Acronyms in Cybersecurity

Below you’ll see a (long) list of acronyms that I’ve encountered during my last couple of years breaking into the Cybersecurity realm. A lot of them are mainly for reference, and many relate to each other, but some require some extra elaboration in order to understand how they fit into Cybersecurity, so I do my best to provide information in how they’re related to the overarching themes in Cybersecurity.

If there’s any you think I’m missing, please let me know in the comments and I will add it ASAP! Thanks for reading and Godspeed on your journey!

AAA – Authentication, Authorization, and Accounting is a security framework that controls access to computer resources, enforces policies, and audits usage

ACL – Access Control Lists

AH – Authentication Header – IPsec protocol that offers authentication and integrity
(Related: ESP – Encapsulating Security Payload)

AITM – Adversary in the Middle

ANSSI – Agence nationale de la sécurité des systèmes d’information
(France’s National Cybersecurity Agency)

APP – Authorized Push Payments

APT – Advanced Persistent Threat

ASR – Application Security Rationale (related: PASR)

ASPI – Australian Strategic Policy Institute

ASRM – Attack Surface Risk Management

ATT&CK – Adversarial Tactics, Techniques, and Common Knowledge

AWS – Amazon Web Services

BAS – Breach and Attack Simulation

BEC – Business Email Compromise
(related: EAC – Email Account Compromise)

BYOD – Bring Your Own Device

BYOVD – Bring Your Own Vulnerable Driver

BMC – baseboard management controller

CA – Certificate Authorities

CALEA – Communications Assistance for Law Enforcement Act

C&C traffic – Command and Control traffic
(example: techradar)

CI/CD – continuous integration, continuous deployment

CIDR – Classless Inter-Domain Routing

CDN – Content Delivery Network

CHAOSS – Community Health Analytics in Open Source Software

CIRCIA – Cyber Incident Reporting for Critical Infrastructure Act

CIS – Center for Internet Security

CISA – US Cybersecurity and Infrastructure Security Agency

CMA – Computer Misuse Act

CMMC – Cybersecurity Maturity Model Certification

CNAs – CVE Numbering Authorities

CNI – Critical National Infrastructure

CSA – Cyber Security Advisory

CSIRT – Computer Security Incident Response Team

CSRB – Cyber Safety Review Board

CRA – (EU) Cyber Resilience Act

CRI – Cyber Risk Index

CRQC – Cryptanalytically Relevant Quantum Computer

CUI – Controlled Unclassified Information

CVE – Common Vulnerabilities & Exposures

DCMA – Digital Millennium Copyright Act

DEI – Diversity, Equity, Inclusion

DFARS – Defense Federal Acquisition Regulation Supplement

DHS – Department of Homeland Security

DICT – Department of Information and Communications Technology

DoD – Department of Defense

DTCC – Depository Trust and Clearing Corporation

EAC – Email Account Compromise

EC3 – Europol’s European Cybercrime Centre

ECPA – Electronic Communications Privacy Act

EDR – Endpoint Detection and Response
(related: NDR – Network Detection and Response)

EDTR – Endpoint Detection and Threat Response

EHR – Electronic Health Record

EI-SIG – Elections Industry Special Interest Group

ESP – Encapsulating Security Payload
(Related: Authentication Header)
IPsec protocol that offers authentication, integrity, and encryption

ETSI – European Telecommunications Standards Institute // http://www.etsi.org

FCEB – Federal Civilian Executive Branch

FCRA – Federal Credit Reporting Act

FCI – Federal Contract Information

FedRAMP – Federal Risk and Authorization Management Program

Global CAPE – Global Cooperation Arrangement for Privacy Enforcement

GEPF – Africa’s Government Employees Pension Fund

GPAA – South African Government Pensions Administration Agency

GSP – Google Search Partners

HASC – (London) House of Commons Home Affairs Select Committee
Related link, The Record

HC3 – Health Sector Cybersecurity Coordinator Center

HHS – (US Dept of) Health and Human Services

HSCC – Health Sector Coordinating Council

HMI – Human Management Interfaces

IAB – Initial Access Brokers

IAM – Identity and Access Management

IANA – Internet Assigned Numbers Authority

ICBC – Industrial & Commercial Bank of China

ICC – International Criminal Court

ICMP – Internet Control Message Protocol

ICO – Information Commissioners Office

ICS – industrial control systems

IFEO – Image File Execution Options

IKE – Internet Key Exchange

IICSWG – Interagency International Cybersecurity Standardization Working Group

IT-ISAC – Information Technology Information Sharing Analysis Center

IOC – Indicators of Compromise

IPMI – Intelligent Platform Management Interface LP

ISP – Internet Service Provider

JRC – Joint Research Centre

KISA – Korea Internet & Security Agency

KDC – Key Distribution Center

MFA – Multi-factor authentication

MFT – Manage File Transfer

MLAT – Mutual Legal Assistance Treaty

MoD – Ministry of Defence (UK)

MUA – Mail User Agent

MSP – Managed Service Provider

MS-ISAC – Multi state, Information Sharing and Analysis Center

NAT – Network Address Translation

NAS – Network Attached Storage

NCA – UK National Crime Agency

NCSC – National Cyber Security Center

NDAA – National Defense Authorization Act

NDR – Network Detection and Response
(related: EDR)

NTP – Network Time Protocol

NSA – National Security Agency

NSCC – National Securities Clearing Corporation

OCG – Organized Cyber Gang

ODNI – Office of the Director of National Intelligence

OFSI – UK Office of Financial Sanctions Implementation

ONCD – Office of the National Cyber Director

OSINT – Open Source Intelligence

OSS – Open Source Software

OT – Operational Technology

ONCD – Office of the National Cyber Director

PASR – Prediction Application Security Rationale

PERF – Police Executive Research Forum

PGP – Pretty Good Privacy

PIN – Private Industry Notification

PKI – Public Key Infrastructure

PLC – Programmable Logic Controllers

POP – Property Oriented Programming

PPA – Privacy Protection Act

PQC – Post Quantum Cryptography

PSR – Payment Systems Regulator

RASP – Runtime Application Self-Protection

RAT – Remote Access Tool
(example: Abaddon RAT-techradar)

RCE – Remote Code Execution

RFI – Request for Information

RUSI – Royal United Services Institute

SAML – Security Assertion Markup Language

SBAT – Secure Boot Advanced Targeting

SBOM – Software Bill of Materials

SCRM – Supply Chain Risk Management

SEC – Securities and Exchange Commission

SEO – Search Engine Optimization (poisoning?)

SIRT – Security Intelligence Response Team

SIEM – Security Information and Event Management

SLTT – State Local Tribal Territorial

SMB – Small/Midsize Business

SMB – Server Message Block

SMTP – Simple Mail Transport Protocol

SNAP – Social Network Analysis and Propensities

SOP – Standard Operating Procedures

SPN – Service Principal Names

SRMA – Sector Risk Management Agency

SSDP – Simple Service Discovery Protocol

STP – Straight Through Processing

TAC – Technical Assistance Center

TAG – (usually Google’s) Threat Analysis Group

TETRA – Terrestrial Trunked Radio Protocol

TDS – Traffic Distribution System

TLD – Top Level Domains

TLS/SSL – Transport Layer Security, Secure Sockets Layer
Review of Famous TLS/SSL attacks

TPRM – Third-Party Risk Management

TTP – Tactics, Techniques, and Procedures

UEFI – Unified Extensible Firmware Interface

UTC – Coordinates Universal Time

VPS – Virtual Private Servers

WAF – Web Application Firewalls

WWS – Water and Wastewater Systems

Design a site like this with WordPress.com
Get started