AcronymDefinitionAcronymDefinition
3DESTriple Data Encryption StandardCARCorrective Action Report
AAAAuthentication, Authorization, and AccountingCASBCloud Access Security Broker
ABACAttribute-based Access ControlCBCCipher Block Chaining
ACLAccess Control ListCBTComputer-based Training
ADActive DirectoryCCMPCounter-Mode/CBC-MAC Protocol
AESAdvanced Encryption StandardCCTVClosed-Circuit Television
AES256Advanced Encryption Standards 256bitCERTComputer Emergency Response Team
AHAuthentication HeaderCFBCipher Feedback
AIArtificial IntelligenceCHAPChallenge-Handshake Authentication Protocol
AISAutomated Indicator SharingCIOChief Information Officer
ALEAnnualized Loss ExpectancyCIRTComputer Incident Response Team
APAccess PointCISCenter for Internet Security
APIApplication Programming InterfaceCMSContent Management System
APTAdvanced Persistent ThreatCNCommon Name
AROAnnualized Rate of OccurrenceCOOPContinuity of Operations Planning
ARPAddress Resolution ProtocolCOPECorporate-owned Personally Enabled
ASLRAddress Space Layout RandomizationCPContingency Planning
ASPActive Server PagesCRCCyclic Redundancy Check
ATT&CKAdversarial Tactics, Techniques,CRLCertificate Revocation List
and Common KnowledgeCSACloud Security Alliance
AUPAcceptable Use PolicyCSIRTComputer Security Incident Response Team
AVAntivirusCSOChief Security Officer
BASHBourne Again ShellCSPCloud Service Provider
BCPBusiness Continuity PlanningCSRCertificate Signing Request
BGPBorder Gateway ProtocolCSRFCross-Site Request Forgery
BIABusiness Impact AnalysisCSUChannel Service Unit
BIOSBasic Input/Output SystemCTMCounter-Mode
BPABusiness Partnership AgreementCTOChief Technology Officer
BPDUBridge Protocol Data UnitCVECommon Vulnerabilities and Exposures
BSSIDBasic Service Set IdentifierCVSSCommon Vulnerability Scoring System
BYODBring Your Own DeviceCYODChoose Your Own Device
CACertificate AuthorityDACDiscretionary Access Control
CAPTCHACompletely Automated Public TuringDBADatabase Administrator
Test to Tell Computers and Humans ApartDDoSDistributed Denial-of-Service
DEPData Execution Prevention
----------------------------------------------------------------------
DERDistinguished Encoding RulesHSMHardware Security Module
DESData Encryption StandardHSMaaSHardware Security Module as a Service
DHCPDynamic Host Configuration ProtocolHTMLHypertext Markup Language
DHEDiffie-Hellman EphemeralHTTPHypertext Transfer Protocol
DKIMDomain Keys Identified MailHTTPSHypertext Transfer Protocol Secure
DLLDynamic-link LibraryHVACHeating, Ventilation, Air Conditioning
DLPData Loss PreventionIaaSInfrastructure as a Service
DMARCDomain Message AuthenticationIAMIdentity and Access Management
Reporting and ConformanceICMPInternet Control Message Protocol
DNATDestination Network Address TransactionICSIndustrial Control Systems
DNSDomain Name SystemIDEAInternational Data Encryption Algorithm
DNSSECDomain Name System Security ExtensionsIDFIntermediate Distribution Frame
DoSDenial-of-ServiceIdPIdentity Provider
DPOData Protection OfficerIDSIntrusion Detection System
DRPDisaster Recovery PlanIEEEInstitute of Electrical and Electronics Engineers
DSADigital Signature AlgorithmIKEInternet Key Exchange
DSLDigital Subscriber LineIMInstant Messaging
EAPExtensible Authentication ProtocolIMAP4Internet Message Access Protocol v4
ECBElectronic Code BookIoCIndicators of Compromise
ECCElliptic-curve CryptographyIoTInternet of Things
ECDHEElliptic-curve Diffie-Hellman EphemeralIPInternet Protocol
ECDSAElliptic-curve Digital Signature AlgorithmIPSIntrusion Prevention System
EDREndpoint Detection and ResponseIPSecInternet Protocol Security
EFSEncrypted File SystemIRIncident Response
