Glossary of Cyber Security Terms, Abbreviations and Acronyms

This page contains a collection of acronyms and abbreviations which are often used in the cyber security / information security industry.

There are included also acronyms from related fields such as:

  • Information technology
  • Operational technology
  • Software engineering
  • Telecommunications
  • Military and Defense
  • Business and Corporate environment

Hint: Use the Search function to quickly filter through the acronyms.

AcronymMeaning
2FA2-factor Authentication
AAAAuthentication, Authorization, and Accounting
ABACAttribute Based Access Control
ABIApplication Binary Interface
ACEAccessData Certified Examiner
ACEAccess Control Entry
ACEArbitrary Code Execution
ACLAccess Control Lists
ADBAndroid Debug Bridge
ADFSActive Directory Federation Services
ADActive Directory
AESAdvanced Encryption Standard
AFAIKAs Far As I Know
AFKAway from Keyboard
AIArtificial Intelligence
AJAXAsynchronous JavaScript And XML
ALEAnnualized Loss Expectancy
AMSAsset Management System
ANSIAmerican National Standards Institute
APIApplication Programming Interface
APKAndroid Package
APTAdvanced Persistent Threat
APTApplication Penetration Testing
APAccess Point
AROAnnualised Rate of Occurrence
ASCIIAmerican Standard Code for Information Interchange
ASLRAddress Space Layout Randomization
ASNAutonomous System Number
ASVApproved Scanning Vendors
ASApplication Server
ASAutonomous System (networking)
ATMAt the moment
ATMAutomated Teller Machine
ATPAdvanced Threat Protection (Microsoft Defender)
AUPAcceptable Use Policy
AVAntivirus
AVAsset Value
AWSAmazon Web Services
AXFRAuthoritative Zone Transfer (DNS)
BAUBusiness As Usual
BBSBulletin Board System
BCCBlind Carbon Copy
BCRsBinding Corporate Rules (for intra group data transfers)
BERBit Error Rate
BGPBorder Gateway Protocol
BIABurned-in Address
BIABusiness Impact Analysis
BLOBBinary Large Object
BMPBitmap Image format
BoFBuffer Overflow
BPDUBridge Protocol Data Unit
BSDBerkeley Software Distribution (UNIX)
BSODBlue Screen of Death (Windows crash)
BSSIDBasic Service Set Identifier
BSSBlock Started by Symbol
BTWBy the way
BYODBring Your Own Device
C2Command and Control
CACEExcida IEC 62443 Certified Automation Cybersecurity Expert
CACSExcida IEC 62443 Certified Automation Cybersecurity Specialist
CAMSIMI Certfied Access Management Specialist
CAMComputer-aided Manufacturing
CAPTCHACompletely Automated Public Turing test to tell Computers and Humans Apart
CAP(ISC)2 Certified Authorization Professional
CASEEC Council Certified Application Security Engineer (.NET or Java)
CASMGAQM Certified Agile Scrum Master
CASSTGAQM Certified Advanced Software Security Tester
CAWFEIACIS Certified Advanced Windows Forensic Examiner
CACertification Authority
CBCCipher Block Chaining
CBSPCloud-based Security Providers
CCArCisco Certified Architect
CCDECisco Certified Design Expert
CCEISFCE Certified Computer Examiner
CCFEIACRB Certified Computer Forensics Examiner
CCIE EntCisco Certified Internetwork Expert - Enterprise Infrastructure
CCISOEC Council Certified Information Security Officer
CCNACisco Certified Network Associate
CCNP EntCisco Certified Network Professional - Enterprise
CCNP SecCisco Certified Network Professional - Security
CCPACalifornia’s Consumer Privacy Act
CCRMPIBITGQ Certified in Managing Cyber Security Risk
CCSACheckpoint Certified Security Administrator
CCSCCertNexus Cyber Secure Coder
CCSECheckpoint Certified Security Expert
CCSMCheckpoint Certified Security Master
CCSP(ISC)2 Certified Cloud Security Professional
CCTHPIACRB Certified Cyber Threat Hunting Professional
CCTVClosed Circuit Television
CCTCisco Certified Technician
CCCarbon Copy
CCCredit Cards (Carding fraud)
CDECardholder Data Environemnt (network segment containing credit cards)
CDMACode Division Multiple Access
CDNContent Delivery Network
CDPSEISACA Certified Data Privacy Solutions Engineer
CDPCisco Discovery Protocol
CDPClean Desk Policy
CDPIMI Certified in Data Protection
CDRPIACRB Certified Data Recovery Professional
CECSLunarline Certified Expert in Cloud Security
CEHEC Council Certified Ethical Hacker
CEIALunarline Certified Expert Independent Assessor
CEIMLunarline Certified Expert Incident Manager
CEOChief Executive Officer
CEPMLunarline Certified Expert Program Manager
CEPPLunarline Certified Expert Privacy Professional
CEPTIACRB Certified Expert Penetration Tester
CEREAIACRB Certified Expert Reserve Engineering Analyst
CERPLunarline Certified Expert RMF Professional
CESALunarline Certified Expert Security Analyst
CESELunarline Certified Expert Security Executive
