List of acronyms (and also some abbreviations) that are somehow related to cybersecurity. Some of the items are in Spanish, but most of them are in English.
2FA: Two-Factor Authentication
3LA: 3 Letter Acronym
3PM: Third Party Monitoring
ABAC: Attribute-Based Access Control
Abandonware: Abandoned + software
ACE: Arbitrary Code Execution
ACK: Acknowledgement
ACL: Access Control List
ACME: Automatic Certificate Management Environment
ACR: Automatic Content Recognition
AD: Active Directory
ADB: Android Debug Bridge
ADDS: Active Directory Domain Services
Admin: Administrator
ADP: Advanced Data Protection
Adware: Advertising + software
AE: Authenticated Encryption
AES: Advanced Encryption Standard
AFP: Australian Federal Police
AGI: Artificial General Intelligence
AI: Artificial Intelligence
AITM: Adversary in the Middle
AJAX: Asynchronous JavaScript and XML
ALPR: Automated License Plate Reader
AML: Adversarial Machine Learning | Anti-Money Laundering
ANSI: American National Standards Institute
APFS: Apple File System
API: Application Programming Interface
APK: Android Package Kit | Android Package | Android Application Package
APM: Application Performance Monitoring
APP: Authorized Push Payment | Application
AppSec: Application Security
APT: Advanced Persistent Threat
AR: Augmented Reality | Automated Reasoning
Arb: Arbitrary
ARIN: American Registry for Internet Numbers
ARM: Advanced RISC Machine | Azure Resource Manager
ARP: Address Resolution Protocol
ASCII: American Standard Code for Information Interchange
ASG: Application Security Group
ASLR: Address Space Layout Randomization
ASM: Attack Surface Management
ASPM: Application Security Posture Management
ASR: Architecture Security Review
AST: Abstract Syntax Tree
ASVS: Application Security Verification Standard
ATM: Automated Teller Machine
ATO: Account Takeover
ATT&CK: Adversarial Tactics, Techniques, and Common Knowledge
Authn: Authentication
Authz: Authorization
AV: Antivirus, Autonomous Vehicle
AWS: Amazon Web Services
AZ: Availability Zone
B2B: Business-to-business
B2C: Business-to-consumer
BAS: Breach and Attack Simulation
BASL: Bridge All Site Links
BBM: BlackBerry Messenger
BCDR: Business Continuity and Disaster Recovery
BCI: Brain–computer interface
BCP: Business Continuity Plan
BCS: Building Control System
BEC: Business Email Compromise
BFF: Backend-for-frontend
BFLA: Broken Function Level Authorization
BGP: Border Gateway Protocol
BIMI: Brand Indicators for Message Identification
BIOS: Basic Input/Output System
Bit: Binary digit
BLE: Bluetooth Low Energy
BMI: Brain–machine interface
BOLA: Broken Object Level Authorization
Bossware: Boss + software
Botnet: Robot network
BSCP: Burp Suite Certified Practitioner
BSOD: Blue Screen of Death
BTC: Bitcoin
BYOD: Bring Your Own Device
BYOK: Bring Your Own Key
BYOL: Bring Your Own License
C2 | C&C: Command and Control
CA: Certificate Authority
CaaS: Compliance as a Service
CAF: Cloud Adoption Framework
CAIQ: Consensus Assessment Initiative Questionnaire
CAN: Controller Area Network
CAP: Consistency, Availability, Partition tolerance
CapEx: Capital Expenditure
CAPTCHA: Completely Automated Public Turing test to tell Computers and Humans Apart
CARTA: Continuous Adaptive Risk and Trust Assessment
CASB: Cloud Access Security Broker
CBA: Certificate-Based Authentication
CBC: Cipher Block Chaining
CBDC: Central Bank Digital Currency
CCM: Cloud Controls Matrix
CCPA: California Consumer Privacy Act
CD: Continuous Delivery | Continuous Deployment
CDA: Communications Decency Act
CDN: Content Delivery Network
CDR: Cloud Detection and Response