EIPExtended Instruction PointerIRCInternet Relay Chat
EOLEnd of LifeIRPIncident Response Plan
EOSEnd of ServiceISAInterconnection Security Agreement
ERPEnterprise Resource PlanningISFWInternal Segmentation Firewall
ESNElectronic Serial NumberISOInternational Organization for Standardization
ESPEncapsulating Security PayloadISPInternet Service Provider
ESSIDExtended Service Set IdentifierISSOInformation Systems Security Officer
FACLFile System Access Control ListITCPIT Contingency Plan
FDEFull Disk EncryptionIVInitialization Vector
FIMFile Integrity MonitoringKDCKey Distribution Center
FPGAField Programmable Gate ArrayKEKKey Encryption Key
FRRFalse Rejection RateL2TPLayer 2 Tunneling Protocol
FTPFile Transfer ProtocolLANLocal Area Network
FTPSSecured File Transfer ProtocolLDAPLightweight Directory Access Protocol
GCMGalois/Counter ModeLEAPLightweight Extensible Authentication Protocol
GDPRGeneral Data Protection RegulationMaaSMonitoring as a Service
GPGGNU Privacy GuardMACMedia Access Control
GPOGroup Policy ObjectMAMMobile Application Management
GPSGlobal Positioning SystemMANMetropolitan Area Network
GPUGraphics Processing UnitMBRMaster Boot Record
GREGeneric Routing EncapsulationMD5Message Digest 5
HAHigh AvailabilityMDFMain Distribution Frame
HDDHard Disk DriveMDMMobile Device Management
HIDSHost-based Intrusion Detection SystemMFAMultifactor Authentication
HIPSHost-based Intrusion Prevention SystemMFDMultifunction Device
HMACHash-based Message Authentication CodeMFPMultifunction Printer
HOTPHMAC-based One-time PasswordMLMachine Learning
----------------------------------------------------------------
MMSMultimedia Message ServicePCI DSSPayment Card Industry Data Security Standard
MOAMemorandum of AgreementPDUPower Distribution Unit
MOUMemorandum of UnderstandingPEPortable Executable
MPLSMultiprotocol Label SwitchingPEAPProtected Extensible Authentication Protocol
MSAMeasurement Systems AnalysisPEDPortable Electronic Device
MS-CHAPMicrosoft Challenge-HandshakePEMPrivacy Enhanced Mail
Authentication ProtocolPFSPerfect Forward Secrecy
MSPManaged Service ProviderPGPPretty Good Privacy
MSSPManaged Security Service ProviderPHIPersonal Health Information
MTBFMean Time Between FailuresPIIPersonally Identifiable Information
MTTFMean Time to FailurePINPersonal Identification Number
MTTRMean Time to RepairPIVPersonal Identity Verification
MTUMaximum Transmission UnitPKCSPublic Key Cryptography Standards
NACNetwork Access ControlPKIPublic Key Infrastructure
NASNetwork-attached StoragePoCProof of Concept
NATNetwork Address TranslationPOPPost Office Protocol
NDANon-disclosure AgreementPOTSPlain Old Telephone Service
NFCNear-field CommunicationPPPPoint-to-Point Protocol
NFVNetwork Function VirtualizationPPTPPoint-to-Point Tunneling Protocol
NGFWNext-generation FirewallPSKPreshared Key
NG-SWGNext-generation Secure Web GatewayPTZPan-Tilt-Zoom
NICNetwork Interface CardPUPPotentially Unwanted Program
NIDSNetwork-based Intrusion Detection SystemQAQuality Assurance
NIPSNetwork-based Intrusion Prevention SystemQoSQuality of Service
NISTNational Institute of Standards & TechnologyPUPPotentially Unwanted Program
NOCNetwork Operations CenterRARegistration Authority
NTFSNew Technology File SystemRADRapid Application Development
NTLMNew Technology LAN ManagerRADIUSRemote Authentication Dial-in User Service
NTPNetwork Time ProtocolRAIDRedundant Array of Inexpensive Disks
OCSPOnline Certificate Status ProtocolRAMRandom Access Memory
OIDObject IdentifierRASRemote Access Server
OSOperating SystemRATRemote Access Trojan
OSIOpen Systems InterconnectionRC4Rivest Cipher version 4
OSINTOpen-source IntelligenceRCSRich Communication Services