CESOLunarline Certified Expert Security Officer
CFAAComputer Fraud and Abuse Act
CFAGAQM Certified Forensic Analyst
CFCEIACIS Certified Forensic Computer Examiner
CFOChief Financial Officer
CFRCertNexus CyberSec First Responder
CFSROpenText Certified Forensic Security Responder
CGEITISACA Certified in the Governance of Enterprise IT
CGICommon Gateway Interface
CHATISECOM Certified Hacker Analyst Trainer
CHAISECOM Certified Hacker Analyst
CHFIEC Council Computer Hacking Forensics Investigator
CIAMIdentify Management Institute Certified Identify and Access Manager
CIAConfidentiality, Integrity, Availability
CICCyber Intelligence Center
CIDRClassless Inter-Domain Routing
CIFSCommon Internet File System
CIGEIMI Certified Identity Governance Expert
CIISec ICSFCIISec Information and Cybersecurity Fundamentals
CIISecChartered Institute of Information Security
CIMPIMI Certified Identity Management Professional
CIOTSPCertNexus Certified Internet of Things Security Practitioner
CIOChief Information Officer
CIPAIMI Certified Identity Protection comptia-advanced-security-practitioner
CIPPIAPP Certified Information Privacy Professional
CIPTIAPP Certified Information Privacy Technologist
CIRM FdnIBITGQ Cyber Incident Response Management Foundation
CIRTComputer Incident Response Team
CISAISACA Certified Information Systems Auditor
CISMISACA Certified Information Security Manager
CISOChief Information Security Officer
CISPGAQM Certified Information Security Professional
CISRMIBITGQ Certified ISO 27005 Information Security Management Specialist Risk Management
CISSMGAQM Certified Information Systems Security Manager
CISSP(ISC)2 Certified Information Systems Security Professional
CISSTGAQM Certified Information systems Security Tester
CISTIMI Certfied Identity and Security Technologist
CIS FIBITGQ Certified ISO 27001 Information Security Management Specialist Foundation
CIS IAIBITGQ Certified ISO 27001 Information Security Management Specialist Internal Auditor
CIS LAIBITGQ Certified ISO 27001 Information Security Management Specialist Lead Auditor
CIS LIIBITGQ Certified ISO 27001 Information Security Management Specialist Lead Implementer
CIS RMIBITGQ Certified ISO 27005 Information Security Management Specialist Risk Management
CISCenter for Internet Security
CITGPIBITGQ Certified in Implementing IT Governance - Foundation & Principles
CI/CDContinuous Integration and either Continuous Delivery or Continuous Deployment
CICritical Infrastructure
CLICommand-line Interface
CMDBConfiguration Management Database
CMDBContent Management Database
CMFEIACRB Certified Mobile Forensics Examiner
CMOChief Marketing Officer
CMSContent Management System
CMWAPTIACRB Certified Mobile and Web App Penetration Tester
CNACertification and Accreditation
CNDAEC Council Certified Network Defense Architect
CNDEC Council Certified Network Defender
COOChief Operating Officer
CORSCross-Origin Resource Sharing
CPCCore Protection System
CPDGAQM Certified Project Director
CPECommon Platform Enumeration
CPTIACRB Certified Penetration Tester
CRCCyclical Redundancy Check
CREAIACRB Certified Reverse Engineering Analyst
CREST CCSASCREST Certified Simulated Attack Specialist
CREST CCTCREST Certified Infrastructure Tester
CREST CHIACREST Certified Host intrustion Analyst
CREST CMRECREST Certified Malware Reverse Engineer
CREST CNIACREST Certified Network Intrusion Analyst
CREST CPIACREST Practitioner Intrusion Analyst
CREST CPSACREST Practitioner Security Analyst
CREST CPTIACREST Practitioner Threat Intelligence Analyst
CREST CRIACREST Registered Intrusion Analyst
CREST CRTSACREST Registered Technical Security Architect
CREST CRTCREST Registered Penetration Tester
CREST CSAMCREST Certified Simulated Attack Manager
CREST CSASCREST Certified Simulated Attack Specialist
CREST CTIMCREST Certified Threat Intelligence Manager
CREST CWATCREST Certified Web Application Tester
CREST CWSCREST Certified Wireless Specialist
CREST RTIACREST Registered Threat Intelligence Analyst
CRESTCouncil for Registered Ethical Security Testers
CRFSIMI Certified Red Flag Specialist
CRISCISACA Certified in Risk and Information Systems Control
CRMCustomer Relations Management
CROChief Revenue Officer
CRTOPIACRB Certified Red Team Operations Professional
CRUDCreate, Read, Update, Destroy
CSAECyber Struggle AEGIS
CSAPIACRB Certified Security Awareness Practitioner
CSA CCSKCloud Security Alliance Certificate of Cloud Security Knowledge
CSA CGCCloud Security Alliance Cloud Governance & Compliance
CSAConsultant Service Agreement
CSAEC Council Certified SOC Analyst
CSBAQAI Certified Software Business Analyst
CSCUEC Council Certified Secure Computer User
