| 3DES | Triple Data Encryption Standard | CAR | Corrective Action Report |
| AAA | Authentication, Authorization, and Accounting | CASB | Cloud Access Security Broker |
| ABAC | Attribute-based Access Control | CBC | Cipher Block Chaining |
| ACL | Access Control List | CBT | Computer-based Training |
| AD | Active Directory | CCMP | Counter-Mode/CBC-MAC Protocol |
| AES | Advanced Encryption Standard | CCTV | Closed-Circuit Television |
| AES256 | Advanced Encryption Standards 256bit | CERT | Computer Emergency Response Team |
| AH | Authentication Header | CFB | Cipher Feedback |
| AI | Artificial Intelligence | CHAP | Challenge-Handshake Authentication Protocol |
| AIS | Automated Indicator Sharing | CIO | Chief Information Officer |
| ALE | Annualized Loss Expectancy | CIRT | Computer Incident Response Team |
| AP | Access Point | CIS | Center for Internet Security |
| API | Application Programming Interface | CMS | Content Management System |
| APT | Advanced Persistent Threat | CN | Common Name |
| ARO | Annualized Rate of Occurrence | COOP | Continuity of Operations Planning |
| ARP | Address Resolution Protocol | COPE | Corporate-owned Personally Enabled |
| ASLR | Address Space Layout Randomization | CP | Contingency Planning |
| ASP | Active Server Pages | CRC | Cyclic Redundancy Check |
| ATT&CK | Adversarial Tactics, Techniques, | CRL | Certificate Revocation List |
| and Common Knowledge | CSA | Cloud Security Alliance |
| AUP | Acceptable Use Policy | CSIRT | Computer Security Incident Response Team |
| AV | Antivirus | CSO | Chief Security Officer |
| BASH | Bourne Again Shell | CSP | Cloud Service Provider |
| BCP | Business Continuity Planning | CSR | Certificate Signing Request |
| BGP | Border Gateway Protocol | CSRF | Cross-Site Request Forgery |
| BIA | Business Impact Analysis | CSU | Channel Service Unit |
| BIOS | Basic Input/Output System | CTM | Counter-Mode |
| BPA | Business Partnership Agreement | CTO | Chief Technology Officer |
| BPDU | Bridge Protocol Data Unit | CVE | Common Vulnerabilities and Exposures |
| BSSID | Basic Service Set Identifier | CVSS | Common Vulnerability Scoring System |
| BYOD | Bring Your Own Device | CYOD | Choose Your Own Device |
| CA | Certificate Authority | DAC | Discretionary Access Control |
| CAPTCHA | Completely Automated Public Turing | DBA | Database Administrator |
| Test to Tell Computers and Humans Apart | DDoS | Distributed Denial-of-Service |
| | DEP | Data Execution Prevention |
| --------- | ---------------------------- | ----- | ---------------------------- |
| DER | Distinguished Encoding Rules | HSM | Hardware Security Module |
| DES | Data Encryption Standard | HSMaaS | Hardware Security Module as a Service |
| DHCP | Dynamic Host Configuration Protocol | HTML | Hypertext Markup Language |
| DHE | Diffie-Hellman Ephemeral | HTTP | Hypertext Transfer Protocol |
| DKIM | Domain Keys Identified Mail | HTTPS | Hypertext Transfer Protocol Secure |
| DLL | Dynamic-link Library | HVAC | Heating, Ventilation, Air Conditioning |
| DLP | Data Loss Prevention | IaaS | Infrastructure as a Service |
| DMARC | Domain Message Authentication | IAM | Identity and Access Management |
| Reporting and Conformance | ICMP | Internet Control Message Protocol |
| DNAT | Destination Network Address Transaction | ICS | Industrial Control Systems |
| DNS | Domain Name System | IDEA | International Data Encryption Algorithm |
| DNSSEC | Domain Name System Security Extensions | IDF | Intermediate Distribution Frame |
| DoS | Denial-of-Service | IdP | Identity Provider |
| DPO | Data Protection Officer | IDS | Intrusion Detection System |
| DRP | Disaster Recovery Plan | IEEE | Institute of Electrical and Electronics Engineers |
| DSA | Digital Signature Algorithm | IKE | Internet Key Exchange |
| DSL | Digital Subscriber Line | IM | Instant Messaging |
| EAP | Extensible Authentication Protocol | IMAP4 | Internet Message Access Protocol v4 |
| ECB | Electronic Code Book | IoC | Indicators of Compromise |
| ECC | Elliptic-curve Cryptography | IoT | Internet of Things |
| ECDHE | Elliptic-curve Diffie-Hellman Ephemeral | IP | Internet Protocol |
| ECDSA | Elliptic-curve Digital Signature Algorithm | IPS | Intrusion Prevention System |
| EDR | Endpoint Detection and Response | IPSec | Internet Protocol Security |
| EFS | Encrypted File System | IR | Incident Response |
| EIP | Extended Instruction Pointer | IRC | Internet Relay Chat |