OSPFOpen Shortest Path FirstRFCRequest for Comments
OTOperational TechnologyRFIDRadio Frequency Identification
OTAOver-The-AirRIPEMDRACE Integrity Primitives
OTGOn-The-GoEvaluation Message Digest
OVALOpen Vulnerability and Assessment LanguageROIReturn on Investment
OWASPOpen Web Application Security ProjectRPORecovery Point Objective
P12PKCS #12RSARivest, Shamir, & Adleman
P2PPeer-to-PeerRTBHRemotely Triggered Black Hole
PaaSPlatform as a ServiceRTORecovery Time Objective
PACProxy Auto ConfigurationRTOSReal-time Operating System
PAMPrivileged Access ManagementRTPReal-time Transport Protocol
PAMPluggable Authentication ModulesS/MIMESecure/Multipurpose Internet Mail Extensions
PAPPassword Authentication ProtocolSaaSSoftware as a Service
PATPort Address TranslationSAESimultaneous Authentication of Equals
PBKDF2Password-based Key Derivation Function 2SAMLSecurity Assertions Markup Language
PBXPrivate Branch ExchangeSCADASupervisory Control and Data Acquisition
PCAPPacket CaptureSCAPSecurity Content Automation Protocol
-----------------------------------------------------------------
SCEPSimple Certificate Enrollment ProtocolUATUser Acceptance Testing
SDKSoftware Development KitUDPUser Datagram Protocol
SDLCSoftware Development Life CycleUEBAUser and Entity Behavior Analytics
SDLMSoftware Development Life-cycle MethodologyUEFIUnified Extensible Firmware Interface
SDNSoftware-defined NetworkingUEMUnified Endpoint Management
SDPService Delivery PlatformUPSUninterruptible Power Supply
SDVSoftware-defined VisibilityURIUniform Resource Identifier
SEDSelf-Encrypting DrivesURLUniversal Resource Locator
SEHStructured Exception HandlingUSBUniversal Serial Bus
SFTPSSH File Transfer ProtocolUSB OTGUSB On-The-Go
SHASecure Hashing AlgorithmUTMUnified Threat Management
SIEMSecurity Information and Event ManagementUTPUnshielded Twisted Pair
SIMSubscriber Identity ModuleVBAVisual Basic for Applications
SIPSession Initiation ProtocolVDEVirtual Desktop Environment
SLAService-level AgreementVDIVirtual Desktop Infrastructure
SLESingle Loss ExpectancyVLANVirtual Local Area Network
SMBServer Message BlockVLSMVariable-length Subnet Masking
S/MIMESecure/Multipurpose Internet Mail ExtensionsVMVirtual Machine
SMSShort Message ServiceVoIPVoice over IP
SMTPSimple Mail Transfer ProtocolVPCVirtual Private Cloud
SMTPSSimple Mail Transfer Protocol SecureVPNVirtual Private Network
SNMPSimple Network Management ProtocolVTCVideo Teleconferencing
SOAPSimple Object Access ProtocolWAFWeb Application Firewall
SOARSecurity Orchestration, Automation, ResponseWAPWireless Access Point
SoCSystem on ChipWEPWired Equivalent Privacy
SOCSecurity Operations CenterWIDSWireless Intrusion Detection System
SPFSender Policy FrameworkWIPSWireless Intrusion Prevention System
SPIMSpam over Instant MessagingWORMWrite Once Read Many
SQLStructured Query LanguageWPAWiFi Protected Access
SQLiSQL InjectionWPSWiFi Protected Setup
SRTPSecure Real-time Transport ProtocolXaaSAnything as a Service
SSDSolid State DriveXMLExtensible Markup Language
SSHSecure ShellXORExclusive OR
SSIDService Set IdentifierXSRFCross-site Request Forgery
SSLSecure Sockets LayerXSSCross-site Scripting
SSOSingle Sign-on
STIXStructured Threat Information eXpression
STPShielded Twisted Pair
SWGSecure Web Gateway
TACACS+Terminal Access Controller Access Control System
TAXIITrusted Automated eXchange
of Intelligence Information
TCP/IPTransmission Control Protocol/Internet Protocol
TGTTicket Granting Ticket
TKIPTemporal Key Integrity Protocol
TLSTransport Layer Security
TOTPTime-based One Time Password
TPMTrusted Platform Module
TSIGTransaction Signature
TTPTactics, Techniques, and Procedures