IPSec | Internet Protocol Security |
OID | Object Identifier |
SSD | Solid State Drive |
STIX | Structured Threat Information eXchange |
VLAN | Virtual Local Area Network |
WAF | Web Application Firewall |
MAC | Message Authentication Code |
DMARC | Domain Message Authentication Reporting and Conformance |
NDA | Non-disclosure Agreement |
SDN | Software-defined Networking |
IP | Internet Protocol |
SaaS | Software as a Service |
HMAC | Hashed Message Authentication Code |
CMS | Content Management System |
HIDS | Host-based Intrusion Detection System |
RDP | Remote Desktop Protocol |
SCEP | Simple Certificate Enrollment Protocol |
SOAP | Simple Object Access Protocol |
TPM | Trusted Platform Module |
DES | Digital Encryption Standard |
KEK | Key Encryption Key |
BPDU | Bridge Protocol Data Unit |
CAR | Corrective Action Report |
DKIM | DomainKeys Identified Mail |
SED | Self-encrypting Drives |
SHTTP | Secure Hypertext Transfer Protocol |
SLA | Service-level Agreement |
CSRF | Cross-site Request Forgery |
GCM | Galois Counter Mode |
IDEA | International Data Encryption Algorithm |
OSINT | Open-source Intelligence |
RFID | Radio Frequency Identifier |
BGP | Border Gateway Protocol |
IoC | Indicators of Compromise |
ISSO | Information Systems Security Officer |
Authentication | Protocol |
PED | Personal Electronic Device |
PII | Personally Identifiable Information |
SQL | Structured Query Language |
ECB | Electronic Code Book |
VTC | Video Teleconferencing |
IV | Initialization Vector |
MOU | Memorandum of Understanding |
PTZ | Pan-tilt-zoom |
URL | Universal Resource Locator |
VoIP | Voice over IP |
COPE | Corporate Owned, Personally Enabled |
NFC | Near Field Communication |
DoS | Denial of Service |
SLE | Single Loss Expectancy |
SMTPS | Simple Mail Transfer Protocol Secure |
TCP/IP | Transmission Control Protocol/Internet Protocol |
AIS | Automated Indicator Sharing |
API | Application Programming Interface |
MTU | Maximum Transmission Unit |
NIDS | Network-based Intrusion Detection System |
PFS | Perfect Forward Secrecy |
POTS | Plain Old Telephone Service |
TAXII | Trusted Automated eXchange of Indicator Information |
RADIUS | Remote Authentication Dial-in User Service |
UTM | Unified Threat Management |
P12 | PKCS #12 |
PPP | Point-to-Point Protocol |
AAA | Authentication, Authorization, and Accounting |
DLL | Dynamic Link Library |
MTTR | Mean Time to Recover |
TGT | Ticket Granting Ticket |
AP | Access Point |
BPA | Business Partners Agreement |
CHAP | Challenge Handshake Authentication Protocol |
LAN | Local Area Network |
DNAT | Destination Network Address Translation |
IEEE | Institute of Electrical and Electronics Engineers |
PBX | Private Branch Exchange |
AUP | Acceptable Use Policy |
CBC | Cipher Block Chaining |
NIST | National Institute of Standards & Technology |
PAM | Pluggable Authentication Modules |
WIPS | Wireless Intrusion Prevention System |
XML | Extensible Markup Language |
BCP | Business Continuity Planning |
GPO | Group Policy Object |
L2TP | Layer 2 Tunneling Protocol |
CTM | Counter Mode |
ECDSA | Elliptic Curve Digital Signature Algorithm |
HSM | Hardware Security Module |
NTP | Network Time Protocol |
XDR | Extended Detection and Response |
CCTV | Closed-circuit Television |
CVE | Common Vulnerability Enumeration |
IDS | Intrusion Detection System |
RBAC | Rule-based Access Control |
UEM | Unified Endpoint Management |
AV | Antivirus |
CTO | Chief Technology Officer |
FRR | False Rejection Rate |
GPU | Graphics Processing Unit |
SDLC | Software Development Lifecycle |
SOW | Statement of Work |
UPS | Uninterruptable Power Supply |
URI | Uniform Resource Identifier |
FIM | File Integrity Management |
IoT | Internet of Things |
RIPEMD | RACE Integrity Primitives Evaluation Message Digest |
VBA | Visual Basic |
WO | Work Order |
ARO | Annualized Rate of Occurrence |