CSFACSIAC CyberSecurity Forensic Analyst
CSIRTComputer Security Incident Response Team
CSMA/CDCarrier Sense Multiple Access with Collision Detection
CSMGAQM Certified Scrum Master
CSPRNGCryptographically Secure Pseudo-Random Number Generator
CSPContent Security Policy
CSPGAQM Certified SAFe Practitioner
CSRFCross-Site Request Forgery
CSRCyber Struggle Ranger
CSSAIACRB Certified SCADA Security Architect
CSSLP(ISC)2 Certified Secure Software Lifecycle Professional
CSSTGAQM Certified Software Security Tester
CSSCascading Style Sheets
CSVComma-separated Values
CSWSHCross-Site WebSocket Hijacking
CSX-FIBITGQ Cyber Incident Response Management Foundation
CSX-PAISACA Cybersecurity Packet Analysis Certificate
CSX-PISACA Cybersecurity Practitioner
CSX-TISACA Cybersecurity Technical Foundation
CTFCapture the Flag
CTIAEC Council Certified Threat intelligence Analyst
CTICyber Threat Intelligence
CTOpsCyber Threat Operations
CTOChief Technology Officer
CTRClick-through Rate
CUCMCisco Unified Communications Manager
CVECommon Vulnerabilities and Exposures
CVSSCommon Vulnerability Scoring System
CWECommon Weakness Enumeration
CWContent Warning
CySA+CompTIA Cybersecurity Analyst+
C CS FIBITGQ Certified Cyber Security Foundation
C&ACertification and Accreditation
C&CCommand and Control
C)CSOMile2 Certified Cloud Security Officer
C)DFEMile2 Certified Digital Forensics Examiner
C)ISCAPMile2 Information Systems Certification and Accredidation Professional
C)ISMS-LAMile2 Certified Information security Management Systems Lead Auditor
C)ISSAMile2 Certified Information Systems Security Auditor
C)ISSMMile2 Certified Information Systems Security Manager
C)ISSOMile2 Certified Information Systems Security Officer
C)NFEMile2 Certified Network Forensics Examiner
C)PEHMile2 Certified Professional Ethical Hacker
C)PSHMile2 Certified Powershell Hacker
C)PTCMile2 Certified Penetration Testing Expert
C)PTEMile2 Certified Penetration Testing Engineer
C)SLOMile2 Certified Security Leadership Officer
C)SPMile2 Certified Security Principles
C)VAMile2 Certified Vulnerability Assessor
C)VCPMile2 Certified Virtualization & Cloud Principles
C)VEMile2 Certified Virtualization Engineer
C)VFEMile2 Certified Virtualization Forensics Examiner
DACLDiscretionary Access Control List
DACRPDRI Associate Cyber Resilience Professional
DAODirect Access Object
DASTDynamic Application Security Testing
DBADatabase Administrator
DCBCADRI Certified Business Continuity Auditor
DCBCLADRI Certified Business Continuity Lead Auditor
DCCRPDRI Certified Cyber Resilience Professional
DCOMDistributed Component Object Model
DCPPDSCI Certified Privacy Professional
DCRMPDRI Certified Risk Management Professional
DCSADefense Counterintelligence and Security Agency
DCSData Communication Systems
DCSDistributed Control System
DCData Center
DCDomain Controller (Active Directory)
DDEDynamic Data Exchange
DDoSDistributed Denial of Service
DESData Encryption Standard
DevNet ACisco DevNet Associate
DevNet ProCisco DevNet Professional
DFIRDigital Forensics Incident Response
DHDiffie-Hellman key exchange
DISADefense Information Systems Agency
DKIMDomain Keys Identified Mail
DLLDynamic-link Library
DLPData Loss Prevention
DMARCDomain-based Message Authentication, Reporting & Conformance
DMADirect Memory Access
DMZDemilitarized Zone
DMDirect Message
DNSDeferred Net Settlement (banking)
DNSDomain Name System
DNDistinguished Name (LDAP)
DOBDate of Birth
DOMDocument Object Model
DoSDenial of Service
DPAPIData Protection API
DPAData Processing Agreement
DPAData Protection Act (UK law)
DPIAData Protection Impact Assessment
DPPData and Privacy Protection
DRACDell Remote Access Control
DRIDisaster Recovery Institute
DRMDigital Rights Management
DRPDisaster Recovery Planning
DRDisaster Recovery
DSADigital Signature Algorithm
DSCIData Security Council of India
DTPDynamic Trunking Protocol (Cisco)
EBSAmazon Elastic Block Store
eCDFPeLearnSecurity Certified Digital Forensics Professional
ECESEC Council Certified Encryption Specialist
ECIHEC Council Certified Incident Handler
eCIReLearnSecurity Certified Incident Responder
eCMAPeLearnSecurity Certified Malware Analysis Professional
eCPPTeLearnSecurity Certified Professional Penetration Tester
eCPTXeLearnSecurity Certified Penetration Tester eXtreme
eCREeLearnSecurity Certified Reverse Engineer
ECSAEC Council Certified Security Analyst
ECSSEC Council Certified Security Specialist
eCTHPeLearnSecurity Certified Threat Hunting Professional
eCXDeLearnSecurity Certified eXploit Developer
EDRPEC Council Disaster Recovery Professional
EDREndpoint Detection and Response
