Skip to content

List of acronyms (and also some abbreviations) that are somehow related to cybersecurity.

Notifications You must be signed in to change notification settings

pedrofdez26/cybersecurity-acronyms

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 

Repository files navigation

Cybersecurity Acronyms

List of acronyms (and also some abbreviations) that are somehow related to cybersecurity. Some of the items are in Spanish, but most of them are in English.

0-9

2FA: Two-Factor Authentication
3LA: 3 Letter Acronym
3PM: Third Party Monitoring

A

ABAC: Attribute-Based Access Control
Abandonware: Abandoned + software
ACE: Arbitrary Code Execution
ACK: Acknowledgement
ACL: Access Control List
ACME: Automatic Certificate Management Environment
ACR: Automatic Content Recognition
AD: Active Directory
ADB: Android Debug Bridge
ADDS: Active Directory Domain Services
Admin: Administrator
ADP: Advanced Data Protection
Adware: Advertising + software
AE: Authenticated Encryption
AES: Advanced Encryption Standard
AFP: Australian Federal Police
AGI: Artificial General Intelligence
AI: Artificial Intelligence
AITM: Adversary in the Middle
AJAX: Asynchronous JavaScript and XML
ALPR: Automated License Plate Reader
AML: Adversarial Machine Learning | Anti-Money Laundering
ANSI: American National Standards Institute
APFS: Apple File System
API: Application Programming Interface
APK: Android Package Kit | Android Package | Android Application Package
APM: Application Performance Monitoring
APP: Authorized Push Payment | Application
AppSec: Application Security
APT: Advanced Persistent Threat
AR: Augmented Reality | Automated Reasoning
Arb: Arbitrary
ARIN: American Registry for Internet Numbers
ARM: Advanced RISC Machine | Azure Resource Manager
ARP: Address Resolution Protocol
ASCII: American Standard Code for Information Interchange
ASG: Application Security Group
ASLR: Address Space Layout Randomization
ASM: Attack Surface Management
ASPM: Application Security Posture Management
ASR: Architecture Security Review
AST: Abstract Syntax Tree
ASVS: Application Security Verification Standard
ATM: Automated Teller Machine
ATO: Account Takeover
ATT&CK: Adversarial Tactics, Techniques, and Common Knowledge
Authn: Authentication
Authz: Authorization
AV: Antivirus, Autonomous Vehicle
AWS: Amazon Web Services
AZ: Availability Zone

B

B2B: Business-to-business
B2C: Business-to-consumer
BAS: Breach and Attack Simulation
BASL: Bridge All Site Links
BBM: BlackBerry Messenger
BCDR: Business Continuity and Disaster Recovery
BCI: Brain–computer interface
BCP: Business Continuity Plan
BCS: Building Control System
BEC: Business Email Compromise
BFF: Backend-for-frontend
BFLA: Broken Function Level Authorization
BGP: Border Gateway Protocol
BIMI: Brand Indicators for Message Identification
BIOS: Basic Input/Output System
Bit: Binary digit
BLE: Bluetooth Low Energy
BMI: Brain–machine interface
BOLA: Broken Object Level Authorization
Bossware: Boss + software
Botnet: Robot network
BSCP: Burp Suite Certified Practitioner
BSOD: Blue Screen of Death
BTC: Bitcoin
BYOD: Bring Your Own Device
BYOK: Bring Your Own Key
BYOL: Bring Your Own License