CEH: Certified Ethical Hacker
CERT: Computer Emergency Response Team
CFAA: Computer Fraud and Abuse Act
CFG: Control-flow graph
CFP: Call for Papers
CGN: Carrier-grade NAT
Chatbot: Chatter + robot
CI: Continuous Integration
CIA: Central Intelligence Agency | Confidentiality + Integrity + Availability
CIAM: Customer Identity and Access Management
CIDR: Classless Inter-Domain Routing
CIRT: Computer Incident Response Team
CIS: Center for Internet Security
CISA: Cybersecurity and Infrastructure Security Agency
CISC: Complex Instruction Set Computer
CISO: Chief Information Security Officer
CLI: Command Line Interface
Clickjacking: Click + hijacking
Clickops: Click + operations
CMDB: Configuration Management Database
CMK: Customer-managed key
CMS: Content Management System
CNA: CVE Numbering Authority
CNAME: Canonical Name
CNAPP: Cloud-Native Application Protection Platform
CNCF: Cloud Native Computing Foundation
CNI: Centro Nacional de Inteligencia
COBOL: Common Business Oriented Language
COMB: Compilation of Many Breaches
Comms: Communications
Config: Configuration
COPPA: Children's Online Privacy Protection Act
CORS: Cross-Origin Resource Sharing
COTS: Commercial off-the-shelf
CPD: Centro de Procesamiento de Datos
CPE: Customer-premises equipment | Common Platform Enumeration
CPG: Cybersecurity Performance Goal
CPU: Central Processing Unit
CR: Carriage Return
CRC: Cyclic Redundancy Check
Creds: Credentials
CRL: Certificate Revocation List
CRM: Customer Relationship Management
CRS: Core Rule Set | Container Runtime Security
CRUD: Create, Read, Update, and Delete
CS: Computer Science
CSA: Cloud Security Alliance
CSIRT: Computer Security Incident Response Team
CSO: Chief Security Officer
CSP: Content Security Policy | Cloud Service Provider
CSPM: Cloud Security Posture Management
CSR: Client-Side Rendering
CSRB: Cyber Safety Review Board
CSS: Cascading Style Sheets
CSV: Comma-Separated Values
CTF: Capture the Flag
CTI: Cyber Threat Intelligence
CTO: Chief Technology Officer
CTU: Counter Threat Unit
CVD: Coordinated Vulnerability Disclosure
CVE: Common Vulnerabilities and Exposures
CVSS: Common Vulnerability Scoring System
CWE: Common Weakness Enumeration
CWP: Cloud Workload Protection
CWPP: Cloud Workload Protection Platform
Cyber: Cybersecurity
DA: Domain Admin
DaaS: Desktop as a Service
DAN: Do Anything Now
DAO: Decentralized Autonomous Organization
DARPA: Defense Advanced Research Projects Agency
DAST: Dynamic Application Security Testing
DB: Database
DBA: Database Administrator
DBaaS: Database as a Service
DBIR: Data Breach Investigations Report
DBMS: Database Management System
DC: Domain Controller
DCV: Domain Control Validation
DDoS: Distributed Denial of Service
DeFi: Decentralized Finance
Demo: Demonstration
Demoware: Demo + software
DEP: Data Execution Prevention
DES: Data Encryption Standard
Dev: Developer | Development
DevOps: Development + Operations
DevSecOps: Development + Security + Operations
DFIR: Digital Forensics and Incident Response
DHCP: Dynamic Host Configuration Protocol
DHS: Department of Homeland Security
DID: Decentralized Identifier
DKIM: DomainKeys Identified Mail
DL: Distribution List
DLL: Dynamic-Link Library
DLP: Data Loss Prevention
DLS: Dedicated/Data Leak Site
DMARC: Domain-based Message Authentication, Reporting, and Conformance
DMP: Data memory-dependent prefetcher
DMS: Document Management System
DMZ: Demilitarized zone
DNAT: Destination NAT
DnR: Detection and Response
DNS: Domain Name System
DNT: Do Not Track
DOB: Date of Birth
DoD: Department of Defense
DoH: DNS over HTTPS
DOM: Document Object Model
DoS: Denial of Service