EEHFEXIN Ethical Hacking Foundation
EEXIN ISMEXIN Information Security Management Expert
EFFElectronic Frontier Foundation
EFExposure Factor
EICARAntivirus test file
EIGRPEnhanced Interior Gateway Routing Protocol
EISMEC Council Information Security Manager
EITCA/ISEITCA/IS Information Security Certificate
eJPTeLearnSecurity Junior Penetration Tester
ELFExecutable and Linkable Format
ELEngagement Letter
eMAPTeLearnSecurity Mobile Application Penetration Tester
EMRElectromagnetic Radiation
EnCEOpenText EnCase Certified Examiner
eNDPeLearnSecurity Network Defense Professional
EOLEnd of Life
EOPElevation/Escalation of Privilege
EOREmployer of Record
EPDPEEXIN Privacy and Data Protection Essentials
EPDPFEXIN Privacy and Data Protection Foundation
EPDPPEXIN Privacy and Data Protection Practitioner
EPTExternal Penetration Testing
ERPEnterprise Resource Planning
ESEnterprise Security
ETAEwil Twin Attack (Wi-Fi)
EVPExecutive Vice President
eWDPeLearnSecurity Web Defense Professional
eWPTXeLearnSecurity Web Application Penetration Tester eXtreme
eWPTeLearnSecurity Web Application Penetration Tester
EXIN CITEXIN Cyber & IT Security
EXIN PCAEXIN Professional Cloud Administrator
EXIN PCSAEXIN Professional Cloud Solution Architect
EXIN PCSerMEXIN Professional Cloud Service Manager
EXIN PCSMEXIN Professional Cloud Security Manager
F5 CAF5 Big-IP Certified Administrator
F5 CSE SecF5 Big-IP Certified Solution Expert - Security
F5 CTS APMF5 Big-IP Certified Technical Specialist - Access Policy Manager
F5 CTS DNSF5 Big-IP Certified Technical Specialist - Domain Name Services
FDEFull Disk Encryption
FERPAFamily Educational Rights and Privacy Act
FEXINEXIN Information Secourity Foundation
FIMFile Integrity Monitoring
FQDNFully Qualified Domain Name
FTCFull Time Contract
FTEFull Time Employee
FTPFile Transfer Protocol
FUDFear, Uncertainty and Doubt
FWFirewall
FYIFor Your Information
FYSAFor Your Situational Awareness
GAQMGlobal Association for Quality Management
GASFGIAC Advanced Smartphone Forensics
GAWNGIAC Assessing Wireless Networks
GBFAGIAC Battlefield Forensics and Acquisition
GCCCGIAC Critical Controls Certification
GCDAGIAC Certified Detection Analyst
GCEDGIAC Certified Enterprise Defender
GCFAGIAC Certified Forensic Analyst
GCFEGIAC Cerified Forensics Examiner
GCIAGIAC Certified Intrusion Analyst
GCIHGIAC Certified Incident Handler
GCIPGIAC Critical Infrastructure Protection
GCPEHGAQM Certified Professional Ethical Hacker
GCPMGIAC Certified Project Manager
GCPTGAQM Certified Penetration Tester
GCSAGIAC Cloud Security Automation
GCTIGIAC Cyber Threat Intelligence
GCWNGIAC Certified Windows Security Administrator
GCGarbage Collection
GDATGIAC Defending Advanced Threats
GDPRGeneral Data Protection Regulation
GDSAGIAC Defensible Security Architecture
GEOINTGeospatial Intelligence
GEVAGIAC Enterprise Vulnerability Assessor
GIACGlobal Information Assurance Certification
GICSPGIAC Global Industrial Security Professional
GISFGIAC Information Security Fundamentals
GISPGIAC Information Security Professional
GLEGGIAC Law of Data Security & Investigations
GMOBGIAC Mobile Device Security Analyst
GMONGIAC Continuous Monitoring
GNFAGIAC Network Forensic Analyst
Google ACEGoogle Associate Cloud Engineer
Google PCSAGoogle Professional Cloud Architect
Google PCSEGoogle Professional Cloud Security Engineer
GOSIGIAC Open Source Intelligence
GPENGIAC Certified Penetration Tester
GPGGNU Privacy Guard
GPOGroup Policy Object
GPPAGIAC Certified Perimeter Protection Analyst
GPPGroup Policy Preferences (Active Directory)
GPYCGIAC Python Coder
GRCGovernance, Risk and Compliance
GREMGIAC Reverse Engineering Malware
GREGeneric Routing Encapsulation
GRIDGIAC Response and Industrial Defense
GSECGIAC Security Essentials Certification
GSEGIAC Security Expert
GSLCGIAC Security Leadership Certification
GSMGlobal System for Mobile (communications)
GSNAGIAC Systems and Network Auditor
GSSPGIAC Secure Software Programmer JAVA or .NET
GSTRTGIAC Strategic Planning, Policy and Leadership
GUIDGlobally Unique Identifier
GUIGraphical User Interface
GWAPTGIAC Web Application Penetration Tester
GWEBGIAC Certified Web Application Defender
GWTGoogle Web Toolkit
GXPNGIAC Exploit Researcher and Advanced Penetration Tester
HIDSHost IDS (Intrusion Detection System)
HIPAAHealth Insurance Portability Accountability Act
HIPSHost IPS (Intrusion Prevention System)
HKCCHKEY_CURRENT_CONFIG Windows registry hive
HKCRHKEY_CLASSES_ROOT Windows registry hive
HKCUHKEY_CURRENT_USER Windows registry hive
HKLMHKEY_LOCAL_MACHINE Windows registry hive
HKUHKEY_USERS Windows registry hive
HMACHash-based Message Authentication Code.
