In this page you will find a list of abbreviations that are used throughout Information Technology and Cyber Security. This is very much a work in progress, and will be updated regularly.

It should be notes that there is often re-use of abbreviations and it will in some cases depend on the context in which the abbreviation is used.

You can also look in our Glossary of Cyber Security Terms for an expanded definition.


A

  • ACL – Access Control List
  • AES – Advanced Encryption System
  • API – Application Programming Interface
  • APT – Advanced Persistent Threat
  • ATO – Account Take Over
  • ATP – Advanced Threat Protection
  • AV – Anti Virus

B

  • B2B – Business to Business
  • BEC – Business Email Compromise
  • BIOS – Basic Input Output System (often used in describing PC firmware)
  • BMC – Baseboard Management Controller
  • BPM – Business Process Management
  • BT – Bit Torrent
  • BT – Bluetooth (radio)
  • BYOD – Bring Your Own Device

C

  • CA – Certificate Authority, often stated as Digital Certificate Authority
  • CBSP – Cloud-Based Security Providers
  • CDN – Content Delivery Network
  • CMS – Content Management Service (e.g. like WordPress)
  • CORS – Cross-Origin Resource Sharing
  • CSP – Content Security Policy
  • CPU – Central Processing Unit
  • CSRF – Cross-Site Request Forgery
  • CSS – Cascading Style Sheets
  • CVSS – Common Vulnerability Scoring System
  • CWE – Common Weakness Enumeration

D

  • DAST – Dynamic Application Security Testing
  • DES – Data Encryption Standard
  • DLL – Dynamic Link Library
  • DSA – Digital Signature Algorithm
  • DT – Directory Traversal
  • DoH – DNS over HTTPS
  • DoT – DNS over TLS
  • DOS – Disk Operating System
  • DOS – Denial of Services
  • DDoS – Distributed Denial Of Services
  • DNS – Domain Name Service
  • DNSSEC – Domain Name System Security Extensions
  • DKIM – Domain Keys Identified Mail
  • DMARC – Domain-based Message Authentication Reporting and Conformance
  • DSS – Data Security Standard

E

  • EFF – Electronic Frontier Foundation
  • EFS – Encrypting File System
  • EPP – End Point Protection

F

  • FAT – File Allocation Table
  • FAQ – Frequently Asked Questions
  • FOSS – Free and Open Source Software
  • FS – File System
  • FTP – File Transfer Protocol
  • FUD – Fully Undetectable
  • FUD – Fear, Uncertainty, Doubt

G

  • Gb – Giga Bit (1 million binary digits)
  • GB – Giga Byte (1 million binary bytes – typically 8 binary bits to the byte)

H

  • HTML – Hypertext Mark-up Language
  • HTTP – Hypertext Transfer Protocol
  • HTTPS – Secure HTTP

I

  • IAM – Identity & Access Management
  • IETF – Internet Engineering Task Force
  • IoT – Internet of Things
  • IP – Internet protocol (wrt communications protocol)
  • IP – Intellectual Property (wrt copyright)
  • IPMI – Intelligent Platform Management Interface
  • IPSec – Internet Protocol Security
  • IT – Information Technology

J

  • JIT – Just In Time
  • JITC – Just In Time Compiler
  • JS – JavaScript
  • JSON – JavaScript Object Notation
  • JVM – Java Virtual Machine

K

  • Kb – Kilobit
  • KB – Kilobyte (in reference to electronic storage)
  • KiB – Kilobyte
  • KB – Knowledge Base
  • KHz – Kilohertz (in reference to radio frequencies)

L

  • LKM – Loadable Kernel Modules
  • LOLBins – Live of the Land Binaries (typically file-less malware)
  • LSB – Least Significant Bit
  • LAN – Local Area Network
  • LFI – Local File Inclusion

M

  • MAC – Media Access Control (often used as MAC Address)
  • MaaS – Malware as a Service
  • Mb – Mega Bit
  • MB – Mega Byte
  • MFA – Multi-Factor Authentication
  • MITM – Man in the Middle Attack
  • MSB – Most Significant Bit

N

  • NFC – Near Field Communication
  • NT – New Technology
  • NTFS – NT Filesystem (often used with Windows OS)

O

  • OSCI – OS Command Injection
  • OWASP – Open Web Application Security Project

P

  • PLC – Programmable Logic Controller
  • PT – Path Traversal
  • PCI – Payment Card Industry
  • IPSec – Internet Protocol Security
  • PSK – Pre-Shared Key (see also WPS)

Q

  • QoS – Quality of Service

R

  • RAT – Remote Administration Tool
  • RAT – Remote Access Trojan
  • RCE – Remote Code Execution
  • RDP – Remote Desktop Protocol
  • RFI – Remote File Inclusion

S

  • SaaS – Software as a Service
  • SAST – Static Application Security Testing
  • SCD – Source Code Disclosure
  • SDP – Software Defined Perimeter
  • SE – Social Engineering
  • SKid – Script Kiddie
  • SPF – Sender Policy Framework
  • SQLi – SQL Injection
  • SSE – Server Side Encryption
  • SSL – Secure Socket Layer
  • SAML – Security Assertion Markup Language
  • STS – Security Token Service

T

  • Tb – Terra Bit
  • TB – Terra Byte
  • TCP – Transport Control Protocol (see also IP as this is often used together as TCP/IP)
  • TLS – Transport Layer Security

U

  • UDP – User Datagram Protocol (sometimes referred to as UDP/IP)
  • UEFI – Unified Extensible Firmware Interface (replacement for BIOS)
  • UI – User Interface
  • UPnP – Universal Plug and Play
  • URL – Uniform Resource Locator
  • USB – Universal Serial Bus
  • UTM – Unified Threat Management

V

  • VM – Virtual Machine

W

  • WAF – Web Application Firewall
  • WAN – Wide Area Network
  • WAP – Web Application Protection
  • WAP – Wireless Access Point (WiFi)
  • WAF – Web Application Firewall
  • WPS – WiFi Protected Setup

X

  • XHTML
  • XML – eXtensible Mark-up Language
  • XMPP – eXtensible Messaging and Presence Protocol
  • XP – Cross Platform
  • XSD – XML Schema Definition
  • XSS – Cross-site Scripting

Y

  • Y2K – Year 2000 Bug or the millennium bug
  • YaST – Yet another Setup Tool
  • YB – Yottabyte

Z

  • ZIP – ZIP (compressed) archive file
  • ZMA – Zone Multicast Address

Headline image provided by Edho Pratama on UnSplash