DOSA: Detection Oriented Security Architecture
DoT: DNS over TLS
DPO: Data Protection Officer
DPoP: Demonstrating Proof of Possession
DR: Disaster Recovery
DRM: Digital Rights Management
DSA: Digital Signature Algorithm
DSL: Domain-Specific Language
DSPM: Data Security Posture Management
DTD: Document Type Definition
E-waste: Electronic waste
E2EE: End-to-End Encryption
EASM: External Attack Surface Management
eBPF: Extended Berkeley Packet Filter
EC2: Elastic Compute Cloud
ECB: Electronic Code Book
ECC: Elliptic Curve Cryptography
ECDSA: Elliptic Curve Digital Signature Algorithm
ECH: Encrypted Client Hello
eCrime: Electronic Crime
ECU: Electronic Control Unit
EDA: Event-driven architecture
EDR: Endpoint Detection and Response | Emergency Data Request
EFF: Electronic Frontier Foundation
EHR: Electronic Health Record
EICAR: European Institute for Computer Antivirus Research
ELK: Elasticsearch, Logstash, and Kibana
Email: Electronic mail
ENISA: European Union Agency for Cybersecurity
ENS: Esquema Nacional de Seguridad
EOL: End Of Life
EoP: Elevation of Privilege
EPDR: Endpoint Protection, Detection and Response
EPP: Endpoint Protection Platform
EPSS: Exploit Prediction Scoring System
ERP: Enterprise Resource Planning
ESG: Email Security Gateway
ESNI: Encrypted Server Name Indication
ESU: Extended Security Update
ETH: Ether
ETSI: European Telecommunications Standards Institute
EU: European Union
EULA: End-User License Agreement
EV: Electric Vehicle, Extended Validation
Exec: Executive
exFAT: Extended File Allocation Table
Exfil: Exfiltration
FaaS: Function as a Service
FAT: File Allocation Table
FBI: Federal Bureau of Investigation
FCC: Federal Communications Commission
FGAC: Fine-Grained Access Control
FIDO: Fast Identity Online
FIFO: First In, First Out
FNMT: Fábrica Nacional de Moneda y Timbre
FOIA: Freedom of Information Act
FOSS: Free and Open Source Software
FQDN: Fully Qualified Domain Name
Freeware: Free + software
FS: Forward Secrecy
FSF: Free Software Foundation
GA: Global Administrator | General Availability
GAN: Generative Adversarial Network
GC: Garbage Collector
GCC: GNU Compiler Collection
GCHQ: Government Communications Headquarters
GCP: Google Cloud Platform
GDPR: General Data Protection Regulation
Gen: Genaration
GenAI: Generative AI
GIGO: Garbage in, garbage out
GNU: GNU's Not Unix
GPC: Global Privacy Control
GPL: General Public License
GPS: Global Positioning System
GPT: Generative Pre-trained Transformer
GPU: Graphics Processing Unit
GRC: Governance, Risk, and Compliance
GUI: Graphical User Interface
GUID: Globally Unique Identifier
HA: High Availability
HCL: HashiCorp Configuration Language
HDD: Hard Disk Drive
HI: Human Intelligence
HIBP: Have I Been Pwned
HID: Human Interface Device
HIPAA: Health Insurance Portability and Accountability Act
HMAC: Hash-Based Message Authentication Code
HMI: Human-Machine Interface
HNDL: Harvest Now, Decrypt Later
HPKP: HTTP Public Key Pinning
HSM: Hardware Security Module
HSTS: HTTP Strict Transport Security
HTB: Hack The Box
HTML: HyperText Markup Language
HTTP: Hypertext Transfer Protocol
HTTPS: Hypertext Transfer Protocol Secure
HUMINT: Human Intelligence
I+D: Investigación y Desarrollo
I+D+I: Investigación, Desarrollo e Innovación
IA: Inteligencia Artificial
IaaS: Infrastructure as a Service
IAB: Initial Access Broker
IaC: Infrastructure as Code
IAM: Identity and Access Management
IANA: Internet Assigned Numbers Authority
IAPP: International Association of Privacy Professionals
IAST: Interactive Application Security Testing
IBN: Internet Background Noise
IC: Intelligence Community
