1
2
3
4
5
6
7
8
9
10
11
12
100

3DES

Triple Digital Encryption Standard. Triple Digital Encryption Standard. A symmetric algorithm used to encrypt data and provide confidentiality. It is a block cipher that encrypts data in 64-bit blocks. It was originally designed as a replacement for DES, and is still used in some applications, such as when hardware doesn't support AES. 

100

APT

Advanced Persistent Threat. Advanced persistent threat. A group that has both the capability and intent to launch sophisticated and targeted attacks. 

100

BIA

Business Impact Analysis. Business impact analysis. The BIA identifies systems and components that are essential to the organization's success. It identifies various scenarios that can impact these systems and components, maximum downtime limits, and potential losses from an incident. The BIA helps identify RTOs and RPOs. 

100

CBC

Cipher Block Chaining. Cipher Block Chaining (CBC) is a mode of operation for symmetric block ciphers in cybersecurity that enhances security by linking each plaintext block to the previous ciphertext block before encryption. 

100

CMS

Content Management System. a Content Management System (CMS) is a software platform that needs security measures to protect against threats like data breaches and unauthorized access. 

100

CSRF

Cross-site Request Forgery. CSRF, or Cross-Site Request Forgery, is a cyberattack where a malicious website, email, or link causes a user's web browser to perform an unwanted action on a trusted site where they are currently authenticated. 

100

DER

Distinguished Encoding Rules. Distinguished Encoding Rules (DER) are a standardized method for encoding data structures, used in cybersecurity to ensure a unique and consistent binary representation of data, most notably for X.509 digital certificates. 

100

DNS

Domain Name Service (Server). Domain Name System. Used to resolve host names to IP addresses. DNS zones include records such as A records for IPv4 addresses and AAAA records for IPv6 addresses. DNS uses UDP port 53 for DNS client queries and TCP port 53 for zone transfers. DNS poisoning attacks attempt to modify or corrupt DNS data. Secure zone transfers help prevent these attacks. A pharming attack is a type of DNS poisoning attack that redirects a web site's traffic to another web site. 

100

ECDSA

Elliptic Curve Digital Signature Algorithm. The Elliptic Curve Digital Signature Algorithm (ECDSA) is a cybersecurity tool that uses elliptic curve cryptography to create a digital signature for data, ensuring its authenticity and integrity. 

100

FDE

Full Disk Encryption. Full Disk Encryption. Method to encrypt an entire disk. TrueCrypt is an example. 

100

EAP-TLS

Extensible Authentication Protocol-Transport Layer Security. An extension of EAP sometimes used with 802.1x. This is one of the most secure EAP standards and is widely implemented. The primary difference between PEAP and EAP-TLS is that EAP-TLS requires certificates on the 802.1x server and on each of the wireless clients.

100

IRT

Incident Response Team. A group of experts who respond to security incidents. Also known as CERT, CIRT, or SIRT.

200

AAA

Authentication, Authorization, and Accounting. Authentication, Authorization, and Accounting. AAA protocols are used in remote access systems. For example, TACACS + is an AAA protocol that uses multiple challenges and responses during a session. Authentication verifies a user's identification. Authorization determines if a user should have access. Accounting tracks a user's access with logs.

200

ARO

Annualized Rate of Occurrence. Annual (or annualized) rate of occurrence. The ARO identifies how many times a loss is expected to occur in a year and it is used to measure risk with ALE and SLE in a quantitative risk assessment. The calculation is SLE × ARO = ALE. 

200

BIOS

Basic Input/Output System. Basic Input/ Output System. A computer's firmware used to manipulate different settings such as the date and time, boot drive, and access password. UEFI is the designated replacement for BIOS. 

200

CCMP

Counter-Mode/CBC-Mac Protocol. Counter Mode with Cipher Block Chaining Message Authentication Code Protocol. An encryption protocol based on AES and used with WPA2 for wireless security. It is more secure then TKIP, which was used with the original release of WPA. 

200

COOP

Continuity of Operations Plan. Continuity of operations planning. Continuity of operations planning (COOP) sites provide an alternate location for operations after a critical outage. A hot site includes personnel, equipment, software, and communication capabilities of the primary site with all the data up to date. A cold site will have power and connectivity needed for COOP activation, but little else. A warm site is a compromise between a hot site and a cold site. Mobile sites do not have dedicated locations, but can provide temporary support during a disaster. 