| EOL | End of Life | IRP | Incident Response Plan |
| EOS | End of Service | ISA | Interconnection Security Agreement |
| ERP | Enterprise Resource Planning | ISFW | Internal Segmentation Firewall |
| ESN | Electronic Serial Number | ISO | International Organization for Standardization |
| ESP | Encapsulating Security Payload | ISP | Internet Service Provider |
| ESSID | Extended Service Set Identifier | ISSO | Information Systems Security Officer |
| FACL | File System Access Control List | ITCP | IT Contingency Plan |
| FDE | Full Disk Encryption | IV | Initialization Vector |
| FIM | File Integrity Monitoring | KDC | Key Distribution Center |
| FPGA | Field Programmable Gate Array | KEK | Key Encryption Key |
| FRR | False Rejection Rate | L2TP | Layer 2 Tunneling Protocol |
| FTP | File Transfer Protocol | LAN | Local Area Network |
| FTPS | Secured File Transfer Protocol | LDAP | Lightweight Directory Access Protocol |
| GCM | Galois/Counter Mode | LEAP | Lightweight Extensible Authentication Protocol |
| GDPR | General Data Protection Regulation | MaaS | Monitoring as a Service |
| GPG | GNU Privacy Guard | MAC | Media Access Control |
| GPO | Group Policy Object | MAM | Mobile Application Management |
| GPS | Global Positioning System | MAN | Metropolitan Area Network |
| GPU | Graphics Processing Unit | MBR | Master Boot Record |
| GRE | Generic Routing Encapsulation | MD5 | Message Digest 5 |
| HA | High Availability | MDF | Main Distribution Frame |
| HDD | Hard Disk Drive | MDM | Mobile Device Management |
| HIDS | Host-based Intrusion Detection System | MFA | Multifactor Authentication |
| HIPS | Host-based Intrusion Prevention System | MFD | Multifunction Device |
| HMAC | Hash-based Message Authentication Code | MFP | Multifunction Printer |
| HOTP | HMAC-based One-time Password | ML | Machine Learning |
| -------- | ----------------------- | --------- | ------------------------ |
| MMS | Multimedia Message Service | PCI DSS | Payment Card Industry Data Security Standard |
| MOA | Memorandum of Agreement | PDU | Power Distribution Unit |
| MOU | Memorandum of Understanding | PE | Portable Executable |
| MPLS | Multiprotocol Label Switching | PEAP | Protected Extensible Authentication Protocol |
| MSA | Measurement Systems Analysis | PED | Portable Electronic Device |
| MS-CHAP | Microsoft Challenge-Handshake | PEM | Privacy Enhanced Mail |
| Authentication Protocol | PFS | Perfect Forward Secrecy |
| MSP | Managed Service Provider | PGP | Pretty Good Privacy |
| MSSP | Managed Security Service Provider | PHI | Personal Health Information |
| MTBF | Mean Time Between Failures | PII | Personally Identifiable Information |
| MTTF | Mean Time to Failure | PIN | Personal Identification Number |
| MTTR | Mean Time to Repair | PIV | Personal Identity Verification |
| MTU | Maximum Transmission Unit | PKCS | Public Key Cryptography Standards |
| NAC | Network Access Control | PKI | Public Key Infrastructure |
| NAS | Network-attached Storage | PoC | Proof of Concept |
| NAT | Network Address Translation | POP | Post Office Protocol |
| NDA | Non-disclosure Agreement | POTS | Plain Old Telephone Service |
| NFC | Near-field Communication | PPP | Point-to-Point Protocol |
| NFV | Network Function Virtualization | PPTP | Point-to-Point Tunneling Protocol |
| NGFW | Next-generation Firewall | PSK | Preshared Key |
| NG-SWG | Next-generation Secure Web Gateway | PTZ | Pan-Tilt-Zoom |
| NIC | Network Interface Card | PUP | Potentially Unwanted Program |
| NIDS | Network-based Intrusion Detection System | QA | Quality Assurance |
| NIPS | Network-based Intrusion Prevention System | QoS | Quality of Service |
| NIST | National Institute of Standards & Technology | PUP | Potentially Unwanted Program |
| NOC | Network Operations Center | RA | Registration Authority |
| NTFS | New Technology File System | RAD | Rapid Application Development |
| NTLM | New Technology LAN Manager | RADIUS | Remote Authentication Dial-in User Service |
| NTP | Network Time Protocol | RAID | Redundant Array of Inexpensive Disks |
| OCSP | Online Certificate Status Protocol | RAM | Random Access Memory |
| OID | Object Identifier | RAS | Remote Access Server |
| OS | Operating System | RAT | Remote Access Trojan |
| OSI | Open Systems Interconnection | RC4 | Rivest Cipher version 4 |
| OSINT | Open-source Intelligence | RCS | Rich Communication Services |
| OSPF | Open Shortest Path First | RFC | Request for Comments |
