Glossary of Abbreviations

In this page you will find a list of abbreviations that are used throughout Information Technology and Cyber Security. There is often re-use of abbreviations and it will in some cases depend on the context in which the abbreviation is used.

You can also look in our Glossary of Terms for an expanded definition.


A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


A

  • ACL – Access Control List
  • AES – Advanced Encryption System
  • API – Application Programming Interface
  • APT – Advanced Persistent Threat
  • ASCII – American Standard Code for Information Interchange
  • ATO – Account Take Over
  • ATM – Automated Teller Machine (Cash Cachine)
  • ATP – Advanced Threat Protection
  • AV – Anti Virus

B

  • B2B – Business to Business
  • BEC – Business Email Compromise
  • BGP – Border Gateway Protocol
  • BIOS – Basic Input Output System (often used in describing PC firmware)
  • BMC – Baseboard Management Controller
  • BMC – Business Management Controller
  • BPM – Business Process Management
  • BT – Bit Torrent
  • BT – Bluetooth (radio)
  • BYOD – Bring Your Own Device

C

  • CA – Certificate Authority, often stated as Digital Certificate Authority
  • CBSP – Cloud-Based Security Providers
  • CDN – Content Delivery Network
  • CMS – Content Management Service (e.g. like WordPress)
  • CORS – Cross-Origin Resource Sharing
  • CSP – Content Security Policy
  • CPU – Central Processing Unit
  • CSIRT – Cyber Security Incident Response Team
  • CSRF – Cross-Site Request Forgery
  • CSS – Cascading Style Sheets
  • CVSS – Common Vulnerability Scoring System
  • CWE – Common Weakness Enumeration

D

  • DAST – Dynamic Application Security Testing
  • DES – Data Encryption Standard
  • DLL – Dynamic Link Library
  • DSA – Digital Signature Algorithm
  • DT – Directory Traversal
  • DoH – DNS over HTTPS
  • DoT – DNS over TLS
  • DOS – Disk Operating System
  • DOS – Denial of Services
  • DDoS – Distributed Denial Of Services
  • DNS – Domain Name Service
  • DNSSEC – Domain Name System Security Extensions
  • DKIM – Domain Keys Identified Mail
  • DMARC – Domain-based Message Authentication Reporting and Conformance
  • DSS – Data Security Standard

E

  • EAC – Email Account Compromise
  • EFF – Electronic Frontier Foundation
  • EFS – Encrypting File System
  • EPP – End Point Protection

F

  • FAT – File Allocation Table
  • FAQ – Frequently Asked Questions
  • FinCEN – U.S. Financial Crimes Enforcement Network
  • FOSS – Free and Open Source Software
  • FS – File System
  • FTP – File Transfer Protocol
  • FUD – Fully Undetectable
  • FUD – Fear, Uncertainty, Doubt

G

  • Gb – Giga Bit (1 million binary digits)
  • GB – Giga Byte (1 million binary bytes – typically 8 binary bits to the byte)
  • GCHQ – Government Communications Headquarters (UK)

H

  • HTML – Hypertext Mark-up Language
  • HTTP – Hypertext Transfer Protocol
  • HTTPS – Secure HTTP

I

  • IAM – Identity & Access Management
  • IBAN – International Bank Account Number (specifically used in the EU)
  • ICMP – Internet Control Message Protocol
  • ICS – Industrial Control System
  • ICT – Information and Communication Technologies
  • IETF – Internet Engineering Task Force
  • IGP – Interior Gateway Protocol
  • IoT – Internet of Things
  • IIoT – Industrial Internet of Things
  • IMAP – Internet Message Access Protocol
  • IMAPS – IMAP over SSL
  • IP – Internet Protocol (wrt communications protocol)
  • IP – Intellectual Property (wrt copyright)
  • IPMI – Intelligent Platform Management Interface
  • IPSec – Internet Protocol Security
  • ISO – International Organization for Standardization
  • ISP – Internet Service Provider
  • IT – Information Technology
  • ITU – International Telecommunication Union
  • ITU-D – ITU Development Sector
  • ITU-R – ITU Radio Communication Sector
  • ITU-T – ITU Telecommunication Standardization Sector

J

  • JIT – Just In Time
  • JITC – Just In Time Compiler
  • JS – JavaScript
  • JSON – JavaScript Object Notation
  • JVM – Java Virtual Machine

K

  • Kb – Kilobit
  • KB – Kilobyte (in reference to electronic storage)
  • KiB – Kilobyte
  • KB – Knowledge Base
  • KHz – Kilohertz (in reference to radio frequencies)