IC3: Internet Crime Complaint Center
ICAP: Internet Content Adaptation Protocol
ICMP: Internet Control Message Protocol
ICO: Information Commissioner's Office | Initial Coin Offering
ICS: Industrial Control System
ID: Identifier
IDA: Interactive Disassembler
IDE: Integrated Development Environment
IDOR: Insecure Direct Object Reference
IDP: Identity Provider | Internal Developer Platform
IDS: Intrusion Detection System
IDV: Identity Verification
IE: Internet Explorer
IEC: International Electrotechnical Commission
IEEE: Institute of Electrical and Electronics Engineers
IETF: Internet Engineering Task Force
IGA: Identity Governance and Administration
IIoT: Industrial Internet of Things
IIS: Internet Information Services
ILPIP: Instance-Level Public IP
IM: Instant Messaging
IMAP: Internet Messaging Access Protocol
IMEI: International Mobile Equipment Identity
INCIBE: Instituto Nacional de Ciberseguridad
Info: Information
InfoSec: Information Security
Infostealer: Information stealer
Infotainment: Information and entertainment
Infra: Infrastructure
Intel: Intelligence
IoA: Indicator of Attack
IOPS: Input/Output Operations Per Second
IoT: Internet of Things
IP: Internet Protocol | Intellectual Property | Instruction Pointer
IPA: iOS App Store Package
IPC: Inter-Process Communication
IPS: Intrusion Prevention System
IR: Incident Response
IRL: In Real Life
IRP: Incident Response Platform
IRS: Internal Revenue Service
ISAC: Information Sharing and Analysis Center
ISMS: Information Security Management System
ISO: International Organization for Standardization
ISP: Internet Service Provider
ISV: Independent Software Vendor
IT: Information Technology
ITDR: Identity Threat Detection and Response
IV: Initialization Vector
JAR: Java Archive
JEA: Just Enough Access
JIT: Just-in-time
JNIC: Jornadas Nacionales de Investigación en Ciberseguridad
JS: JavaScript
JSON: JavaScript Object Notation
JVM: Java Virtual Machine
JWT: JSON Web Token
K8s: Kubernetes
KBA: Knowledge-based authentication
KEV: Known Exploited Vulnerabilities
KPI: Key Performance Indicator
KQL: Kusto Query Language
KSK: Key Signing Key
KVM: Keyboard, Video and Mouse
KYC: Know Your Customer
LAN: Local Area Network
LDAP: Lightweight Directory Access Protocol
LED: Light Emitting Diode
LF: Line Feed
LFI: Local File Inclusion
LIFO: Last In, First Out
LLD: Low Level Design
LLM: Large Language Model
LOLBins: Living Off the Land Binaries
LotL: Living off the Land
LOTS: Living Off Trusted Sites
LTS: Long Term Support
M&A: Mergers and acquisitions
M2M: Machine-to-machine
MaaS: Malware as a Service
MAC: Media Access Control | Message Authentication Code
Malvertising: Malicious advertising
Malware: Malicious software
MBA: Master of Business Administration
MCRR: Managed Cyber Risk Reduction
MCSB: Microsoft Cloud Security Benchmark
MD5: Message Digest 5
MDE: Microsoft Defender for Endpoint
MDM: Mobile Device Management
MDR: Managed Detection and Response
MDVM: Microsoft Defender Vulnerability Management
MFA: Multi-Factor Authentication
MFT: Master File Table
MITM: Man in the Middle, Manipulator in the Middle
ML: Machine Learning
MLSecOps: Machine Learning + Security + Operations
MMU: Memory Management Unit
MO: Modus Operandi
MOAB: Mother of All Breaches
MOTW: Mark of the Web
MPA: Multi-Page Application
MPLS: Multiprotocol Label Switching
MQTT: Message Queuing Telemetry Transport
MRO: Memory Read Out
MSA: Microsoft account
MSP: Managed Service Provider
MSRC: Microsoft Security Response Center
MSSP: Managed Security Service Provider
MTA: Mail/Message Transfer Agent
MTD: Mobile Threat Defense
