|
Acronym
|
Answer
|
|
AAA
|
Authentication, Authorization, and Accounting
|
|
ACL
|
Access Control List
|
|
AES
|
Advanced Encryption Standard
|
|
AH
|
Authentication Header
|
|
AI
|
Artificial Intelligence
|
|
AIS
|
Automated Indicator Sharing
|
|
ALE
|
Annualized Loss Expectancy
|
|
AP
|
Access Point
|
|
API
|
Application Programming Interface
|
|
APT
|
Advanced Persistent Threat
|
|
ARO
|
Annualized Rate of Occurrence
|
|
ARP
|
Address Resolution Protocol
|
|
ASLR
|
Address Space Layout Randomization
|
|
ATT&CK
|
Adversarial Tactics, Techniques, and Common Knowledge
|
|
AV
|
Antivirus
|
|
BASH
|
Bourne Again Shell
|
|
BCP
|
Business Continuity Planning
|
|
BGP
|
Border Gateway Protocol
|
|
BIA
|
Business Impact Analysis
|
|
BIOS
|
Basic Input/Output System
|
|
BPA
|
Business Partners Agreement
|
|
BPDU
|
Bridge Protocol Data Unit
|
|
BYOD
|
Bring Your Own Device
|
|
CA
|
Certificate Authority
|
|
CAPTCHA
|
Completely Automated Public Turing Test to Tell Computers and Humans Apart
|
|
CAR
|
Corrective Action Report
|
|
CASB
|
Cloud Access Security Broker
|
|
CBC
|
Cipher Block Chaining
|
|
CCMP
|
Counter Mode/CBC-MAC Protocol
|
|
CCTV
|
Closed-circuit Television
|
|
CERT
|
Computer Emergency Response Team
|
|
CFB
|
Cipher Feedback
|
|
CHAP
|
Challenge Handshake Authentication Protocol
|
|
CIA
|
Confidentiality, Integrity, Availability
|
|
CIO
|
Chief Information Officer
|
|
CIRT
|
Computer Incident Response Team
|
|
CMS
|
Content Management System
|
|
COOP
|
Continuity of Operation Planning
|
|
COPE
|
Corporate Owned, Personally Enabled
|
|
CP
|
Contingency Planning
|
|
CRC
|
Cyclical Redundancy Check
|
|
CRL
|
Certificate Revocation List
|
|
CSO
|
Chief Security Officer
|
|
CSP
|
Cloud Service Provider
|
|
CSR
|
Certificate Signing Request
|
|
CSRF
|
Cross-site Request Forgery
|
|
CSU
|
Channel Service Unit
|
|
CTM
|
Counter Mode
|
|
CTO
|
Chief Technology Officer
|
|
CVE
|
Common Vulnerability Enumeration
|
|
CVSS
|
Common Vulnerability Scoring System
|
|
CYOD
|
Choose Your Own Device
|
|
DAC
|
Discretionary Access Control
|
|
DBA
|
Database Administrator
|
|
DDoS
|
Distributed Denial of Service
|
|
DEP
|
Data Execution Prevention
|
|
DES
|
Digital Encryption Standard
|
|
DHCP
|
Dynamic Host Configuration Protocol
|
|
DHE
|
Diffie-Hellman Ephemeral
|
|
DKIM
|
DomainKeys Identified Mail
|
|
DLL
|
Dynamic Link Library
|
|
DLP
|
Data Loss Prevention
|
|
DMARC
|
Domain Message Authentication Reporting and Conformance
|
|
DNAT
|
Destination Network Address Translation
|
|
DNS
|
Domain Name System
|
|
DoS
|
Denial of Service
|
|
DPO
|
Data Privacy Officer
|
|
DRP
|
Disaster Recovery Plan
|
|
DSA
|
Digital Signature Algorithm
|
|
DSL
|
Digital Subscriber Line
|
|
EAP
|
Extensible Authentication Protocol
|
|
ECB
|
Electronic Code Book
|
|
ECC
|
Elliptic Curve Cryptography
|
|
ECDHE
|
Elliptic Curve Diffie-Hellman Ephemeral
|
|
ECDSA
|
Elliptic Curve Digital Signature Algorithm
|
|
EDR
|
Endpoint Detection and Response
|
|
EFS
|
Encrypted File System
|
|
ERP
|
Enterprise Resource Planning
|
|
ESN
|
Electronic Serial Number
|
|
ESP
|
Encapsulated Security Payload