L

  • L2F – Layer 2 Forwarding Protocol
  • L2TP – Layer 2 Tunnelling Protocol
  • LAN – Local Area Network
  • LFI – Local File Inclusion
  • LKM – Loadable Kernel Modules
  • LOLBin – Live of the Land Binary
  • LSB – Least Significant Bit
  • LSASS – Local Security Authority Subsystem Service

M

  • MAC – Media Access Control (often used as MAC Address)
  • MAC – Message Authentication Code (in cryptography)
  • MAC – Mandatory Access Control (in security)
  • MaaS – Malware as a Service
  • Mb – Mega Bit
  • MB – Mega Byte
  • MD5 – message-digest algorithm, a hashing algorithm that will return a unique 32 character hash
  • MFA – Multi-Factor Authentication
  • MIME – Multipurpose Internet Mail Extensions – see also S/MIME
  • MITM – Man in the Middle Attack
  • MOE – Measures of Effectiveness
  • MSB – Most Significant Bit
  • mTAN – Mobile Transaction Authentication Number
  • MUA – Mail User Agent

N

  • NAT – Network Address Translation
  • NCSC – National Cyber Security Centre (UK) – part of GCHQ
  • NFC – Near Field Communication
  • NIST – National Institute of Standards and Technology (USA)
  • NT – New Technology
  • NTFS – NT Filesystem (often used with Windows OS)

O

  • OSI – Open Standards Interconnection
  • OSPF – Open Shortest Path First
  • OSCI – OS Command Injection
  • OWASP – Open Web Application Security Project

P

  • PLC – Programmable Logic Controller
  • PT – Path Traversal
  • PCI – Payment Card Industry
  • IPSec – Internet Protocol Security
  • PSK – Pre-Shared Key (see also WPS)
  • PPP – Point to Point Protocol

Q

  • QoS – Quality of Service

R

  • RAM – Random Access Memory
  • RAT – Remote Administration Tool
  • RAT – Remote Access Trojan
  • RCE – Remote Code Execution
  • RDP – Remote Desktop Protocol
  • RFC – Request for Comment
  • RFI – Remote File Inclusion
  • RMON – Remote Network Monitoring
  • ROI – Return on Investment, in the context of Cyber Security expense
  • ROM – Read Only Memory

S

  • SaaS – Software as a Service
  • SAST – Static Application Security Testing
  • SAML – Security Assertion Markup Language
  • SCD – Source Code Disclosure
  • SDP – Software Defined Perimeter
  • SDK – Software Development Kit
  • SE – Social Engineering
  • SHA1 – Secure Hash Algorithm 1, it will return a unique 40 character hash
  • SHA256/SHA2 – Secure Hash Algorithm 2, it will return a unique 64 character hash
  • SIGINT – Signals Intelligence
  • SIM – Subscriber Identity Module (in the context of mobile SIM Cards)
  • SKid – Script Kiddie
  • S/MIME – Secure/Multipurpose Internet Mail Extensions (see also MIME)
  • SMS – Short Message (or Messaging) Service
  • SPF – Sender Policy Framework
  • SQL – Structured Query Language (in relation to relational databases)
  • SQLi – SQL Injection
  • SSE – Server Side Encryption
  • SSL – Secure Socket Layer
  • SSRF – Server Side Request Forgery
  • STS – Security Token Service

T

  • Tb – Terra Bit
  • TB – Terra Byte
  • TCP – Transport Control Protocol (see also IP as this is often used together as TCP/IP)
  • TLS – Transport Layer Security
  • TOR – The Onion Router

U

  • UCaaS – Unified Communications as a Service
  • UDP – User Datagram Protocol (sometimes referred to as UDP/IP)
  • UEFI – Unified Extensible Firmware Interface (replacement for BIOS)
  • UI – User Interface
  • UPnP – Universal Plug and Play
  • URL – Uniform Resource Locator
  • USB – Universal Serial Bus
  • UTM – Unified Threat Management

V

  • VM – Virtual Machine
  • VOIP – Voice Over IP (digital telephony)
  • VPN – Virtual Private Network

W

  • WAF – Web Application Firewall
  • WAN – Wide Area Network
  • WAP – Web Application Protection
  • WAP – Wireless Access Point (WiFi)
  • WAF – Web Application Firewall
  • WPS – WiFi Protected Setup

X

  • XHTML
  • XML – eXtensible Mark-up Language
  • XMPP – eXtensible Messaging and Presence Protocol
  • XP – Cross Platform
  • XSD – XML Schema Definition
  • XSS – Cross-site Scripting (attack)

Y

  • Y2K – Year 2000 Bug or the millennium bug
  • YaST – Yet another Setup Tool
  • YB – Yottabyte

Z

  • ZIP – ZIP (compressed) archive file
  • ZMA – Zone Multicast Address

Headline image provided by Edho Pratama on UnSplash

Create a website or blog at WordPress.com

Up ↑