C

C2 | C&C: Command and Control
CA: Certificate Authority
CaaS: Compliance as a Service
CAF: Cloud Adoption Framework
CAIQ: Consensus Assessment Initiative Questionnaire
CAN: Controller Area Network
CAP: Consistency, Availability, Partition tolerance
CapEx: Capital Expenditure
CAPTCHA: Completely Automated Public Turing test to tell Computers and Humans Apart
CARTA: Continuous Adaptive Risk and Trust Assessment
CASB: Cloud Access Security Broker
CBA: Certificate-Based Authentication
CBC: Cipher Block Chaining
CBDC: Central Bank Digital Currency
CCM: Cloud Controls Matrix
CCPA: California Consumer Privacy Act
CD: Continuous Delivery | Continuous Deployment
CDA: Communications Decency Act
CDN: Content Delivery Network
CDR: Cloud Detection and Response
CEH: Certified Ethical Hacker
CERT: Computer Emergency Response Team
CFAA: Computer Fraud and Abuse Act
CFG: Control-flow graph
CFP: Call for Papers
CGN: Carrier-grade NAT
Chatbot: Chatter + robot
CI: Continuous Integration
CIA: Central Intelligence Agency | Confidentiality + Integrity + Availability
CIAM: Customer Identity and Access Management
CIDR: Classless Inter-Domain Routing
CIRT: Computer Incident Response Team
CIS: Center for Internet Security
CISA: Cybersecurity and Infrastructure Security Agency
CISC: Complex Instruction Set Computer
CISO: Chief Information Security Officer
CLI: Command Line Interface
Clickjacking: Click + hijacking
Clickops: Click + operations
CMDB: Configuration Management Database
CMK: Customer-managed key
CMS: Content Management System
CNA: CVE Numbering Authority
CNAME: Canonical Name
CNAPP: Cloud-Native Application Protection Platform
CNCF: Cloud Native Computing Foundation
CNI: Centro Nacional de Inteligencia
COBOL: Common Business Oriented Language
COMB: Compilation of Many Breaches
Comms: Communications
Config: Configuration
COPPA: Children's Online Privacy Protection Act
CORS: Cross-Origin Resource Sharing
COTS: Commercial off-the-shelf
CPD: Centro de Procesamiento de Datos
CPE: Customer-premises equipment | Common Platform Enumeration
CPG: Cybersecurity Performance Goal
CPU: Central Processing Unit
CR: Carriage Return
CRC: Cyclic Redundancy Check
Creds: Credentials
CRL: Certificate Revocation List
CRM: Customer Relationship Management
CRS: Core Rule Set | Container Runtime Security
CRUD: Create, Read, Update, and Delete
CS: Computer Science
CSA: Cloud Security Alliance
CSIRT: Computer Security Incident Response Team
CSO: Chief Security Officer
CSP: Content Security Policy | Cloud Service Provider
CSPM: Cloud Security Posture Management
CSR: Client-Side Rendering
CSRB: Cyber Safety Review Board
CSS: Cascading Style Sheets
CSV: Comma-Separated Values
CTF: Capture the Flag
CTI: Cyber Threat Intelligence
CTO: Chief Technology Officer
CTU: Counter Threat Unit
CVD: Coordinated Vulnerability Disclosure
CVE: Common Vulnerabilities and Exposures
CVSS: Common Vulnerability Scoring System
CWE: Common Weakness Enumeration
CWP: Cloud Workload Protection
CWPP: Cloud Workload Protection Platform
Cyber: Cybersecurity

D

DA: Domain Admin
DaaS: Desktop as a Service
DAN: Do Anything Now
DAO: Decentralized Autonomous Organization
DARPA: Defense Advanced Research Projects Agency
DAST: Dynamic Application Security Testing
DB: Database
DBA: Database Administrator
DBaaS: Database as a Service
DBIR: Data Breach Investigations Report
DBMS: Database Management System
DC: Domain Controller
DCV: Domain Control Validation
DDoS: Distributed Denial of Service
DeFi: Decentralized Finance
Demo: Demonstration
Demoware: Demo + software
DEP: Data Execution Prevention
DES: Data Encryption Standard
Dev: Developer | Development
DevOps: Development + Operations
DevSecOps: Development + Security + Operations
DFIR: Digital Forensics and Incident Response
DHCP: Dynamic Host Configuration Protocol
DHS: Department of Homeland Security
DID: Decentralized Identifier
DKIM: DomainKeys Identified Mail
DL: Distribution List
DLL: Dynamic-Link Library
DLP: Data Loss Prevention
DLS: Dedicated/Data Leak Site
DMARC: Domain-based Message Authentication, Reporting, and Conformance
DMP: Data memory-dependent prefetcher
DMS: Document Management System
DMZ: Demilitarized zone
DNAT: Destination NAT
DnR: Detection and Response
DNS: Domain Name System
DNT: Do Not Track
DOB: Date of Birth
DoD: Department of Defense
DoH: DNS over HTTPS
DOM: Document Object Model
DoS: Denial of Service
DOSA: Detection Oriented Security Architecture
DoT: DNS over TLS
DPO: Data Protection Officer
DPoP: Demonstrating Proof of Possession
DR: Disaster Recovery
DRM: Digital Rights Management
DSA: Digital Signature Algorithm
DSL: Domain-Specific Language
DSPM: Data Security Posture Management
DTD: Document Type Definition