|
|
FACL
|
File System Access Control List
|
|
FDE
|
Full Disk Encryption
|
|
FIM
|
File Integrity Management
|
|
FPGA
|
Field Programmable Gate Array
|
|
FRR
|
False Rejection Rate
|
|
FTP
|
File Transfer Protocol
|
|
FTPS
|
Secured File Transfer Protocol
|
|
GCM
|
Galois Counter Mode
|
|
GDPR
|
General Data Protection Regulation
|
|
GPG
|
Gnu Privacy Guard
|
|
GPO
|
Group Policy Object
|
|
GPS
|
Global Positioning System
|
|
GPU
|
Graphics Processing Unit
|
|
GRE
|
Generic Routing Encapsulation
|
|
HA
|
High Availability
|
|
HDD
|
Hard Disk Drive
|
|
HIDS
|
Host-based Intrusion Detection System
|
|
HIPS
|
Host-based Intrusion Prevention System
|
|
HMAC
|
Hash-based Message Authentication Code
|
|
HOTP
|
HMAC-based One-time Password
|
|
HSM
|
Hardware Security Module
|
|
HTML
|
Hypertext Markup Language
|
|
HTTP
|
Hypertext Transfer Protocol
|
|
HTTPS
|
Hypertext Transfer Protocol Secure
|
|
HVAC
|
Heating, ventilation, and air conditioning
|
|
IaaS
|
Infrastructure as a Service
|
|
IaC
|
Infrastructure as Code
|
|
IAM
|
Identity and Access Management
|
|
ICMP
|
Internet Control Message Protocol
|
|
ICS
|
Industrial Control Systems
|
|
IDEA
|
International Data Encryption Algorithm
|
|
IDF
|
Intermediate Distribution Frame
|
|
IdP
|
Identity Provider
|
|
IDS
|
Intrusion Detection System
|
|
IEEE
|
Institute of Electrical and Electronics Engineers
|
|
IKE
|
Internet Key Exchange
|
|
IM
|
Instant Messaging
|
|
IMAP
|
Internet Message Access Protocol
|
|
IoC
|
Indicators of Compromise
|
|
IoT
|
Internet of Things
|
|
IP
|
Internet Protocol
|
|
IPS
|
Intrusion Prevention System
|
|
IPSec
|
Internet Protocol Security
|
|
IR
|
Incident Response
|
|
IRC
|
Internet Relay Chat
|
|
IRP
|
Incident Response Plan
|
|
ISO
|
International Standards Organization
|
|
ISP
|
Internet Service Provider
|
|
ISSO
|
Information Systems Security Officer
|
|
IV
|
Initialization Vector
|
|
KDC
|
Key Distribution Center
|
|
KEK
|
Key Encryption Key
|
|
L2TP
|
Layer 2 Tunneling Protocol
|
|
LAN
|
Local Area Network
|
|
LDAP
|
Lightweight Directory Access Protocol
|
|
LEAP
|
Lightweight Extensible Authentication Protocol
|
|
MaaS
|
Monitoring as a Service
|
|
MAC
|
Mandatory Access Control
|
|
MAC
|
Media Access Control
|
|
MAC
|
Message Authentication Code
|
|
MAN
|
Metropolitan Area Network
|
|
MBR
|
Master Boot Record
|
|
MD5
|
Message Digest 5
|
|
MDF
|
Main Distribution Frame
|
|
MDM
|
Mobile Device Management
|
|
MFA
|
Multifactor Authentication
|
|
MFD
|
Multifunction Device
|
|
MFP
|
Multifunction Printer
|
|
ML
|
Machine Learning
|
|
MMS
|
Multimedia Message Service
|
|
MOA
|
Memorandum of Agreement
|
|
MOU
|
Memorandum of Understanding
|
|
MPLS
|
Multi-protocol Label Switching
|
|
MSA
|
Master Service Agreement
|
|
MSCHAP
|
Microsoft Challenge Handshake Authentication Protocol
|
|
MSP
|
Managed Service Provider
|
|
MSSP
|
Managed Security Service Provider
|
|
MTBF
|
Mean Time Between Failures
|
|
MTTF
|
Mean Time to Failure
|
|
MTTR
|
Mean Time to Recover
|
|
MTU
|
Maximum Transmission Unit
|
|
NAC
|
Network Access Control
|
|
NAT
|
Network Address Translation
|