Skip to main content

Security Acronyms

All of these are technology related:

ACRONYMDEFINITION
3DESTriple Data Encryption Standard
AAAAuthentication, Authorization, and Accounting
ABACAttribute-based Access Control
ACLAccess Control List
ADActive Directory
AESAdvanced Encryption Standard
AES256Advanced Encryption Standards 256bit
AHAuthentication Header
AIArtificial Intelligence
AISAutomated Indicator Sharing
ALEAnnualized Loss Expectancy
APAccess Point
APIApplication Programming Interface
APTAdvanced Persistent Threat
AROAnnualized Rate of Occurrence
ARPAddress Resolution Protocol
ASLRAddress Space Layout Randomization
ASPActive Server Pages
ATT&CKAdversarial Tactics, Techniques, and Common Knowledge
AUPAcceptable Use Policy
AVAntivirus
BASHBourne Again Shell
BCPBusiness Continuity Planning
BGPBorder Gateway Protocol
BIABusiness Impact Analysis
BIOSBasic Input/Output System
BPABusiness Partnership Agreement
BPDUBridge Protocol Data Unit
BSSIDBasic Service Set Identifier
BYODBring Your Own Device
CACertificate Authority
CAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart
CARCorrective Action Report
CASBCloud Access Security Broker
CBCCipher Block Chaining
CBTComputer-based Training
CCMPCounter-Mode/CBC-MAC Protocol
CCTVClosed-Circuit Television
CERTComputer Emergency Response Team
CFBCipher Feedback
CHAPChallenge-Handshake Authentication Protocol
CIAConfidentiality, Integrity, and Availability
CIOChief Information Officer
CIRTComputer Incident Response Team
CISCenter for Internet Security
CMSContent Management System
CNCommon Name
COOPContinuity of Operations Planning
COPECorporate-owned Personally Enabled
CPContingency Planning
CRCCyclic Redundancy Check
CRLCertificate Revocation List
CSACloud Security Alliance
CSIRTComputer Security Incident Response Team
CSOChief Security Officer
CSPCloud Service Provider
CSRCertificate Signing Request
CSRFCross-Site Request Forgery
CSUChannel Service Unit
CTMCounter-Mode
CTOChief Technology Officer
CVECommon Vulnerabilities and Exposures
CVSSCommon Vulnerability Scoring System
CYODChoose Your Own Device
DACDiscretionary Access Control
DBADatabase Administrator
DDoSDistributed Denial-of-Service
DEPData Execution Prevention
DERDistinguished Encoding Rules
DESData Encryption Standard
DHCPDynamic Host Configuration Protocol
DHEDiffie-Hellman Ephemeral
DKIMDomain Keys Identified Mail
DLLDynamic-link Library
DLPData Loss Prevention
DMARCDomain Message Authentication Reporting and Conformance
DNATDestination Network Address Translation
DNSDomain Name System
DNSSECDomain Name System Security Extensions
DoSDenial-of-Service
DPOData Protection Officer
DRPDisaster Recovery Plan
DSADigital Signature Algorithm
DSLDigital Subscriber Line
EAPExtensible Authentication Protocol
ECBElectronic Code Book
ECCElliptic-curve Cryptography
ECDHEElliptic-curve Diffie-Hellman Ephemeral
ECDSAElliptic-curve Digital Signature Algorithm
EDREndpoint Detection and Response
EFSEncrypted File System
EIPExtended Instruction Pointer
EOLEnd of Life
EOSEnd of Service
ERPEnterprise Resource Planning
ESNElectronic Serial Number
ESPEncapsulating Security Payload
ESSIDExtended Service Set Identifier
FACLFile System Access Control List
FDEFull Disk Encryption
FIMFile Integrity Monitoring
FPGAField Programmable Gate Array
FRRFalse Rejection Rate
FTPFile Transfer Protocol
FTPSSecured File Transfer Protocol
GCMGalois/Counter Mode
GDPRGeneral Data Protection Regulation
GPGGNU Privacy Guard
GPOGroup Policy Object
GPSGlobal Positioning System
GPUGraphics Processing Unit
GREGeneric Routing Encapsulation
