When you take certification exams like CompTIA Security+, CISSP, CEH, or CISM, you’re bound to encounter countless acronyms. If you don’t know what an acronym stands for, you might fail to understand a problem or pick the right answer. On this post, you’ll find more than a hundred acronyms, what each acronym stands for, and their corresponding definitions.

AcronymStands ForDescription
ACLAccess Control ListSpecifies which users or systems can access specific resources and what actions they can perform.
ADActive DirectoryMicrosoft directory service for managing users, computers, and resources.
AESAdvanced Encryption StandardA symmetric encryption algorithm widely used for securing data.
ALEAnnualized Loss ExpectancyEstimated financial loss from a risk over a one-year period.
APTAdvanced Persistent ThreatA prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected.
AVAntivirusSoftware designed to detect, prevent, and remove malware.
BECBusiness Email CompromiseSocial-engineering scam that tricks staff into sending money or data to attackers via spoofed email threads.
BGPBorder Gateway ProtocolProtocol used to exchange routing information across the internet; can be exploited.
BIABusiness Impact AnalysisIdentifies critical operations and the impact of disruptions to them.
C2Command and ControlCommunication channel an attacker uses to issue commands to, and receive data from, compromised systems.
CACertificate AuthorityEntity that issues digital certificates used to verify identities online.
CABChange Advisory BoardA group that evaluates and approves IT change requests.
CBCCipher Block ChainingA mode of operation for block ciphers to enhance encryption strength.
CERTComputer Emergency Response TeamA group that handles cybersecurity incidents and responses.
CI/CDContinuous Integration / Continuous DeploymentAutomated software development practice that can introduce security risks if not managed properly.
CIOChief Information OfficerSenior executive responsible for managing and implementing IT strategy.
CISACybersecurity and Infrastructure Security AgencyU.S. government agency responsible for protecting critical infrastructure.
CISOChief Information Security OfficerExecutive responsible for an organization’s information and data security.
CSPContent Security PolicyA security standard that helps prevent cross-site scripting and other attacks.
CSPMCloud Security Posture ManagementTools that help manage cloud security misconfigurations and risks.
CSRFCross-Site Request ForgeryA web exploit where a user is tricked into performing actions without consent.
CTRClick-Through RateUsed in phishing analysis to evaluate the effectiveness of email lures.
CVECommon Vulnerabilities and ExposuresPublic catalog that assigns IDs to disclosed security flaws so they can be tracked consistently.
CVSSCommon Vulnerability Scoring SystemStandardized formula (0–10) for gauging the severity of a CVE.
CWECommon Weakness EnumerationCommunity-curated list of software and hardware weakness types (e.g., buffer overflow, XSS).
DACDiscretionary Access ControlAccess control method where owners decide permissions for resources.
DDoSDistributed Denial of ServiceA type of cyberattack where multiple systems overwhelm a target, disrupting service.
DLPData Loss PreventionTools and strategies to prevent sensitive data from leaving the organization.
DMZDemilitarized ZoneA physical or logical subnetwork that separates an internal network from untrusted external networks.
DNSDomain Name SystemTranslates domain names into IP addresses. DNS can be exploited for attacks like DNS spoofing.
DSADigital Signature AlgorithmNIST-approved algorithm for generating/verifying digital signatures.
EASMExternal Attack Surface ManagementIdentifies and manages assets exposed to the internet.
ECCElliptic Curve CryptographyPublic-key crypto that offers strong security with smaller key sizes than RSA.
EDREndpoint Detection and ResponseSecurity technology that monitors endpoint devices to detect and respond to cyber threats.
EPPEndpoint Protection PlatformSecurity solution to protect endpoints such as PCs and servers.
FIDOFast Identity OnlineOpen standard for secure, passwordless authentication.
FIMFile Integrity MonitoringDetects changes to files that could indicate a breach or unauthorized activity.
FIPSFederal Information Processing StandardsU.S. government security standards (e.g., FIPS 140-3 for crypto modules).
FISMAFederal Information Security Management ActU.S. law to protect government information systems.
FQDNFully Qualified Domain NameComplete domain name that specifies exact location within DNS hierarchy.
GAGeneral AvailabilityPhase when software becomes publicly available—relevant for tracking patch cycles.
GDPRGeneral Data Protection RegulationEU law that governs personal-data privacy, breach notification, and fines.
GRCGovernance, Risk, and ComplianceFramework for managing IT and cybersecurity risks and meeting compliance.
HIDSHost-based Intrusion Detection SystemMonitors a specific host or device for suspicious activity.
HMACHash-based Message Authentication CodeCombines a cryptographic hash with a secret key to verify data integrity and authenticity.
HSMHardware Security ModulePhysical device that safeguards and manages digital keys.
HSTSHTTP Strict Transport SecurityResponse header that forces browsers to use HTTPS for a site, mitigating downgrade attacks.
IAMIdentity and Access ManagementFramework of policies and technologies to ensure proper access to systems.
IDSIntrusion Detection SystemMonitors network traffic for suspicious activity and alerts administrators.
IoCIndicator of CompromiseEvidence on a network or system that indicates a security breach.