HOFHall of Fame
HPPHTTP Parameter Pollution
HSTSHTTP Strict Transport Security
I2PInvisible Internet Project
IaaSInfrastructure as a Service
IACISInternational Association of Computer Investigative Specialists
IACRBInformation Assurance Certification Review Board
IAMIdentity Access Management
IANALI am not a lawyer
IAPPInternational Association of Privacy Professionals
IARInformation Asset Register
IASTInteractive Application Security Testing
IAVAInformation Assurance Vulnerability Alert
IAVMInformation Assurance Vulnerability Management
IBITGQInternational Board for IT Governance Qualifications
ICEIntrusion Countermeasures Electronics
ICMPInternet Control Message Protocol
ICSIncident Command System
ICSIndustrial Control System
IDEIntegrated Development Environment
IDMIdentity Management
IDORInsecure Direct Object Reference
IDSIntrusion Detection System
IDInformation Disclosure
IECInternational Electrotechnical Commission
IEEEInstitute of Electrical and Electronics Engineers
IETFInternet Engineering Task Force
IGInformation Governance
IIA CIAInstitute of Internal Auditors Certified Internal Auditor
IIAInstitute of Internal Auditors
IIBA CCAIIBA Certification in Cybersecurity Analysis
IIBAInternational Institute of Business Analysis
IIoTIndustrial Internet of Things
IIRCIf I recall correctly
IKEInternet Key Exchange
iLOHP Integrated Lights Out
IMIIdentity Management Institute
IMMAIsolate, Minimize, Monitor, Active Defense (IR)
IMPSImmediate Payment Service (banking)
IMInstant Messaging
IOCIndicator of Compromise
IoTInternet of Things
IPMIIntelligent Platform Management Interface
IPPInternet Printing Protocol
IPsecInternet Protocol Security
IPSecInternet Protocol Security
IPSIntrusion Prevention System
IPTInternal Penetration Testing
IPIntellectual Property
IPInternet Protocol
IRCInternet Relay Chat
IRLIn real life
IRMInformation Rights Management
IRPIncident Response Plan or Policy
IRIncident Response
ISACAInformation Systems Audit and Control Association
ISACInformation Sharing and Analysis Center
ISAKMPInternet Security Association Key Management Protocol
ISA CEISA Cybersecurity Expert
ISA CFSISA Certified Fundamentals Specialist
ISA CRASISA Certified Risk Assesment Specialist
ISAInternational Society of Automation
ISECOMInstitute for Security and Open Methodologies
ISMSInformation Security Management System
ISMInformation Security Manual
ISOInformation System Owner (in RMF - Risk Management Framework)
ISOInternational Organization for Standardization
ISPInternet Service Provider
ISSAFInformation Systems Security Assessment Framework
ITIL FdnITIL Foundation
ITIL MasterITIL Master
ITIL MPITIL Managing Professional
ITIL SLITIL Strategic Leader
ITILInformation Technology Infrastructure Library
ITInformation Technology
I&CInstrumentation and Control
JCEJava Cryptography Extension
JMXJava Management Extensions
JNCIA SecJuniper Networks Certified Internet Associate, Security
JNCIE SecJuniper Networks Certified Internet Expert, Security
JNCIP SecJuniper Networks Certified Internet Professional, Security
JNCIS SecJuniper Networks Certified Internet Specialist, Security
JPEGJoint Photographic Experts Group
JSONJavaScript Object Notation
JSPJakarta Server Pages
JSPJava Servlet Pages
JSJavaScript
JVMJava Virtual Machine
JWTJSON Web Token
K8SKubernetes
KCKill Chain
KLCPKali Linux Certified Professional
KMaaSKey Management as a Service
KMSKey Management Service
LAMPLinux, Apache, MySQL, and PHP
LANLocal Area Network
LDAPLightweight Directory Access Protocol
LELet's Encrypt
LFCALinux Foundation Certified IT Associate
LFCELinux Foundation Certified Engineer
LFCSLinux Foundation Certified System Administrator
LFILocal File Inclusion
LKMLoadable Kernel Modules
LLMNRLink-Local Multicast Name Resolution protocol
LMLAN Manager (Windows)
LOICLow Orbit Ion Cannon
LPALeast Privilege Access