HAHigh Availability
HDDHard Disk Drive
HIDSHost-based Intrusion Detection System
HIPSHost-based Intrusion Prevention System
HMACHash-based Message Authentication Code
HOTPHMAC-based One-time Password
HSMHardware Security Module
HSMaaSHardware Security Module as a Service
HTMLHypertext Markup Language
HTTPHypertext Transfer Protocol
HTTPSHypertext Transfer Protocol Secure
HVACHeating, Ventilation, Air Conditioning
IaaSInfrastructure as a Service
IAMIdentity and Access Management
ICMPInternet Control Message Protocol
ICSIndustrial Control Systems
IDEAInternational Data Encryption Algorithm
IDFIntermediate Distribution Frame
IdPIdentity Provider
IDSIntrusion Detection System
IEEEInstitute of Electrical and Electronics Engineers
IKEInternet Key Exchange
IMInstant Messaging
IMAP4Internet Message Access Protocol v4
IoCIndicators of Compromise
IoTInternet of Things
IPInternet Protocol
IPSIntrusion Prevention System
IPSecInternet Protocol Security
IRIncident Response
IRCInternet Relay Chat
IRPIncident Response Plan
ISAInterconnection Security Agreement
ISFWInternal Segmentation Firewall
ISOInternational Organization for Standardization
ISPInternet Service Provider
ISSOInformation Systems Security Officer
ITCPIT Contingency Plan
IVInitialization Vector
KDCKey Distribution Center
KEKKey Encryption Key
L2TPLayer 2 Tunneling Protocol
LANLocal Area Network
LDAPLightweight Directory Access Protocol
LEAPLightweight Extensible Authentication Protocol
MaaSMonitoring as a Service
MACMedia Access Control
MAMMobile Application Management
MANMetropolitan Area Network
MBRMaster Boot Record
MD5Message Digest 5
MDFMain Distribution Frame
MDMMobile Device Management
MFAMultifactor Authentication
MFDMultifunction Device
MFPMultifunction Printer
MLMachine Learning
MMSMultimedia Message Service
MOAMemorandum of Agreement
MOUMemorandum of Understanding
MPLSMultiprotocol Label Switching
MSAMeasurement Systems Analysis
MS-CHAPMicrosoft Challenge-Handshake Authentication Protocol
MSPManaged Service Provider
MSSPManaged Security Service Provider
MTBFMean Time Between Failures
MTTFMean Time to Failure
MTTRMean Time to Repair
MTUMaximum Transmission Unit
NACNetwork Access Control
NASNetwork-attached Storage
NATNetwork Address Translation
NDANon-disclosure Agreement
NFCNear-field Communication
NFVNetwork Function Virtualization
NGFWNext-generation Firewall
NG-SWGNext-generation Secure Web Gateway
NICNetwork Interface Card
NIDSNetwork-based Intrusion Detection System
NISTNational Institute of Standards and Technology
NIPSNetwork-based Intrusion Prevention System
NISTNational Institute of Standards and Technology
NTFSNew Technology File System
NTLMNew Technology LAN Manager
NTPNetwork Time Protocol
OAUTHOpen Authorization
OCSPOnline Certificate Status Protocol
OIDObject Identifier
OSOperating System
OSIOpen Systems Interconnection
OSINTOpen-source Intelligence
OSPFOpen Shortest Path First
OTOperational Technology
OTAOver-The-Air
OTGOn-The-Go
OVALOpen Vulnerability and Assessment Language
OWASPOpen Web Application Security Project
P12PKCS #12
P2PPeer-to-Peer
PaaSPlatform as a Service
PACProxy Auto Configuration
PAMPrivileged Access Management
PAPPassword Authentication Protocol
PATPort Address Translation
PBKDF2Password-Based Key Derivation Function 2
PBXPrivate Branch Exchange
PCAPPacket Capture
PCIPayment Card Industry
PCI-DSSPayment Card Industry Data Security Standard
PEPortable Executable
PEDPersonal Electronic Device
PFSPerfect Forward Secrecy
PGPPretty Good Privacy
PHIProtected Health Information
PIIPersonally Identifiable Information