E

E-waste: Electronic waste
E2EE: End-to-End Encryption
EASM: External Attack Surface Management
eBPF: Extended Berkeley Packet Filter
EC2: Elastic Compute Cloud
ECB: Electronic Code Book
ECC: Elliptic Curve Cryptography
ECDSA: Elliptic Curve Digital Signature Algorithm
ECH: Encrypted Client Hello
eCrime: Electronic Crime
ECU: Electronic Control Unit
EDA: Event-driven architecture
EDR: Endpoint Detection and Response | Emergency Data Request
EFF: Electronic Frontier Foundation
EHR: Electronic Health Record
EICAR: European Institute for Computer Antivirus Research
ELK: Elasticsearch, Logstash, and Kibana
Email: Electronic mail
ENISA: European Union Agency for Cybersecurity
ENS: Esquema Nacional de Seguridad
EOL: End Of Life
EoP: Elevation of Privilege
EPDR: Endpoint Protection, Detection and Response
EPP: Endpoint Protection Platform
EPSS: Exploit Prediction Scoring System
ERP: Enterprise Resource Planning
ESG: Email Security Gateway
ESNI: Encrypted Server Name Indication
ESU: Extended Security Update
ETH: Ether
ETSI: European Telecommunications Standards Institute
EU: European Union
EULA: End-User License Agreement
EV: Electric Vehicle, Extended Validation
Exec: Executive
exFAT: Extended File Allocation Table
Exfil: Exfiltration

F

FaaS: Function as a Service
FAT: File Allocation Table
FBI: Federal Bureau of Investigation
FCC: Federal Communications Commission
FGAC: Fine-Grained Access Control
FIDO: Fast Identity Online
FIFO: First In, First Out
FNMT: Fábrica Nacional de Moneda y Timbre
FOIA: Freedom of Information Act
FOSS: Free and Open Source Software
FQDN: Fully Qualified Domain Name
Freeware: Free + software
FS: Forward Secrecy
FSF: Free Software Foundation

G

GA: Global Administrator | General Availability
GAN: Generative Adversarial Network
GC: Garbage Collector
GCC: GNU Compiler Collection
GCHQ: Government Communications Headquarters
GCP: Google Cloud Platform
GDPR: General Data Protection Regulation
Gen: Genaration
GenAI: Generative AI
GIGO: Garbage in, garbage out
GNU: GNU's Not Unix
GPC: Global Privacy Control
GPL: General Public License
GPS: Global Positioning System
GPT: Generative Pre-trained Transformer
GPU: Graphics Processing Unit
GRC: Governance, Risk, and Compliance
GUI: Graphical User Interface
GUID: Globally Unique Identifier

H

HA: High Availability
HCL: HashiCorp Configuration Language
HDD: Hard Disk Drive
HI: Human Intelligence
HIBP: Have I Been Pwned
HID: Human Interface Device
HIPAA: Health Insurance Portability and Accountability Act
HMAC: Hash-Based Message Authentication Code
HMI: Human-Machine Interface
HNDL: Harvest Now, Decrypt Later
HPKP: HTTP Public Key Pinning
HSM: Hardware Security Module
HSTS: HTTP Strict Transport Security
HTB: Hack The Box
HTML: HyperText Markup Language
HTTP: Hypertext Transfer Protocol
HTTPS: Hypertext Transfer Protocol Secure
HUMINT: Human Intelligence