LPELocal Privilege Escalation
LPIC-1Linux Professional Institute Certified: Linux Administrator
LPIC-2Linux Professional Institute Certified: Linux Engineer
LPIC-3Linux Professional Institute Certified: 303 Security
LPTEC Council Licensed Penetration Tester
LSASSLocal Security Authority Subsystem Service
LTELong-Term Evolution
LTSLong-Term Support
M365 EAEMicrosoft 365 Certified Enterprise Administrator Expert
MACMandatory Access Control
MACMedia Access Control (MAC address)
MACMessage Authentication Code
MACMilestone Acceptance Certificate
MD5Message Digest 5 (hash)
MDRManaged Detection and Response
MFAMulti-factor Authentication
MIMEMultipurpose Internet Mail Extensions
MISPMalware Information Sharing Platform
MitMMan-in-the-Middle
MMCMicrosoft Management Console
MOTDMessage of the day banner
MPLSMulti-Protocol Label Switching
MQMessage Queue
MRAMobile and Remote Access
MSAMaster Service Agreement
MSCTMicrosoft Security Compliance Toolkit
MSSPManaged Security Services Provider
MSMember Server (Active Directory)
MSMicrosoft
MTAMicrosoft Technology Associate
MVPMimimum Viable Product (the smallest, simplest thing that meets the criteria)
NACNetwork Access Control
NATNetwork Address Translation
NBNSNetBIOS Name Service
NCSC CCPLPNCSC Certified Cybersecurity Professional - Lead Practitioner
NCSC CCPPNCSC Certified Cybersecurity Professional - Practitioner
NCSC CCPSPNCSC Certified Cybersecurity Professional - Senior Practitioner
NCSCNational Cyber Security Centre
NCSNational Cybersecurity Strategy
NDANon-disclosure agreement
NEFTNational Electronic Funds Transfer (banking)
Net+CompTIA Network+
NFSNetwork File System
NGFWNext Generation Firewall
NIDSNetwork IDS (Intrusion Detection System)
NIPSNetwork IPS (Intrusion Prevention System)
NISTNational Institute of Science & Technology
NLANetwork Level Authentication
NOCNetwork Operations Centre
NOPNo Operation
NPENull Pointer Exception
NSE 4NSE 4 - FortiNET Network Security Professional
NSE 7NSE 7 - FortiNET Network Security Architect
NSE 8NSE 8 - Fortinet Network Security Expert
NTLMNew Technology LAN Manager (Windows)
NVDNational Vulnerability Database
OBOEOff-by-one Error
OCROptical Character Recognition
OEMOriginal Equipment Manufacturer
OOBOut-of-band
OOPObject-oriented Programming
OPSAISECOM OSSTMM Professional Security Analyst
OPSECOperations Security
OPSEISECOM OSSTMM Professional Security Expert
OPSTISECOM OSSTMM Professional Security Tester
OSCEOffensive Security Certified Expert
OSCPOffensive Security Certified Professional
OSEEOffensive Security Exploitation Expert
OSEPOffensive Security Experienced Penetration Tester
OSGIOpen Services Gateway Initiative
OSINTOpen Source Intelligence
OSPFOpen Shortest Path First
OSSTMMOpen Source Security Testing Methodology Manual
OSWEOffensive Security Web Expert
OSWPOffensive Security Wireless Professional
OTAOver-the-air programming
OTPOne-time Password
OTXOpen Threat Exchange
OTOperational Technology
OWASPOpen Web Application Security Project
OWAOutlook Web Access
OWSEISECOM OSSTMM Wireless Security Expert
P2PPeer to Peer
PaaSPlatform as a service
PACESPentester Academy Certified Enterprise Security Specialist
PAMPost-Accident Monitoring
PANPersonal Area Network
PANPrimary Account Number
PASTAProcess for Attack Simulation and Threat Analysis
PA CRTEPentester Academy Certified Red Teaming Expert
PA CRTPPentester Academy Certified Red Team Professional
PCAPPacket Capture
PCCSAPalo Alto Networks Certified Cybersecurity Associate
PCIDSSPayment Card Industry Data Security Standards
PCIPayment Card Industry
PCNSAPalo Alto Networks Certified Network Security Administrator
PCNSEPalo Alto Networks Certified Network Security Engineer
PCREPerl-compatible Regular Expressions
PDFPortable Document Format
PEBCAKProblem Exists Between Chair and Keyboard
PEBKACProblem Exists Between Keyboard And Chair.
