Acronym | Definition |
---|
ACL | Access Control List |
API | Application Programming Interface |
APT | Advanced Persistent Threat |
ARP | Address Resolution Protocol |
AV | Antivirus |
BC | Business Continuity |
BCP | Business Continuity Plan |
BGP | Border Gateway Protocol |
BIA | Business Impact Analysis |
C2 | Command and Control |
CA | Certificate Authority |
CASB | Cloud Access Security Broker |
CDN | Content Delivery Network |
CERT | Computer Emergency Response Team |
CHD | Cardholder Data |
CI/CD | Continuous Integration and Continuous Delivery |
CIS | Center for Internet Security |
COBIT | Control Objectives for Information and Related Technologies |
CSIRT | Cybersecurity Incident Response Team |
CSRF | Cross-site Request Forgery |
CVE | Common Vulnerabilities and Exposures |
CVSS | Common Vulnerability Scoring System |
DDoS | Distributed Denial of Service |
DoS | Denial of Service |
DKIM | Domain Keys Identified Mail |
DLP | Data Loss Prevention |
DMARC | Domain-based Message Authentication, Reporting, and Conformance |
DNS | Domain Name Service |
DR | Disaster Recovery |
EDR | Endpoint Detection and Response |
FIM | File Integrity Monitoring |
FTP | File Transfer Protocol |
GDB | GNU Debugger |
GPO | Group Policy Objects |
HIDS | Host-based Intrusion Detection System |
HIPS | Host-based Intrusion Prevention System |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol Secure |
IaaS | Infrastructure as a Service |
ICMP | Internet Control Message Protocol |
ICS | Industrial Control Systems |
IDS | Intrusion Detection System |
IoC | Indicators of Compromise |
IP | Internet Protocol |
IPS | Intrusion Prevention System |
IR | Incident Response |
ISO | International Organization for Standardization |
IT | Information Technology |
ITIL | Information Technology Infrastructure Library |
JSON | JavaScript Object Notation |
KPI | Key Performance Indicator |
LAN | Local Area Network |
LDAPS | Lightweight Directory Access Protocol |
LFI | Local File Inclusion |
LOI | Letter of Intent |
MAC | Media Access Control |
MFA | Multifactor Authentication |
MOU | Memorandum of Understanding |
MSF | Metasploit Framework |
MSP | Managed Service Provider |
MSSP | Managed Security Service Provider |
MTTD | Mean Time to Detect |
MTTR | Mean Time to Repair |
NAC | Network Access Control |
NDA | Non-disclosure Agreement |
NGFW | Next-generation Firewall |
NIDS | Network-based Intrusion Detection System |
NTP | Network Time Protocol |
OpenVAS | Open Vulnerability Assessment Scanner |
OS | Operating System |
OSSTMM | Open Source Security Testing Methodology Manual |
OT | Operational Technology |
OWASP | Open Web Application Security Project |
PAM | Privileged Access Management |
PCI DSS | Payment Card Industry Data Security Standard |
PHP | Hypertext Preprocessor |
PID | Process Identifier |
PII | Personally Identifiable Information |
PKI | Public Key Infrastructure |
PLC | Programmable Logic Controller |
POC | Proof of Concept |
RCE | Remote Code Execution |
RDP | Remote Desktop Protocol |
REST | Representational State Transfer |
RFI | Remote File Inclusion |
RXSS | Reflected Cross-site Scripting |
SaaS | Software as a Service |
SAML | Security Assertion Markup Language |
SASE | Secure Access Secure Edge |
SCADA | Supervisory Control and Data Acquisition |
SDLC | Software Development Life Cycle |
SDN | Software-defined Networking |
SFTP | Secure File Transfer Protocol |
SIEM | Security Information and Event Management |
SLA | Service-level Agreement |
SLO | Service-level Objective |
SOAR | Security Orchestration, Automation, and Response |
SMB | Server Message Block |
SMTP | Simple Mail Transfer Protocol |
SNMP | Simple Network Management Protocol |
SOC | Security Operations Center |
SPF | Sender Policy Framework |
SQL | Structured Query Languge |
SSL | Secure Sockets Layer |
SSO | Single Sign-on |
SSRF | Server-side Request Forgery |
STIX | Structured Threat Information Expression |
SWG | Secure Web Gateway |
TCP | Transmission Control Protocol |
TFTP | Trivial File Transfer Protocol |
TLS | Transport Layer Security |
TRACE | Trade Reporting and Compliance Engine |
TTP | Tactics, Techniques, and Procedures |
UEBA | User and Entity Behavior Analytics |
URI | Uniform Resource Identifier |
URL | Uniform Resource Locator |
USB | Universal Serial Bus |
VLAN | Virtual LAN |
VM | Virtual Machine |
VPN | Virtual Private Network |
WAF | Web Application Firewall |
WAN | Wide Area Network |
XDR | Extended Detection Response |
XML | Extensible Markup Language |
XSS | Cross-site Scripting |
XXE | XML External Entity |
ZAP | Zed Attack Proxy |
ZTNA | Zero Trust Network Access |