I

I+D: Investigación y Desarrollo
I+D+I: Investigación, Desarrollo e Innovación
IA: Inteligencia Artificial
IaaS: Infrastructure as a Service
IAB: Initial Access Broker
IaC: Infrastructure as Code
IAM: Identity and Access Management
IANA: Internet Assigned Numbers Authority
IAPP: International Association of Privacy Professionals
IAST: Interactive Application Security Testing
IBN: Internet Background Noise
IC: Intelligence Community
IC3: Internet Crime Complaint Center
ICAP: Internet Content Adaptation Protocol
ICMP: Internet Control Message Protocol
ICO: Information Commissioner's Office | Initial Coin Offering
ICS: Industrial Control System
ID: Identifier
IDA: Interactive Disassembler
IDE: Integrated Development Environment
IDOR: Insecure Direct Object Reference
IDP: Identity Provider | Internal Developer Platform
IDS: Intrusion Detection System
IDV: Identity Verification
IE: Internet Explorer
IEC: International Electrotechnical Commission
IEEE: Institute of Electrical and Electronics Engineers
IETF: Internet Engineering Task Force
IGA: Identity Governance and Administration
IIoT: Industrial Internet of Things
IIS: Internet Information Services
ILPIP: Instance-Level Public IP
IM: Instant Messaging
IMAP: Internet Messaging Access Protocol
IMEI: International Mobile Equipment Identity
INCIBE: Instituto Nacional de Ciberseguridad
Info: Information
InfoSec: Information Security
Infostealer: Information stealer
Infotainment: Information and entertainment
Infra: Infrastructure
Intel: Intelligence
IoA: Indicator of Attack
IOPS: Input/Output Operations Per Second
IoT: Internet of Things
IP: Internet Protocol | Intellectual Property | Instruction Pointer
IPA: iOS App Store Package
IPC: Inter-Process Communication
IPS: Intrusion Prevention System
IR: Incident Response
IRL: In Real Life
IRP: Incident Response Platform
IRS: Internal Revenue Service
ISAC: Information Sharing and Analysis Center
ISMS: Information Security Management System
ISO: International Organization for Standardization
ISP: Internet Service Provider
ISV: Independent Software Vendor
IT: Information Technology
ITDR: Identity Threat Detection and Response
IV: Initialization Vector

J

JAR: Java Archive
JEA: Just Enough Access
JIT: Just-in-time
JNIC: Jornadas Nacionales de Investigación en Ciberseguridad
JS: JavaScript
JSON: JavaScript Object Notation
JVM: Java Virtual Machine
JWT: JSON Web Token

K

K8s: Kubernetes
KBA: Knowledge-based authentication
KEV: Known Exploited Vulnerabilities
KPI: Key Performance Indicator
KQL: Kusto Query Language
KSK: Key Signing Key
KVM: Keyboard, Video and Mouse
KYC: Know Your Customer

L

LAN: Local Area Network
LDAP: Lightweight Directory Access Protocol
LED: Light Emitting Diode
LF: Line Feed
LFI: Local File Inclusion
LIFO: Last In, First Out
LLD: Low Level Design
LLM: Large Language Model
LOLBins: Living Off the Land Binaries
LotL: Living off the Land
LOTS: Living Off Trusted Sites
LTS: Long Term Support

M

M&A: Mergers and acquisitions
M2M: Machine-to-machine
MaaS: Malware as a Service
MAC: Media Access Control | Message Authentication Code
Malvertising: Malicious advertising
Malware: Malicious software
MBA: Master of Business Administration
MCRR: Managed Cyber Risk Reduction
MCSB: Microsoft Cloud Security Benchmark
MD5: Message Digest 5
MDE: Microsoft Defender for Endpoint
MDM: Mobile Device Management
MDR: Managed Detection and Response
MDVM: Microsoft Defender Vulnerability Management
MFA: Multi-Factor Authentication
MFT: Master File Table
MITM: Man in the Middle, Manipulator in the Middle
ML: Machine Learning
MLSecOps: Machine Learning + Security + Operations
MMU: Memory Management Unit
MO: Modus Operandi
MOAB: Mother of All Breaches
MOTW: Mark of the Web
MPA: Multi-Page Application
MPLS: Multiprotocol Label Switching
MQTT: Message Queuing Telemetry Transport
MRO: Memory Read Out
MSA: Microsoft account
MSP: Managed Service Provider
MSRC: Microsoft Security Response Center
MSSP: Managed Security Service Provider
MTA: Mail/Message Transfer Agent
MTD: Mobile Threat Defense
mTLS: Mutual Transport Layer Security
MTTR: Mean Time To Remediation
Mutex: Mutual exclusion
MVP: Minimum Viable Product | Most Valuable Professional
MVSP: Minimum Viable Secure Product
MX: Mail exchange