CIRT | Computer Incident Response Team |
HOTP | HMAC-based One-time Password |
MaaS | Monitoring as a Service |
OCSP | Online Certificate Status Protocol |
OTA | Over the Air |
WTLS | Wireless TLS |
FDE | Full Disk Encryption |
SIM | Subscriber Identity Module |
HTTPS | Hypertext Transfer Protocol Secure |
SSL | Secure Sockets Layer |
BIOS | Basic Input/Output System |
DEP | Data Execution Prevention |
DNS | Domain Name System |
NTFS | New Technology File System |
PEM | Privacy Enhanced Mail |
CASB | Cloud Access Security Broker |
MSSP | Managed Security Service Provider |
PDU | Power Distribution Unit |
AES-256 | Advanced Encryption Standards 256-bit |
APT | Advanced Persistent Threat |
UDP | User Datagram Protocol |
FTPS | File Transfer Protocol Secure |
MOA | Memorandum of Agreement |
OAUTH | Open Authorization |
RTO | Recovery Time Objective |
SASE | Secure Access Service Edge |
SD-WAN | Software-defined Wide Area Network |
SSO | Single Sign-on |
VM | Virtual Machine |
XSRF | Cross-site Request Forgery |
IMAP | Internet Message Access Protocol |
OSPF | Open Shortest Path First |
CRC | Cyclical Redundancy Check |
ISO | International Standards Organization |
MDM | Mobile Device Management |
RTP | Real-time Transport Protocol |
WIDS | Wireless Intrusion Detection System |
SSH | Secure Shell |
TOTP | Time-based One-time Password |
DPO | Data Privacy Officer |
DRP | Disaster Recovery Plan |
CSO | Chief Security Officer |
MFA | Multifactor Authentication |
PaaS | Platform as a Service |
SWG | Secure Web Gateway |
WPS | Wi-Fi Protected Setup |
XOR | Exclusive Or |
PAP | Password Authentication Protocol |
AH | Authentication Header |
NAC | Network Access Control |
SPIM | Spam over Internet Messaging |
CA | Certificate Authority |
DSL | Digital Subscriber Line |
FACL | File System Access Control List |
HA | High Availability |
IAM | Identity and Access Management |
NAT | Network Address Translation |
PAC | Proxy Auto Configuration |
SMTP | Simple Mail Transfer Protocol |
HDD | Hard Disk Drive |
IRC | Internet Relay Chat |
IRP | Incident Response Plan |
MTTF | Mean Time to Failure |
SCADA | Supervisory Control and Data Acquisition |
VDE | Virtual Desktop Environment |
ALE | Annualized Loss Expectancy |
RSA | Rivest, Shamir, & Adleman |
UTP | Unshielded Twisted Pair |
ACL | Access Control List |
IPS | Intrusion Prevention System |
MFD | Multifunction Device |
POP | Post Office Protocol |
PBKDF2 | Password-based Key Derivation Function 2 |
PCI | DSS Payment Card Industry Data Security Standard |
RAT | Remote Access Trojan |
CERT | Computer Emergency Response Team |
MTBF | Mean Time Between Failures |
IaC | Infrastructure as Code |
LEAP | Lightweight Extensible Authentication Protocol |
CRL | Certificate Revocation List |
IM | Instant Messaging |
SMS | Short Message Service |
CSR | Certificate Signing Request |
OT | Operational Technology |
MMS | Multimedia Message Service |
OS | Operating System |
PCAP | Packet Capture |
SHA | Secure Hashing Algorithm |
UEFI | Unified Extensible Firmware Interface |
XSS | Cross-site Scripting |
DBA | Database Administrator |
CFB | Cipher Feedback |
LDAP | Lightweight Directory Access Protocol |
CVSS | Common Vulnerability Scoring System |
FPGA | Field Programmable Gate Array |
UAV | Unmanned Aerial Vehicle |
EFS | Encrypted File System |
NTLM | New Technology LAN Manager |
SOC | Security Operations Center |
BYOD | Bring Your Own Device |
MSP | Managed Service Provider |
TACACS+ | Terminal Access Controller Access Control System |
CSU | Channel Service Unit |
IDF | Intermediate Distribution Frame |
IR | Incident Response |
NGFW | Next-generation Firewall |
ROI | Return on Investment |
AES | Advanced Encryption Standard |
ASLR | Address Space Layout Randomization |
BIA | Business Impact Analysis |
HTML | Hypertext Markup Language |
MSA | Master Service Agreement |
