1
2FA
Two-Factor Authentication
2
ACL
Access Control List
3
AI
Artificial Intelligence
4
API
Application Programming Interface
5
BPM
Business Process Management
6
CCB
Change Control Board
7
CMS
Content Management System
9
CRM
Customer Relationship Management
10
CSRF
Cross-Site Request Forgery
11
CSV
Comma-Separated Values
13
DBMS
Database Management System
15
ESM
Expanded Security Maintenance
16
HTML
HyperText Markup Language
17
ICT
Information and Communications Technology
18
JSON
JavaScript Object Notation
19
KAA
Ketroute AI Assist
20
KPI
Key Performance Indicators
21
MDA
Ministries, Departments, and Agencies
22
MFA
Multi-Factor Authentication
23
MVC
Model-View-Controller
24
MYSQL
My Structured Query Language
25
NLP
Natural Language Processing
26
OAT
Operational Acceptance Testing
27
OAT
Operational Acceptance Testing
28
OOP
Object-Oriented Programming
30
PIR
Post-Implementation Review
31
PIT
Project Implementation Team
32
PIU
Project Implementation Unit
38
RBAC
Role-Based Access Control
39
SFTP
Secure File Transfer Protocol
40
SIT
System Integration Testing
41
SQL
Structured Query Language
44
SSL
Secure Sockets Layer
47
ToR
Terms of Reference
48
ToR
Terms of Reference
49
UAT
User Acceptance Testing
50
VPN
Virtual Private Network
51
VPN
Virtual Private Network
52
WSDL
Web Services Description Language
53
XML
Extensible Markup Language
54
XSS
Cross-Site Scripting