N

NAC: Network Access Control
NACL: Network Access Control List
NAPT: Network Address and Port Translation
NAS: Network-Attached Storage
NAT: Network Address Translation
NATO: North Atlantic Treaty Organization
NCA: National Crime Agency
NCS: National Cybersecurity Strategy
NCSC: National Cyber Security Centre
NDA: Non-Disclosure Agreement
NDR: Network Detection and Response
NetSec: Network Security
NFC: Near Field Communication
NFS: Network File System
NFT: Non-fungible token
NGFW: Next Generation Firewall
NIC: Network Interface Controller | Network Interface Card
NIST: National Institute of Standards and Technology
NL: New Line
NLP: Natural Language Processing
Nmap: Network mapper
NOC: Network Operations Center
NPM: Node Package Manager
NPU: Neural Processing Unit
NSA: National Security Agency
NSG: Network Security Group
NT: New Technology
NTFS: New Technology File System
NTP: Network Time Protocol
NVA: Network Virtual Appliance
NVD: National Vulnerability Database

O

O365: Office 365
OAST: Out-of-band Application Security Testing
OCPP: Open Charge Point Protocol
OCR: Optical Character Recognition
OCSP: Online Certificate Status Protocol
OFAC: Office of Foreign Assets Control
OIDC: OpenID Connect
On-prem: On-premises
OOP: Object-oriented programming
OPA: Open Policy Agent
OpenSSF: Open Source Security Foundation
OpEx: Operational Expenditure
OPSEC: Operations Security
ORM: Object Relational Mapping
OS: Operating System
OSB: Online Safety Bill
OSCP: Offensive Security Certified Professional
OSI: Open Systems Interconnection
OSINT: Open Source Intelligence
OSS: Open Source Software
OTA: Over-The-Air
OTP: One-Time Password
OTR: Off-the-Record
OU: Organizational Unit
OVA: Open Virtualization Application/Appliance
OVF: Open Virtualization Format
OWASP: Open Web Application Security Project

P

P2P: Peer-to-peer
P2S: Point-To-Site
PaaS: Platform as a Service
PaC | PAC: Policy as Code | Proxy Auto-Configuration
PAM: Pluggable Authentication Modules | Privileged Access Management
PAS: Privileged Access Security
PAW: Privileged Access Workstation
PAYG: Pay As You Go
PBKDF: Password-Based Key Derivation Function
PC: Personal Computer | Program Counter
PCAP: Packet Capture
PCI: Payment Card Industry
PDF: Portable Document Format
PDR: Public Disclosure Request
PE: Portable Executable
Pentest: Penetration Test
PET: Privacy-Enhancing Technologies
PFS: Perfect Forward Secrecy
PGP: Pretty Good Privacy
PhaaS: Phishing as a Service
PHI: Protected Health Information
PHP: Personal Home Page | PHP: Hypertext Preprocessor
PHS: Password Hash Sync
PI: Private Investigator
PIC: Position Independent Code
PID: Process Identifier
PIE: Position Independent Executable | Pre-Internet Encryption
PII: Personal Identifiable Information
PIM: Privileged Identity Management
PIN: Personal Identification Number
PIP: Pip Installs Packages
PITM: Person in the Middle
PKC: Public Key Cryptography
PKCE: Proof-Key for Code Exchange
PKI: Public key infrastructure
PLC: Programmable Logic Controller
PM: Product Manager
PMK: Platform-managed key
PMMU: Paged Memory Management Unit
PNT: Positioning, Navigation and Timing
PO: Purchase Order
PoC: Proof of Concept
POP: Post Office Protocol
PoS: Proof of Stake
POSIX: Portable Operating System Interface
POTS: Plain Old Telephone Service
PoW: Proof of Work
PPA: Privacy-Preserving Attribution
PPID: Parent Process Identifier
PPP: Plaid Parliament of Pwning
PQ: Post-quantum
PQC: Post-quantum cryptography
PR: Pull Request
PrivEsc: Privilege Escalation
PRNG: Pseudorandom Number Generator
Prod: Production
ProdSec: Product Security
PSF: Python Software Foundation
PSOA: Private Sector Offensive Actor
PTA: Pass Through Authentication
PTE: Page Table Entry
PUC: Personal Unblocking Code
PUK: Personal Unblocking Key
PUP: Potentially Unwanted Program
PyPI: Python Package Index