PHI | Personal Health Information |
PIV | Personal Identity Verification |
S/MIME | Secure/Multipurpose Internet Mail Extensions |
RAID | Redundant Array of Inexpensive Disks |
SIEM | Security Information and Event Management |
CIO | Chief Information Officer |
ECC | Elliptic Curve Cryptography |
ISP | Internet Service Provider |
PAT | Port Address Translation |
RAS | Remote Access Server |
DHCP | Dynamic Host Configuration Protocol |
SQLi | SQL Injection |
ATT&CK | Adversarial Tactics, Techniques, and Common Knowledge |
CSP | Cloud Service Provider |
MPLS | Multi-protocol Label Switching |
SAN | Subject Alternative Name |
UAT | User Acceptance Testing |
DDoS | Distributed Denial of Service |
IaaS | Infrastructure as a Service |
ICMP | Internet Control Message Protocol |
RTOS | Real-time Operating System |
SEH | Structured Exception Handler |
GPG | Gnu Privacy Guard |
TSIG | Transaction Signature |
VLSM | Variable Length Subnet Masking |
COOP | Continuity of Operation Planning |
MAN | Metropolitan Area Network |
MBR | Master Boot Record |
SPF | Sender Policy Framework |
DSA | Digital Signature Algorithm |
ESN | Electronic Serial Number |
P2P | Peer to Peer |
SCAP | Security Content Automation Protocol |
SRTP | Secure Real-Time Protocol |
TKIP | Temporal Key Integrity Protocol |
CIA | Confidentiality, Integrity, Availability |
IKE | Internet Key Exchange |
PEAP | Protected Extensible Authentication Protocol |
RA | Registration Authority |
TLS | Transport Layer Security |
CYOD | Choose Your Own Device |
GPS | Global Positioning System |
PGP | Pretty Good Privacy |
RC4 | Rivest Cipher version 4 |
SE Linux | Security-enhanced Linux |
USB OTG | USB On the Go |
AI | Artificial Intelligence |
ARP | Address Resolution Protocol |
GRE | Generic Routing Encapsulation |
MDF | Main Distribution Frame |
TTP | Tactics, Techniques, and Procedures |
VPC | Virtual Private Cloud |
MS-CHAP | Microsoft Challenge-Handshake Authentication Protocol |
RACE | Research and Development in Advanced Communications Technologies in Europe |
DAC | Discretionary Access Control |
DLP | Data Loss Prevention |
PKCS | Public Key Cryptography Standards |
SNMP | Simple Network Management Protocol |
TOU | Time-of-use |
VPN | Virtual Private Network |
WPA | Wi-Fi Protected Access |
EAP | Extensible Authentication Protocol |
OVAL | Open Vulnerability Assessment Language |
PKI | Public Key Infrastructure |
PPTP | Point-to-Point Tunneling Protocol |
TOC | Time-of-check |
ESP | Encapsulated Security Payload |
GDPR | General Data Protection Regulation |
PSK | Pre-shared Key |
SOAR | Security Orchestration, Automation, Response |
SoC | System on Chip |
HIPS | Host-based Intrusion Prevention System |
MFP | Multifunction Printer |
SAML | Security Assertions Markup Language |
CP | Contingency Planning |
KDC | Key Distribution Center |
ECDHE | Elliptic Curve Diffie-Hellman Ephemeral |
HVAC | Heating, Ventilation Air Conditioning |
HTTP | Hypertext Transfer Protocol |
RTBH | Remotely Triggered Black Hole |
WEP | Wired Equivalent Privacy |
ML | Machine Learning |
IdP | Identity Provider |
RPO | Recovery Point Objective |
SDK | Software Development Kit |
SAE | Simultaneous Authentication of Equals |
VDI | Virtual Desktop Infrastructure |
BASH | Bourne Again Shell |
EDR | Endpoint Detection and Response |
ERP | Enterprise Resource Planning |
NIPS | Network-based Intrusion Prevention System |
RAD | Rapid Application Development |
SDLM | Software Development Lifecycle Methodology |
WAP | Wireless Access Point |
DHE | Diffie-Hellman Ephemeral |
MD5 | Message Digest 5 |
PUP | Potentially Unwanted Program |
CAPTCHA | Completely Automated Public Turing Test to Tell Computers and Humans Apart |
CCMP | Counter Mode/CBC-MAC Protocol |
FTP | File Transfer Protocol |
ICS | Industrial Control Systems |
SFTP | Secured File Transfer Protocol |