PEBProcess Environment Block
Pentest+CompTIA Pentest+
PERSECPersonal Security (military)
PEXIN ISMEXIN Information Security Management Professional
PEPortable Executable (Windows executable)
PEPrivilege Escalation
PFSPerfect Forward Secrecy
PGPPretty Good Privacy
PHIProtected Health Information
PHRPersonal Health Record
PICPosition Independent Code
PIDProcess Identifier
PIIPersonally Identifiable Infomation
PINPersonal Identification Number
PKIPublic Key Infrastructure
PLCProgrammable Logic Controller
PLCProgrammable Logic Controllers
PLDPayload
PMIProject Management Institute
PMPProject Management Professional certification
PMProduct Manager
PMProgram Manager
PNGPortable Network Graphics
POA&MPlan of Action & Mitigation
PoCProof of Concept
PoEPower over Ethernet
POPPost Office Protocol
POPProcedure-oriented Programming
POPurchase Order
PPPoEoAPPPoE over ATM
PPPoEPoint-to-Point Protocol over Ethernet
PPPPoint-to-Point Protocol
PPPPublic Private Partnership
PPSPlant Protection System
PRNGPseudo-Random Number Generator
PSHPowershell
PSKPre-shared Key
PTESPenetration Testing Execution Standard
PTOPersonal Time Off
PTRFPenetration Test Request Form
PTRDNS pointer record (hostname -> IP)
PTRPenetration Test Request
PTPenetration Test
QRQuick Response code
QSAQuality Security Assessor
RASPRuntime Application Self-Protection
RATRemote Access Tool
RATRemote Administration Tool
RBACRole Based Access Control
RBARisk-based Assessment
RCARoot Cause Analysis
RCERemote Code Execution
RCPRemote Copy
RDPRemote Desktop Protocol
RESTRepresentational State Transfer (web services)
REXECRemote Execute
REReverse Engineering
RFIDRadio Frequency Identification (card)
RFIRemote File Inclusion
RFIRequest For Information
RFPRequest For Proposal
RFQRequest for Quotation
RHCARed Hat Certified Architect
RHCERed Hat Certified Engineer
RHCSARed Hat Certified System Administrator
RMFRisk Management Framework
RMIRemote Method Invocation
RMRecords Management
RoERules of Engagement
ROMRead-Only Medium
ROMRead-Only Memory
ROPARecord of Processing Activity (GDPR article 30)
ROPReturn Oriented Programming
RPCRemote Procedure Call
RPORecovery Point Objective
RSARivest-Shamir-Adleman (encryption)
RSHRemote Shell
RTFMRead The Fucking Manual
RTGSReal-Time Gross Settlement (banking)
RTORecovery Time Objective
RTPReal-time Transport Protocol
SaaSSecurity as a Service
SaaSSoftware as a Service
SABSA SCFSABSA Chartered Security Architect - Foundation Certificate
SABSA SCMSABSA Chartered Security Architect - Master Certificate
SABSA SCPSABSA Chartered Security Architect - Practitioner Certificate
SAMLSecurity Assertion Markup Language
SANSSysAdmin Audit Network Security institute
SASLSimple Authentication and Security Layer
SASTStatic Application Security Testing
SASecurity Association (VPN)
SASituational Awareness
SBCSession Border Controller
SBCSingle Board Computer
SCADASupervisory Control And Data Acquisition
SCASoftware Composition Analysis
SCASUSE Certified Administrator
SCCMSystem Center Configuration Manager
SCCsStandard Contractual Clauses
SCDSource Code Disclosure
SCESUSE Certified Engineer
SDASensitive Digital Assets
SDKSoftware Development Kit
SDLCSoftware Development Lifecycle
SDNSoftware-defined Networking
SECaaSSecurity as a Service
SECOSecurity & Continuity Institute
SEHStructured Exception Handling
SFCCCCSalesForce Certified Community Cloud Consultant
SFCIAMDSalesForce Certified Identity and Access Management Designer
SFCTASalesforce Certified Technical Architect
SFSASalesForce System Architect
SHASecure Hash Algorithm
SIDSecurity Identifier (Windows)
SIEMSecurity Information and Event Management
SIPSession Initiation Protocol
SIRSecurity Incident Response (plan)
SLAACStateless Address Autoconfiguration (attack)
SLAService-level Agreement
SLDSecond-level Domain
SLESingle Loss Expentancy
SMBServer Message Block
SMESubject Matter Expert
SMTPSimple Mail Transfer Protocol
SNMPSimple Network Management Protocol
SOAPSimple Object Access Protocol
SOARSecurity Orchestration, Automation and Response
SOAService-oriented Architecture
SOAStart of authority record (DNS)
SOCaaSSecurity Operations Center as a Service
SOCKSSocket Secure protocol
SOCMINTSocial Media Intelligence
SOCSecurity Operations Center
SOCSystem On a Chip
SOHOSmall Office, Home Office
SOPSame-origin Policy
SOPStandard Operating Procedure
SOWStatement of Work
SPFSender Policy Framework
SPISecurity Parameter Index
Splunk ECSASplunk Enterprise Security Certified Administrator
SPNService Principal Name
SQLiSQL Injection
SRESite Reliability Engineering
SRISecurity Risk Intelligence