Q

QA: Quality Assurance
QC: Quantum Computing
Qishing: QR + Phishing
QR: Quick Response
Qubit: Quantum bit

R

R&D: Research and Development
RaaS: Ransomware as a Service
RACI: Responsible, Accountable, Consulted, Informed
RAM: Random Access Memory
Ransomware: Ransom + software
RAR: Roshal Archive
RASP: Runtime Application Self-Protection
RAT: Remote Administration Tool | Remote Access Trojan | Recovery Asset Team
RBAC: Role-Based Access Control
RCE: Remote Code Execution
RCM: Real Casa de la Moneda
RDBMS: Relational Database Management System
RDNS: Reverse DNS
RDP: Remote Desktop Protocol
RE: Reverse Engineering
Regex: Regular expression
RENIC: Red de Excelencia Nacional de Investigación en Ciberseguridad
Repo: Repository
REST: Representational State Transfer
RFC: Request for Comments
RFI: Remote File Inclusion
RFID: Radio Frequency Identification
RGPD: Reglamento General de Protección de Datos
RISC: Reduced Instruction Set Computer
RLHF: Reinforcement Learning from Human Feedback
RMM: Remote Monitoring and Management
ROI: Return on investment
ROM: Read-Only Memory
ROP: Return-Oriented Programming
RP: Relying Party
RPC: Remote Procedure Call
RPO: Recovery Point Objective
RSA: Rivest–Shamir–Adleman
RSI: Recursive Self-Improvement
RSR: Rapid Security Response
RST: Reset
RTB: Real Time Bidding
RTF: Rich Text Format
RTO: Recovery Time Objective
RTOS: Real-Time Operating System
RTU: Remote Terminal Unit
RVA: Risk and Vulnerability Assessment

S

S2C2F: Secure Supply Chain Consumption Framework
S2S: Site-To-Site
S3: Simple Storage Service
SaaS: Software as a Service
SAI: Sistema de Alimentación Ininterrumpida
SAML: Security Assertion Markup Language
SAS: Shared Access Signature
SASE: Secure Access Service Edge
SAST: Static Application Security Testing
SbD: Secure by Design
SBOM: Software Bill of Materials
SCA: Software Composition Analysis
SCADA: Supervisory Control and Data Acquisition
SD: Secure Digital
SDK: Software Development Kit
SDLC: Software Development Life Cycle
SDN: Software-defined networking
SDP: Software-Defined Perimeter | Safe Deployment Practices
SDV: Software-Defined Vehicle
SecDataOps: Security + Data + Operations
SEO: Search Engine Optimization
SHA: Secure Hash Algorithm
SIA: Secure Internet Access
SICI: Systemically Important Critical Infrastructure
SIEM: Security Information and Event Management
SIGINT: Signals intelligence
Simjacking: SIM + hijacking
SIP: System Integrity Protection
Skiddie: Script kiddie
SKU: Stock Keeping Unit
SLA: Service Level Agreement
SLM: Small Language Model
SLSA: Supply chain Levels for Software Artifacts
SMB: Server Message Block
SMBs: Small and Medium-sized Businesses
Smishing: SMS + Phishing
SMS: Short Message/Messaging Service
SMTP: Simple Mail Transfer Protocol
SNAT: Source NAT
SNI: Server Name Indication
SNMP: Simple Network Management Protocol
SOA: Statement of Applicability | Service-Oriented Architecture
SOAP: Simple Object Access Protocol
SOAR: Security orchestration, automation and response
SOC: Security Operations Center | Service Organization Control
SOHO: Small Office/Home Office
SOP: Same-Origin Policy
SOUP: Software of Unknown/Uncertain Pedigree/Provenance
SPA: Single-Page Application
Spec: Specification
SPF: Sender Policy Framework
SQL: Structured Query Language
SQLi: SQL injection
SRI: Subresource Integrity
SSD: Solid-State Drive
SSDF: Secure Software Development Framework
SSE: Security Service Edge
SSH: Secure Shell
SSID: Service Set Identifier
SSL: Secure Sockets Layer
SSN: Social Security number
SSO: Single Sign On
SSPM: SaaS Security Posture Management
SSPR: Self-Service Password Reset
SSR: Server-Side Rendering
SSRF: Server-Side Request Forgery
SSTI: Server Side Template Injection
Stalkerware: Stalker + software
STAR: Security, Trust, Assurance and Risk
Steg: Steganography
STIG: Security Technical Implementation Guide
STS: Security Token Service
SWIFT: Society for Worldwide Interbank Financial Telecommunications
SYN: Synchronize
Sysadmin: System administrator