mTLS: Mutual Transport Layer Security
MTTR: Mean Time To Remediation
Mutex: Mutual exclusion
MVP: Minimum Viable Product | Most Valuable Professional
MVSP: Minimum Viable Secure Product
MX: Mail exchange
NAC: Network Access Control
NACL: Network Access Control List
NAPT: Network Address and Port Translation
NAS: Network-Attached Storage
NAT: Network Address Translation
NATO: North Atlantic Treaty Organization
NCA: National Crime Agency
NCS: National Cybersecurity Strategy
NCSC: National Cyber Security Centre
NDA: Non-Disclosure Agreement
NDR: Network Detection and Response
NetSec: Network Security
NFC: Near Field Communication
NFS: Network File System
NFT: Non-fungible token
NGFW: Next Generation Firewall
NIC: Network Interface Controller | Network Interface Card
NIST: National Institute of Standards and Technology
NL: New Line
NLP: Natural Language Processing
Nmap: Network mapper
NOC: Network Operations Center
NPM: Node Package Manager
NPU: Neural Processing Unit
NSA: National Security Agency
NSG: Network Security Group
NT: New Technology
NTFS: New Technology File System
NTP: Network Time Protocol
NVA: Network Virtual Appliance
NVD: National Vulnerability Database
O365: Office 365
OAST: Out-of-band Application Security Testing
OCPP: Open Charge Point Protocol
OCR: Optical Character Recognition
OCSP: Online Certificate Status Protocol
OFAC: Office of Foreign Assets Control
OIDC: OpenID Connect
On-prem: On-premises
OOP: Object-oriented programming
OPA: Open Policy Agent
OpenSSF: Open Source Security Foundation
OpEx: Operational Expenditure
OPSEC: Operations Security
ORM: Object Relational Mapping
OS: Operating System
OSB: Online Safety Bill
OSCP: Offensive Security Certified Professional
OSI: Open Systems Interconnection
OSINT: Open Source Intelligence
OSS: Open Source Software
OTA: Over-The-Air
OTP: One-Time Password
OTR: Off-the-Record
OU: Organizational Unit
OVA: Open Virtualization Application/Appliance
OVF: Open Virtualization Format
OWASP: Open Web Application Security Project
P2P: Peer-to-peer
P2S: Point-To-Site
PaaS: Platform as a Service
PaC | PAC: Policy as Code | Proxy Auto-Configuration
PAM: Pluggable Authentication Modules | Privileged Access Management
PAS: Privileged Access Security
PAW: Privileged Access Workstation
PAYG: Pay As You Go
PBKDF: Password-Based Key Derivation Function
PC: Personal Computer | Program Counter
PCAP: Packet Capture
PCI: Payment Card Industry
PDF: Portable Document Format
PDR: Public Disclosure Request
PE: Portable Executable
Pentest: Penetration Test
PET: Privacy-Enhancing Technologies
PFS: Perfect Forward Secrecy
PGP: Pretty Good Privacy
PhaaS: Phishing as a Service
PHI: Protected Health Information
PHP: Personal Home Page | PHP: Hypertext Preprocessor
PHS: Password Hash Sync
PI: Private Investigator
PIC: Position Independent Code
PID: Process Identifier
PIE: Position Independent Executable | Pre-Internet Encryption
PII: Personal Identifiable Information
PIM: Privileged Identity Management
PIN: Personal Identification Number
PIP: Pip Installs Packages
PITM: Person in the Middle
PKC: Public Key Cryptography
PKCE: Proof-Key for Code Exchange
PKI: Public key infrastructure
PLC: Programmable Logic Controller
PM: Product Manager
PMK: Platform-managed key
PMMU: Paged Memory Management Unit
PNT: Positioning, Navigation and Timing
PO: Purchase Order
PoC: Proof of Concept
POP: Post Office Protocol
PoS: Proof of Stake
POSIX: Portable Operating System Interface
POTS: Plain Old Telephone Service
PoW: Proof of Work
PPA: Privacy-Preserving Attribution
PPID: Parent Process Identifier
PPP: Plaid Parliament of Pwning
PQ: Post-quantum
