
37 |
CBC |
Cipher-Block Chaining |
Worldwide |
|
38 |
OFB |
Output FeedBack |
Worldwide |
|
39 |
DNSSEC |
Domain Name System Security Extensions |
Worldwide |
|
40 |
WYSIWYS |
What You See Is What You Sign |
Worldwide |
|
41 |
D2D |
Disk-to-Disk |
Worldwide |
|
42 |
PT |
Penetration Test |
Worldwide |
|
43 |
BSM |
Basic Security Module |
Worldwide |
|
44 |
CSP |
Critical Security Parameter |
Worldwide |
|
45 |
DPM |
Data Position Measurement |
Worldwide |
|
46 |
IPS |
Intrusion Prevention System |
Worldwide |
|
47 |
CSF |
ConfigServer Security & Firewall |
Worldwide |
|
48 |
ICF |
Internet Connection Firewall |
Worldwide |
|
49 |
PK |
Public Key |
Worldwide |
|
50 |
CCE |
Common Configuration Enumeration |
Worldwide |
|
51 |
SCAP |
Security Content Automation Protocol |
Worldwide |
|
52 |
CISSP |
Certified Information Systems Security Professional |
Worldwide |
|
53 |
RUB |
Relocatable User Backup |
Worldwide |
|
54 |
WAF |
Web Application Firewall |
Worldwide |
|
55 |
PII |
Personally Identifiable Information |
Worldwide |
|
56 |
ISC |
Internet Storm Center |
Worldwide |
|
57 |
SHA |
Secure Hash Algorithm |
Worldwide |
|
58 |
ECDSA |
Elliptic Curve Digital Signature Algorithm |
Worldwide |
|
59 |
IMAJS |
Image + JavaScript |
Worldwide |
|
60 |
MGF |
Mask Generation Function |
Worldwide |
|
61 |
ASV |
Approved Scanning Vendor |
Worldwide |
|
62 |
IV |
Initialization Vector |
Worldwide |
|
63 |
TVD |
Total Virus Defense |
Worldwide |
|
64 |
OTT |
One-Time Tape |
Worldwide |
|
65 |
OAuth |
Open Authorization |
Worldwide |
|
66 |
IA |
Information Assurance |
Worldwide |
|
67 |
RC |
Rivest’s Cipher/Ron’s Code |
Worldwide |
|
68 |
2FA |
Two-Factor Authentication |
Worldwide |
|
69 |
NIAP |
National Information Assurance Partnership |
Worldwide |
|
70 |
CCEVS |
Common Criteria Evaluation and Validation Scheme |
Worldwide |
|
71 |
CC |
Common Criteria |
Worldwide |
|
72 |
LFD |
Login Failure Daemon |
Worldwide |
|
73 |
IOC |
Indicator Of Compromise |
Worldwide |
|
74 |
CPU |
Critical Patch Update |
Worldwide |
|
75 |
PKC |
Public Key Cryptography |
Worldwide |
|
76 |
LSAT |
Linux Security Auditing Tool |
Worldwide |
|
77 |
CPA |
Chosen-Plaintext Attack |
Worldwide |
|
78 |
CPA |
Commercial Product Assurance |
Worldwide |
|