T

TAG: Threat Analysis Group
TAP: Temporary Access Pass/Passcode
Tapjacking: Tap + hijacking
TCP: Transmission Control Protocol
TDD: Test-Driven Development
Tech: Technology
Telco: Telephone company
TFTP: Trivial File Transfer Protocol
THM: TryHackMe
Thrunting: Threat hunting
TI: Threat Intelligence
TLD: Top-Level Domain
TLS: Transport Layer Security
TOAD: Telephone Oriented Attack Delivery
TOCTOU: Time-Of-Check Time-Of-Use
TOFU: Trust On First Use
TOLA: Telecommunications and Other Legislation Amendment
TOPS: Trillion operations per second
TOR: The Onion Router
ToS: Terms of Service
TOTP: Time-based One-Time Password
ToU: Terms of Use
TPM: Trusted Platform Module | Third Party Monitoring
TPRM: Third-Party Risk Management
TPSA: Third Party Security Assessment
Trialware: Trial + software
TRU: Threat Response Unit
TTL: Time to live
TTPs: Tactics, Techniques, and Procedures
TTS: Text to Speech
TV: Television
TXT: Text

U

UA: User Agent
UAC: User Account Control
UAT: User Acceptance Testing
UBA: User Behavior Analytics
uBO: uBlock Origin
UCE: Unsolicited Commercial Email
UDP: User Datagram Protocol
UDR: User-Defined Route/Routing
UEBA: User and Entity Behavior Analytics
UEFI: Unified Extensible Firmware Interface
UI: User Interface
UML: Unified Modeling Language
UPnP: Universal Plug and Play
UPS: Uninterruptible power supply/source
URI: Universal Resource Identifier
URL: Uniform Resource Locator
US: United States
USB: Universal Serial Bus
USG: United States Government
USSS: United States Secret Service
UTC: Coordinated Universal Time
UTF: Unicode Transformation Format
UX: User Experience

V

VB: Visual Basic
VBA: Visual Basic for Applications
VC: Venture Capitalist
VCaaS: Voice Cloning as a Service
VDI: Virtual Desktop Infrastructure
VHD: Virtual Hard Disk
Vishing: Voice + Phishing
VLAN: Virtual Local Area Network
VM: Virtual Machine, Vulnerability Management
VNC: Virtual Network Computing
VoIP: Voice over Internet Protocol
VPN: Virtual Private Network
VPS: Virtual Private Server
VR: Virtual Reality
VS: Vulnerability Scan
Vuln: Vulnerability

W

WaaS: Wallet as a Service
WAF: Web Application Firewall | Well-Architected Framework
WAN: Wide Area Network
WEP: Wired Equivalent Privacy
WFH: Work From Home
WORM: Write Once, Read Many
WPA: Wi-Fi Protected Access
WPS: Wi-Fi Positioning System | Wi-Fi Protected Setup
WSL: Windows Subsystem for Linux
WWDC: Worldwide Developers Conference
WWW: World Wide Web

X

XDR: Extended Detection and Response
XML: Extensible Markup Language
XSS: Cross-Site Scripting
XXE: XML External Entity

Y

Y2K: Year 2000
YAML: Yet Another Markup Language | YAML Ain't Markup Language
YARA: Yet Another Ridiculous Acronym
YAST: Yet Another Security Tool

Z

ZDI: Zero Day Initiative
ZK: Zero Knowledge
ZSK: Zone Signing Key
ZTA: Zero Trust Architecture
ZTNA: Zero Trust Network Access

About

List of acronyms (and also some abbreviations) that are somehow related to cybersecurity.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published