When you take certification exams like CompTIA Security+, CISSP, CEH, or CISM, you’re bound to encounter countless acronyms. If you don’t know what an acronym stands for, you might fail to understand a problem or pick the right answer. On this post, you’ll find more than a hundred acronyms, what each acronym stands for, and their corresponding definitions.
Acronym | Stands For | Description |
---|---|---|
ACL | Access Control List | Specifies which users or systems can access specific resources and what actions they can perform. |
AD | Active Directory | Microsoft directory service for managing users, computers, and resources. |
AES | Advanced Encryption Standard | A symmetric encryption algorithm widely used for securing data. |
ALE | Annualized Loss Expectancy | Estimated financial loss from a risk over a one-year period. |
APT | Advanced Persistent Threat | A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected. |
AV | Antivirus | Software designed to detect, prevent, and remove malware. |
BEC | Business Email Compromise | Social-engineering scam that tricks staff into sending money or data to attackers via spoofed email threads. |
BGP | Border Gateway Protocol | Protocol used to exchange routing information across the internet; can be exploited. |
BIA | Business Impact Analysis | Identifies critical operations and the impact of disruptions to them. |
C2 | Command and Control | Communication channel an attacker uses to issue commands to, and receive data from, compromised systems. |
CA | Certificate Authority | Entity that issues digital certificates used to verify identities online. |
CAB | Change Advisory Board | A group that evaluates and approves IT change requests. |
CBC | Cipher Block Chaining | A mode of operation for block ciphers to enhance encryption strength. |
CERT | Computer Emergency Response Team | A group that handles cybersecurity incidents and responses. |
CI/CD | Continuous Integration / Continuous Deployment | Automated software development practice that can introduce security risks if not managed properly. |
CIO | Chief Information Officer | Senior executive responsible for managing and implementing IT strategy. |
CISA | Cybersecurity and Infrastructure Security Agency | U.S. government agency responsible for protecting critical infrastructure. |
CISO | Chief Information Security Officer | Executive responsible for an organization’s information and data security. |
CSP | Content Security Policy | A security standard that helps prevent cross-site scripting and other attacks. |
CSPM | Cloud Security Posture Management | Tools that help manage cloud security misconfigurations and risks. |
CSRF | Cross-Site Request Forgery | A web exploit where a user is tricked into performing actions without consent. |
CTR | Click-Through Rate | Used in phishing analysis to evaluate the effectiveness of email lures. |
CVE | Common Vulnerabilities and Exposures | Public catalog that assigns IDs to disclosed security flaws so they can be tracked consistently. |
CVSS | Common Vulnerability Scoring System | Standardized formula (0–10) for gauging the severity of a CVE. |
CWE | Common Weakness Enumeration | Community-curated list of software and hardware weakness types (e.g., buffer overflow, XSS). |
DAC | Discretionary Access Control | Access control method where owners decide permissions for resources. |
DDoS | Distributed Denial of Service | A type of cyberattack where multiple systems overwhelm a target, disrupting service. |
DLP | Data Loss Prevention | Tools and strategies to prevent sensitive data from leaving the organization. |
DMZ | Demilitarized Zone | A physical or logical subnetwork that separates an internal network from untrusted external networks. |
DNS | Domain Name System | Translates domain names into IP addresses. DNS can be exploited for attacks like DNS spoofing. |
DSA | Digital Signature Algorithm | NIST-approved algorithm for generating/verifying digital signatures. |
EASM | External Attack Surface Management | Identifies and manages assets exposed to the internet. |
ECC | Elliptic Curve Cryptography | Public-key crypto that offers strong security with smaller key sizes than RSA. |
EDR | Endpoint Detection and Response | Security technology that monitors endpoint devices to detect and respond to cyber threats. |
EPP | Endpoint Protection Platform | Security solution to protect endpoints such as PCs and servers. |
FIDO | Fast Identity Online | Open standard for secure, passwordless authentication. |
FIM | File Integrity Monitoring | Detects changes to files that could indicate a breach or unauthorized activity. |
FIPS | Federal Information Processing Standards | U.S. government security standards (e.g., FIPS 140-3 for crypto modules). |
FISMA | Federal Information Security Management Act | U.S. law to protect government information systems. |
FQDN | Fully Qualified Domain Name | Complete domain name that specifies exact location within DNS hierarchy. |
GA | General Availability | Phase when software becomes publicly available—relevant for tracking patch cycles. |
GDPR | General Data Protection Regulation | EU law that governs personal-data privacy, breach notification, and fines. |
GRC | Governance, Risk, and Compliance | Framework for managing IT and cybersecurity risks and meeting compliance. |
HIDS | Host-based Intrusion Detection System | Monitors a specific host or device for suspicious activity. |
HMAC | Hash-based Message Authentication Code | Combines a cryptographic hash with a secret key to verify data integrity and authenticity. |
HSM | Hardware Security Module | Physical device that safeguards and manages digital keys. |
HSTS | HTTP Strict Transport Security | Response header that forces browsers to use HTTPS for a site, mitigating downgrade attacks. |
IAM | Identity and Access Management | Framework of policies and technologies to ensure proper access to systems. |
IDS | Intrusion Detection System | Monitors network traffic for suspicious activity and alerts administrators. |