SRPSoftware Restriction Policies (Windows)
SSCP(ISC)2 Systems Security Certified Practitioner
SSDLCSecure Software Development Lifecycle
SSEServer Side Encryption
SSHSecure Shell
SSIDService Set Identifier
SSIServer Side Includes
SSLSecure Sockets Layer
SSNSocial Security number
SSOSingle Sign-on
SSPSecurity Support Provider
SSRFServer-side Request Forgery
STEMScience, Technology, Engineering, and Math
STIGSecurity Technical Implementation Guides
STIXStructured Threat Information Expression
STPSpanning Tree Protocol
STSSecurity Token Service
STUNSession Traversal Utilities for NAT
SVPSenior Vice President
SWRESoftware Reverse Engineering
S-CEHLSECO Certified Etheical Hacker Leader
S-CISOSECO Certified Information Security Officer
S-EHESECO Ethical Hacker Expert
S-EHFSECO Ethical Hacking Foundation
S-EHPSECO Ethical Hacking Practitioner
S-ISFSECO Information Security Foundation
S-ISMESECO Information Security Management Expert
S-ISPSECO Information Security Practitioner
S-SPFSECO Secure Programming Foundation
TBDTo Be Discussed
TBDTo Be Done
TCOTotal Cost of Ownership
TCPTransmission Control Protocol
TEBThread Environment Block
TGTTicket Granting Ticket (Kerberos)
TIThreat Intelligence
TKIPTemporal Key Integrity Protocol
TLDRToo long, didn't read
TLDTop-level Domain
TLSTransport Layer Security
TOCTOUTime-of-check to time-of-use (race condition)
ToETarget of Evaluation
TOGAF FdnOpenGroup TOGAF Certified
TOGAFThe Open Group Architecture Framework
TORThe Onion Router
TOTPTime-based One-time Password
TPBThe Pirate Bay
TPMTechnical Product Manager
TPMTechnical Program Manager
TPMTrusted Platform Module
TPoCTechnical Point of Contact
TTDTime to Detection
TTLTime to live (IP, DNS, HTTP protocols)
TTPTactics, Techniques, and Procedures
TUV AuditorTUV Rheinland IT Security Auditor (GERMAN)
TUV COTCPTUV Rheinland Certified Operational Technology Cybersecurity Professional (GERMAN)
TUV CyAwareTUV Rheinland Cybersecurity Awareness (GERMAN)
TUV CySecTUV Rheinland Cybersecurity Specialist (GERMAN)
TUV ITSMTUV IT Security Manager (GERMAN)
TUV MSATUV Rheinland Mobile Security Analyst (GERMAN)
UACUser Account Control
UATUser Acceptance Testing
UBAUser Behaviour Analytics
UCUnified Communications
UCUnintended Consequences
UDPUser Datagram Protocol
UEBAUser and Entity Behaviour Analytics
UPIUnified Payments Interface (banking)
UPSUninterruptible Power Supply
URIUniform Resource Identifier
URLUniform Resource Locator
URNUniform / Universal Resource Name
UTMSUniversal Mobile Telecommunications Service
UUIDUniversally Unique Identifier
VAPTVulnerability Assessment and Penetration Test
VAVulnerability Assessment
VCDX DCVVMware Certified Design Expert in Datacenter Virtualization
VCIX DCVVMware Certified Implementation Expert in Datacenter Virtualization
VCIX NVVMware Certified Implementation Expert in Network Virtualization
VCP DCVVMware Certified Professional in Datacenter Virtualization
VCP NVVMware Certified Professional in Network Virtualization
VCSCisco TelePresence Video Communication Server (SIP trunk)
VDIVirtual Desktop Infrastructure
VDPVulnerability Disclosure Program
VLANVirtual Local Area Network
VLOMVulnerability Lifecycle Management
VMPVulnerability Management Program
VMVirtual Machine
VMVulnerability Management
VNCVirtual Network Computing
VoIPVoice over Internet Protocol
VPCVirtual Private Cloud
VPLSVirtual Private LAN Service
VPNVirtual Private Network
VPRNVirtual Private Routed Network
VPRVulnerability Priority Rating
VPSVirtual Private Server
VPVice President
VRVulnerability Research
VSAVendor Security Assessment
WAFWeb Application Firewall
WAMPWindows, Apache, MySQL, and PHP
WANWide Area Network
WAPTWeb Application Penetration Test
WAPWeb Application Protection
WAPWireless Access Point
WCEWindows Credentials Editor
WCNAProtocol Analysis Institute Wireshark Certified Network Analyst
WebDAVWeb Distributed Authoring and Versioning
WEPWired Equivalent Privacy
WIDSWireless Intrusion Detection System
WIPSWireless Intrusion Prevention System
WIPWork in Progress
WMIWindows Management Instrumentation
WPAWi-Fi Protected Access
WUIWeb User Interface
XHRXMLHttpRequest
XMPPExtensible Messaging and Presence Protocol
XORExclusive Or (encryption)
XSLTExtensible Stylesheet Language Transformations
XSLExtensible Stylesheet Language
XSRFCross Site Request Forgery
XSSCross Site Scripting
XXEXML External Entity
YARAYet Another Recursive Acronym
Zach EAAZachman Enterprise Architect Associate (Level 1)
Zach EAProZachman Enterprise Architect Professional (Level 3)
Zach EAPZachman Enterprise Architect Practitioner (Level 2)
ZTZero Trust