PQC: Post-quantum cryptography
PR: Pull Request
PrivEsc: Privilege Escalation
PRNG: Pseudorandom Number Generator
Prod: Production
ProdSec: Product Security
PSF: Python Software Foundation
PSOA: Private Sector Offensive Actor
PTA: Pass Through Authentication
PTE: Page Table Entry
PUC: Personal Unblocking Code
PUK: Personal Unblocking Key
PUP: Potentially Unwanted Program
PyPI: Python Package Index
QA: Quality Assurance
QC: Quantum Computing
Qishing: QR + Phishing
QR: Quick Response
Qubit: Quantum bit
R&D: Research and Development
RaaS: Ransomware as a Service
RACI: Responsible, Accountable, Consulted, Informed
RAM: Random Access Memory
Ransomware: Ransom + software
RAR: Roshal Archive
RASP: Runtime Application Self-Protection
RAT: Remote Administration Tool | Remote Access Trojan | Recovery Asset Team
RBAC: Role-Based Access Control
RCE: Remote Code Execution
RCM: Real Casa de la Moneda
RDBMS: Relational Database Management System
RDNS: Reverse DNS
RDP: Remote Desktop Protocol
RE: Reverse Engineering
Regex: Regular expression
RENIC: Red de Excelencia Nacional de Investigación en Ciberseguridad
Repo: Repository
REST: Representational State Transfer
RFC: Request for Comments
RFI: Remote File Inclusion
RFID: Radio Frequency Identification
RGPD: Reglamento General de Protección de Datos
RISC: Reduced Instruction Set Computer
RLHF: Reinforcement Learning from Human Feedback
RMM: Remote Monitoring and Management
ROI: Return on investment
ROM: Read-Only Memory
ROP: Return-Oriented Programming
RP: Relying Party
RPC: Remote Procedure Call
RPO: Recovery Point Objective
RSA: Rivest–Shamir–Adleman
RSI: Recursive Self-Improvement
RSR: Rapid Security Response
RST: Reset
RTB: Real Time Bidding
RTF: Rich Text Format
RTO: Recovery Time Objective
RTOS: Real-Time Operating System
RTU: Remote Terminal Unit
RVA: Risk and Vulnerability Assessment
S2C2F: Secure Supply Chain Consumption Framework
S2S: Site-To-Site
S3: Simple Storage Service
SaaS: Software as a Service
SAI: Sistema de Alimentación Ininterrumpida
SAML: Security Assertion Markup Language
SAS: Shared Access Signature
SASE: Secure Access Service Edge
SAST: Static Application Security Testing
SbD: Secure by Design
SBOM: Software Bill of Materials
SCA: Software Composition Analysis
SCADA: Supervisory Control and Data Acquisition
SD: Secure Digital
SDK: Software Development Kit
SDLC: Software Development Life Cycle
SDN: Software-defined networking
SDP: Software-Defined Perimeter | Safe Deployment Practices
SDV: Software-Defined Vehicle
SecDataOps: Security + Data + Operations
SEO: Search Engine Optimization
SHA: Secure Hash Algorithm
SIA: Secure Internet Access
SICI: Systemically Important Critical Infrastructure
SIEM: Security Information and Event Management
SIGINT: Signals intelligence
Simjacking: SIM + hijacking
SIP: System Integrity Protection
Skiddie: Script kiddie
SKU: Stock Keeping Unit
SLA: Service Level Agreement
SLM: Small Language Model
SLSA: Supply chain Levels for Software Artifacts
SMB: Server Message Block
SMBs: Small and Medium-sized Businesses
Smishing: SMS + Phishing
SMS: Short Message/Messaging Service
SMTP: Simple Mail Transfer Protocol
SNAT: Source NAT
SNI: Server Name Indication
SNMP: Simple Network Management Protocol
SOA: Statement of Applicability | Service-Oriented Architecture
SOAP: Simple Object Access Protocol
SOAR: Security orchestration, automation and response
SOC: Security Operations Center | Service Organization Control
SOHO: Small Office/Home Office
SOP: Same-Origin Policy
SOUP: Software of Unknown/Uncertain Pedigree/Provenance
SPA: Single-Page Application