| OT | Operational Technology | RFID | Radio Frequency Identification |
| OTA | Over-The-Air | RIPEMD | RACE Integrity Primitives |
| OTG | On-The-Go | | Evaluation Message Digest |
| OVAL | Open Vulnerability and Assessment Language | ROI | Return on Investment |
| OWASP | Open Web Application Security Project | RPO | Recovery Point Objective |
| P12 | PKCS #12 | RSA | Rivest, Shamir, & Adleman |
| P2P | Peer-to-Peer | RTBH | Remotely Triggered Black Hole |
| PaaS | Platform as a Service | RTO | Recovery Time Objective |
| PAC | Proxy Auto Configuration | RTOS | Real-time Operating System |
| PAM | Privileged Access Management | RTP | Real-time Transport Protocol |
| PAM | Pluggable Authentication Modules | S/MIME | Secure/Multipurpose Internet Mail Extensions |
| PAP | Password Authentication Protocol | SaaS | Software as a Service |
| PAT | Port Address Translation | SAE | Simultaneous Authentication of Equals |
| PBKDF2 | Password-based Key Derivation Function 2 | SAML | Security Assertions Markup Language |
| PBX | Private Branch Exchange | SCADA | Supervisory Control and Data Acquisition |
| PCAP | Packet Capture | SCAP | Security Content Automation Protocol |
| ------ | --------------------------- | -------- | ------------------------ |
| SCEP | Simple Certificate Enrollment Protocol | UAT | User Acceptance Testing |
| SDK | Software Development Kit | UDP | User Datagram Protocol |
| SDLC | Software Development Life Cycle | UEBA | User and Entity Behavior Analytics |
| SDLM | Software Development Life-cycle Methodology | UEFI | Unified Extensible Firmware Interface |
| SDN | Software-defined Networking | UEM | Unified Endpoint Management |
| SDP | Service Delivery Platform | UPS | Uninterruptible Power Supply |
| SDV | Software-defined Visibility | URI | Uniform Resource Identifier |
| SED | Self-Encrypting Drives | URL | Universal Resource Locator |
| SEH | Structured Exception Handling | USB | Universal Serial Bus |
| SFTP | SSH File Transfer Protocol | USB OTG | USB On-The-Go |
| SHA | Secure Hashing Algorithm | UTM | Unified Threat Management |
| SIEM | Security Information and Event Management | UTP | Unshielded Twisted Pair |
| SIM | Subscriber Identity Module | VBA | Visual Basic for Applications |
| SIP | Session Initiation Protocol | VDE | Virtual Desktop Environment |
| SLA | Service-level Agreement | VDI | Virtual Desktop Infrastructure |
| SLE | Single Loss Expectancy | VLAN | Virtual Local Area Network |
| SMB | Server Message Block | VLSM | Variable-length Subnet Masking |
| S/MIME | Secure/Multipurpose Internet Mail Extensions | VM | Virtual Machine |
| SMS | Short Message Service | VoIP | Voice over IP |
| SMTP | Simple Mail Transfer Protocol | VPC | Virtual Private Cloud |
| SMTPS | Simple Mail Transfer Protocol Secure | VPN | Virtual Private Network |
| SNMP | Simple Network Management Protocol | VTC | Video Teleconferencing |
| SOAP | Simple Object Access Protocol | WAF | Web Application Firewall |
| SOAR | Security Orchestration, Automation, Response | WAP | Wireless Access Point |
| SoC | System on Chip | WEP | Wired Equivalent Privacy |
| SOC | Security Operations Center | WIDS | Wireless Intrusion Detection System |
| SPF | Sender Policy Framework | WIPS | Wireless Intrusion Prevention System |
| SPIM | Spam over Instant Messaging | WORM | Write Once Read Many |
| SQL | Structured Query Language | WPA | WiFi Protected Access |
| SQLi | SQL Injection | WPS | WiFi Protected Setup |
| SRTP | Secure Real-time Transport Protocol | XaaS | Anything as a Service |
| SSD | Solid State Drive | XML | Extensible Markup Language |
| SSH | Secure Shell | XOR | Exclusive OR |
| SSID | Service Set Identifier | XSRF | Cross-site Request Forgery |
| SSL | Secure Sockets Layer | XSS | Cross-site Scripting |
| SSO | Single Sign-on | | |
| STIX | Structured Threat Information eXpression | | |
| STP | Shielded Twisted Pair | | |
| SWG | Secure Web Gateway | | |
| TACACS+ | Terminal Access Controller Access Control System | | |
| TAXII | Trusted Automated eXchange | | |
| of Intelligence Information | | |
| TCP/IP | Transmission Control Protocol/Internet Protocol | | |
| TGT | Ticket Granting Ticket | | |
| TKIP | Temporal Key Integrity Protocol | | |
| TLS | Transport Layer Security | | |
| TOTP | Time-based One Time Password | | |
| TPM | Trusted Platform Module | | |
| TSIG | Transaction Signature | | |
| TTP | Tactics, Techniques, and Procedures | | |