IoTInternet of ThingsNetwork of connected devices that can be vulnerable to cyberattacks.
IPSIntrusion Prevention SystemLike IDS, but also takes action to block detected threats in real time.
JWTJSON Web TokenCompact, signed JSON object used to convey identity or claims between parties (common in APIs).
KBAKnowledge-Based AuthenticationAuthentication based on the user’s knowledge of personal information.
KMSKey Management ServiceCentralized system for creating, rotating, and destroying cryptographic keys (cloud or on-prem).
LAPSLocal Administrator Password SolutionMicrosoft tool for managing local admin passwords securely.
MACMandatory Access ControlAccess control where policies are centrally enforced, not at the discretion of users.
MDRManaged Detection and ResponseOutsourced service providing threat hunting, monitoring, and response.
MFAMulti-Factor AuthenticationA security system that requires more than one method of authentication from independent categories.
MITMMan-In-The-MiddleAn attack where the attacker secretly intercepts communication between two parties.
MTTDMean Time to DetectAverage time it takes to identify a threat or incident.
MTTRMean Time to Respond / RecoverAverage time to contain and remediate a threat.
NACNetwork Access ControlRestricts unauthorized devices from accessing the network.
NIDSNetwork Intrusion Detection SystemMonitors network traffic for malicious patterns and raises alerts.
NISTNational Institute of Standards and TechnologyU.S. agency that provides cybersecurity frameworks and best practices.
OAUTHOpen AuthorizationA protocol for secure delegated access (e.g., logging in via Google).
OCSPOnline Certificate Status ProtocolReal-time method for checking whether an X.509 certificate has been revoked.
OSINTOpen Source IntelligenceInformation collected from publicly available sources for threat analysis.
OTPOne-Time PasswordPassword valid for a single login or transaction (often delivered via SMS or app).
PAMPrivileged Access ManagementControls and monitors access of privileged users to critical systems.
PFSPerfect Forward SecrecyEnsures session keys are not compromised even if private key is.
PIIPersonally Identifiable InformationData that can uniquely identify an individual (name, SSN, biometric data, etc.).
PKIPublic Key InfrastructureSystem for managing encryption keys and digital certificates.
RATRemote Access TrojanMalware that allows an attacker to control a system remotely.
RBACRole-Based Access ControlGrants permissions based on users’ job roles to enforce least privilege.
RPORecovery Point ObjectiveMaximum acceptable amount of data loss in a disaster scenario.
RTORecovery Time ObjectiveMaximum acceptable time to restore operations after an incident.
SAMLSecurity Assertion Markup LanguageXML-based standard that transmits authentication and authorization data between identity providers and services.
SASTStatic Application Security TestingExamines source code for vulnerabilities without executing it.
SBOMSoftware Bill of MaterialsA list of components in a software product to manage supply chain risks.
SCADASupervisory Control and Data AcquisitionSystems for controlling industrial processes, often targeted in cyberattacks.
SHASecure Hash AlgorithmFamily of cryptographic hash functions (SHA-256, SHA-3) used in digital signatures and data integrity checks.
SIEMSecurity Information and Event ManagementCollects and analyzes log data for real-time threat detection and compliance.
SOARSecurity Orchestration, Automation, and ResponseTools that help automate and coordinate incident response workflows.
SOCSecurity Operations CenterCentralized team and facility that monitors and responds to cybersecurity incidents.
SSL/TLSSecure Sockets Layer / Transport Layer SecurityProtocols for encrypting data transmitted over the internet.
SSOSingle Sign-OnAuthentication process allowing a user to access multiple systems with one login.
STIXStructured Threat Information eXpressionFormat for sharing cyber threat intelligence.
TLPTraffic Light ProtocolSystem for classifying and sharing sensitive cyber threat information.
TOTPTime-based One-Time PasswordOTP that changes every fixed interval (usually 30 s), generated from a shared secret and the current time.
TTPTactics, Techniques, and ProceduresPatterns of behavior used by threat actors.
UDTUser Datagram ProtocolA connectionless protocol vulnerable to spoofing and DoS attacks.
UEBAUser and Entity Behavior AnalyticsUses AI to detect anomalies in user or system behavior.
VLANVirtual Local Area NetworkNetwork segmentation tool used to isolate traffic and enhance security.
VPNVirtual Private NetworkCreates a secure, encrypted connection over a less secure network, such as the internet.
WAFWeb Application FirewallProtects web applications by filtering and monitoring HTTP traffic.
WPA3Wi-Fi Protected Access 3Latest Wi-Fi security standard, replacing WPA2, with stronger encryption and individualized data protection.
XDRExtended Detection and ResponseSecurity solution that integrates data across multiple security layers for better detection and response.
XSSCross-Site ScriptingInjection attack where malicious scripts run in a victim’s browser within a trusted site’s context.
YARAYet Another Recursive AcronymRule-based toolkit for identifying and classifying malware samples.
ZKPZero-Knowledge ProofCryptographic method that proves possession of secret information without revealing the secret itself.
ZTAZero Trust ArchitectureSecurity model that assumes no implicit trust—everything must be verified.

Leave a Reply

Your email address will not be published. Required fields are marked *