Spec: Specification
SPF: Sender Policy Framework
SQL: Structured Query Language
SQLi: SQL injection
SRI: Subresource Integrity
SSD: Solid-State Drive
SSDF: Secure Software Development Framework
SSE: Security Service Edge
SSH: Secure Shell
SSID: Service Set Identifier
SSL: Secure Sockets Layer
SSN: Social Security number
SSO: Single Sign On
SSPM: SaaS Security Posture Management
SSPR: Self-Service Password Reset
SSR: Server-Side Rendering
SSRF: Server-Side Request Forgery
SSTI: Server Side Template Injection
Stalkerware: Stalker + software
STAR: Security, Trust, Assurance and Risk
Steg: Steganography
STIG: Security Technical Implementation Guide
STS: Security Token Service
SWIFT: Society for Worldwide Interbank Financial Telecommunications
SYN: Synchronize
Sysadmin: System administrator
TAG: Threat Analysis Group
TAP: Temporary Access Pass/Passcode
Tapjacking: Tap + hijacking
TCP: Transmission Control Protocol
TDD: Test-Driven Development
Tech: Technology
Telco: Telephone company
TFTP: Trivial File Transfer Protocol
THM: TryHackMe
Thrunting: Threat hunting
TI: Threat Intelligence
TLD: Top-Level Domain
TLS: Transport Layer Security
TOAD: Telephone Oriented Attack Delivery
TOCTOU: Time-Of-Check Time-Of-Use
TOFU: Trust On First Use
TOLA: Telecommunications and Other Legislation Amendment
TOPS: Trillion operations per second
TOR: The Onion Router
ToS: Terms of Service
TOTP: Time-based One-Time Password
ToU: Terms of Use
TPM: Trusted Platform Module | Third Party Monitoring
TPRM: Third-Party Risk Management
TPSA: Third Party Security Assessment
Trialware: Trial + software
TRU: Threat Response Unit
TTL: Time to live
TTPs: Tactics, Techniques, and Procedures
TTS: Text to Speech
TV: Television
TXT: Text
UA: User Agent
UAC: User Account Control
UAT: User Acceptance Testing
UBA: User Behavior Analytics
uBO: uBlock Origin
UCE: Unsolicited Commercial Email
UDP: User Datagram Protocol
UDR: User-Defined Route/Routing
UEBA: User and Entity Behavior Analytics
UEFI: Unified Extensible Firmware Interface
UI: User Interface
UML: Unified Modeling Language
UPnP: Universal Plug and Play
UPS: Uninterruptible power supply/source
URI: Universal Resource Identifier
URL: Uniform Resource Locator
US: United States
USB: Universal Serial Bus
USG: United States Government
USSS: United States Secret Service
UTC: Coordinated Universal Time
UTF: Unicode Transformation Format
UX: User Experience
VB: Visual Basic
VBA: Visual Basic for Applications
VC: Venture Capitalist
VCaaS: Voice Cloning as a Service
VDI: Virtual Desktop Infrastructure
VHD: Virtual Hard Disk
Vishing: Voice + Phishing
VLAN: Virtual Local Area Network
VM: Virtual Machine, Vulnerability Management
VNC: Virtual Network Computing
VoIP: Voice over Internet Protocol
VPN: Virtual Private Network
VPS: Virtual Private Server
VR: Virtual Reality
VS: Vulnerability Scan
Vuln: Vulnerability
WaaS: Wallet as a Service
WAF: Web Application Firewall | Well-Architected Framework
WAN: Wide Area Network
WEP: Wired Equivalent Privacy
WFH: Work From Home
WORM: Write Once, Read Many
WPA: Wi-Fi Protected Access
WPS: Wi-Fi Positioning System | Wi-Fi Protected Setup
WSL: Windows Subsystem for Linux
WWDC: Worldwide Developers Conference
WWW: World Wide Web
XDR: Extended Detection and Response
XML: Extensible Markup Language
XSS: Cross-Site Scripting
XXE: XML External Entity
Y2K: Year 2000
YAML: Yet Another Markup Language | YAML Ain't Markup Language
YARA: Yet Another Ridiculous Acronym
YAST: Yet Another Security Tool
ZDI: Zero Day Initiative
ZK: Zero Knowledge
ZSK: Zone Signing Key
ZTA: Zero Trust Architecture
ZTNA: Zero Trust Network Access