PINPersonal Identification Number
PKCSPublic Key Cryptography Standards
PKIPublic Key Infrastructure
PLCProgrammable Logic Controller
PMProject Manager
PMSPatch Management System
POPPost Office Protocol
POP3Post Office Protocol 3
POTSPlain Old Telephone Service
PPPPoint-to-Point Protocol
PPTPPoint-to-Point Tunneling Protocol
PSKPre-Shared Key
PTZPan-Tilt-Zoom
RARecovery Agent
RADIUSRemote Authentication Dial-In User Service
RAIDRedundant Array of Independent Disks
RASRemote Access Service
RATRemote Access Trojan
RBACRole-based Access Control
RBACRule-based Access Control
RC4Rivest Cipher 4
RDPRemote Desktop Protocol
RESTRepresentational State Transfer
RFIDRadio Frequency Identification
RIPEMDRACE Integrity Primitives Evaluation Message Digest
RMMRemote Monitoring and Management
RPORecovery Point Objective
RSARivest, Shamir, and Adleman
RTORecovery Time Objective
RTPReal-time Transport Protocol
RTOSReal-time Operating System
S/MIMESecure/Multipurpose Internet Mail Extensions
SaaSSoftware as a Service
SAESimultaneous Authentication of Equals
SAMLSecurity Assertions Markup Language
SANStorage Area Network
SCADASupervisory Control and Data Acquisition
SCAPSecurity Content Automation Protocol
SCEPSimple Certificate Enrollment Protocol
SDKSoftware Development Kit
SDLCSoftware Development Life Cycle
SDNSoftware Defined Networking
SEHStructured Exception Handling
SFTPSecure File Transfer Protocol
SHASecure Hash Algorithm
SIEMSecurity Information and Event Management
SIMSubscriber Identity Module
SIRTSecurity Incident Response Team
SLAService Level Agreement
SLESingle Loss Expectancy
S/MIMESecure/Multipurpose Internet Mail Extensions
SMSShort Message Service
SMTPSimple Mail Transfer Protocol
SNMPSimple Network Management Protocol
SOAPSimple Object Access Protocol
SOARSecurity Orchestration, Automation, and Response
SOCSecurity Operations Center
SPIMSpam over Internet Messaging
SPoFSingle Point of Failure
SQLStructured Query Language
SRTPSecure Real-time Transport Protocol
SSDSolid State Drive
SSHSecure Shell
SSIDService Set Identifier
SSLSecure Sockets Layer
SSOSingle Sign-On
STPShielded Twisted Pair
STPSpanning Tree Protocol
SYNSynchronize
TACACSTerminal Access Controller Access-Control System
TACACS+Terminal Access Controller Access-Control System Plus
TCOTotal Cost of Ownership
TCPTransmission Control Protocol
TGTTicket Granting Ticket
TKIPTemporal Key Integrity Protocol
TLSTransport Layer Security
TOTPTime-based One-Time Password
TPMTrusted Platform Module
TSIGTransaction Signature
TTPTactics, Techniques, and Procedures
UATUser Acceptance Testing
UDPUser Datagram Protocol
UEBAUser and Entity Behavior Analytics
UEFIUnified Extensible Firmware Interface
UEMUnified Endpoint Management
UTMUnified Threat Management
UPSUninterruptible Power Supply
URLUniform Resource Locator
USBUniversal Serial Bus
USB OTGUniversal Serial Bus On-The-Go
UTMUnified Threat Management
VDIVirtual Desktop Infrastructure
VLANVirtual Local Area Network
VMVirtual Machine
VMIVirtual Mobile Infrastructure
VoIPVoice over Internet Protocol
VPNVirtual Private Network
VTCVideo Teleconferencing
WAFWeb Application Firewall
WAPWireless Access Point
WEPWired Equivalent Privacy
WIDSWireless Intrusion Detection System
WIPSWireless Intrusion Prevention System
WLANWireless Local Area Network
WPAWiFi Protected Access
WPA2WiFi Protected Access 2
WPA3WiFi Protected Access 3
WPSWiFi Protected Setup
WORMWrite Once Read Many
WWWWorld Wide Web
XaaSAnything as a Service
XMLExtensible Markup Language
XORExclusive OR
XSRFCross-site Request Forgery
XSSCross-site Scripting