IoC | Indicator of Compromise | Evidence on a network or system that indicates a security breach. |
IoT | Internet of Things | Network of connected devices that can be vulnerable to cyberattacks. |
IPS | Intrusion Prevention System | Like IDS, but also takes action to block detected threats in real time. |
JWT | JSON Web Token | Compact, signed JSON object used to convey identity or claims between parties (common in APIs). |
KBA | Knowledge-Based Authentication | Authentication based on the user’s knowledge of personal information. |
KMS | Key Management Service | Centralized system for creating, rotating, and destroying cryptographic keys (cloud or on-prem). |
LAPS | Local Administrator Password Solution | Microsoft tool for managing local admin passwords securely. |
MAC | Mandatory Access Control | Access control where policies are centrally enforced, not at the discretion of users. |
MDR | Managed Detection and Response | Outsourced service providing threat hunting, monitoring, and response. |
MFA | Multi-Factor Authentication | A security system that requires more than one method of authentication from independent categories. |
MITM | Man-In-The-Middle | An attack where the attacker secretly intercepts communication between two parties. |
MTTD | Mean Time to Detect | Average time it takes to identify a threat or incident. |
MTTR | Mean Time to Respond / Recover | Average time to contain and remediate a threat. |
NAC | Network Access Control | Restricts unauthorized devices from accessing the network. |
NIDS | Network Intrusion Detection System | Monitors network traffic for malicious patterns and raises alerts. |
NIST | National Institute of Standards and Technology | U.S. agency that provides cybersecurity frameworks and best practices. |
OAUTH | Open Authorization | A protocol for secure delegated access (e.g., logging in via Google). |
OCSP | Online Certificate Status Protocol | Real-time method for checking whether an X.509 certificate has been revoked. |
OSINT | Open Source Intelligence | Information collected from publicly available sources for threat analysis. |
OTP | One-Time Password | Password valid for a single login or transaction (often delivered via SMS or app). |
PAM | Privileged Access Management | Controls and monitors access of privileged users to critical systems. |
PFS | Perfect Forward Secrecy | Ensures session keys are not compromised even if private key is. |
PII | Personally Identifiable Information | Data that can uniquely identify an individual (name, SSN, biometric data, etc.). |
PKI | Public Key Infrastructure | System for managing encryption keys and digital certificates. |
RAT | Remote Access Trojan | Malware that allows an attacker to control a system remotely. |
RBAC | Role-Based Access Control | Grants permissions based on users’ job roles to enforce least privilege. |
RPO | Recovery Point Objective | Maximum acceptable amount of data loss in a disaster scenario. |
RTO | Recovery Time Objective | Maximum acceptable time to restore operations after an incident. |
SAML | Security Assertion Markup Language | XML-based standard that transmits authentication and authorization data between identity providers and services. |
SAST | Static Application Security Testing | Examines source code for vulnerabilities without executing it. |
SBOM | Software Bill of Materials | A list of components in a software product to manage supply chain risks. |
SCADA | Supervisory Control and Data Acquisition | Systems for controlling industrial processes, often targeted in cyberattacks. |
SHA | Secure Hash Algorithm | Family of cryptographic hash functions (SHA-256, SHA-3) used in digital signatures and data integrity checks. |
SIEM | Security Information and Event Management | Collects and analyzes log data for real-time threat detection and compliance. |
SOAR | Security Orchestration, Automation, and Response | Tools that help automate and coordinate incident response workflows. |
SOC | Security Operations Center | Centralized team and facility that monitors and responds to cybersecurity incidents. |
SSL/TLS | Secure Sockets Layer / Transport Layer Security | Protocols for encrypting data transmitted over the internet. |
SSO | Single Sign-On | Authentication process allowing a user to access multiple systems with one login. |
STIX | Structured Threat Information eXpression | Format for sharing cyber threat intelligence. |
TLP | Traffic Light Protocol | System for classifying and sharing sensitive cyber threat information. |
TOTP | Time-based One-Time Password | OTP that changes every fixed interval (usually 30 s), generated from a shared secret and the current time. |
TTP | Tactics, Techniques, and Procedures | Patterns of behavior used by threat actors. |
UDT | User Datagram Protocol | A connectionless protocol vulnerable to spoofing and DoS attacks. |
UEBA | User and Entity Behavior Analytics | Uses AI to detect anomalies in user or system behavior. |
VLAN | Virtual Local Area Network | Network segmentation tool used to isolate traffic and enhance security. |
VPN | Virtual Private Network | Creates a secure, encrypted connection over a less secure network, such as the internet. |
WAF | Web Application Firewall | Protects web applications by filtering and monitoring HTTP traffic. |
WPA3 | Wi-Fi Protected Access 3 | Latest Wi-Fi security standard, replacing WPA2, with stronger encryption and individualized data protection. |
XDR | Extended Detection and Response | Security solution that integrates data across multiple security layers for better detection and response. |
XSS | Cross-Site Scripting | Injection attack where malicious scripts run in a victim’s browser within a trusted site’s context. |
YARA | Yet Another Recursive Acronym | Rule-based toolkit for identifying and classifying malware samples. |
ZKP | Zero-Knowledge Proof | Cryptographic method that proves possession of secret information without revealing the secret itself. |
ZTA | Zero Trust Architecture | Security model that assumes no implicit trust—everything must be verified. |