200

CSU

Channel Service Unit. Channel Service Unit. A line bridging device used with T1 and similar lines. It typically connects with a DSU as a CSU/ DSU. 

200

DES

Digital Encryption Standard. Digital Encryption Standard. An older symmetric encryption standard used to provide confidentiality. DES is a block cipher and it encrypts data in 64-bit blocks. DES uses 56 bits and is considered cracked. Use AES instead, or 3DES if the hardware doesn't support AES. 

200

DoS

Denial of Service. Denial-of-service. An attack from a single source that attempts to disrupt the services provided by the attacked system. Compare to DDoS. 

200

EFS

Encrypted File System. Encrypting File System. A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality. 

200

FRR

False Rejection Rate. the False Rejection Rate (FRR) is the probability that an authentication system incorrectly denies access to a legitimate user 

200

EAP-TTLS

Extensible Authentication Protocol-Tunneled Transport Layer Security. An extension of EAP sometimes used with 802.1x. It allows systems to use some older authentication methods such as PAP within a TLS tunnel. It requires a certificate on the 802.1x server but not on the clients.

200

iSCSI

Internet Small Computer System Interface. A lower-cost alternative to traditional SANs. It supports sending traditional SCSI commands over an IP network.

300

ABAC

Attribute-based Access Control. Attribute-Based Access Control (ABAC) is a system that grants access to resources based on a set of policies that evaluate attributes of the user, the resource, and the environment 

300

ARP

Address Resolution Protocol. Address Resolution Protocol. Resolves IPv4 addresses to MAC addresses. ARP poisoning attacks can redirect traffic through an attacker's system by sending false MAC address updates. NDP is used with IPv6 instead of ARP. 

300

BPA

Business Partners Agreement. Business partners agreement. A written agreement that details the relationship between business partners, including their obligations toward the partnership. 

300

CCTV

Closed-circuit Television. Closed-circuit television. This is a detective control that provides video surveillance. Video surveillance provides reliable proof of a person's location and activity. It is also a physical security control and it can increase the safety of an organization's assets. 

300

COPE

Corporate Owned, Personally Enabled. Corporate-Owned, Personally-Enabled (COPE) in cybersecurity refers to a mobile device management strategy where a company owns the device but allows employees to use it for personal tasks, providing a balance between security control and employee flexibility. 

300

CTM

Counter-Mode. Counter (CTR) mode is a cryptographic mode of operation that uses a counter function to encrypt data, turning a block cipher into a stream cipher 

300

DFIR

Digital Forensics and Investigation Response. Digital Forensics and Incident Response (DFIR) is a critical cybersecurity discipline that involves investigating cyberattacks, containing the damage, and recovering from the incident. 

300

DRP

Disaster Recovery Plan. Disaster recovery plan. A document designed to help a company respond to disasters, such as hurricanes, floods, and fires. It includes a hierarchical list of critical systems and often prioritizes services to restore after an outage. Testing validates the plan. The final phase of disaster recovery includes a review to identify any lessons learned and may include an update of the plan. 

300

EMI

Electromagnetic Interference. Electromagnetic interference. Interference caused by motors, power lines, and fluorescent lights. EMI shielding prevents outside interference sources from corrupting data and prevents data from emanating outside the cable. 

300

FTP

File Transfer Protocol. File Transfer Protocol. Used to upload and download files to an FTP server. FTP uses TCP ports 20 and 21. Secure FTP (SFTP) uses SSH for encryption on TCP port 22. FTP Secure (FTPS) uses SSL or TLS for encryption. 

300

ESD

Electrostatic discharge. Release of static electricity. ESD can damage equipment and low humidity causes a higher incidence of electrostatic discharge (ESD). High humidity can cause condensation on the equipment, which causes water damage.

300

LANMAN

Local area network manager. Older authentication protocol used to provide backward compatibility to Windows 9x clients. LANMAN passwords are easily cracked due to how they are stored.

400

ACL

Access Control List. Access control list. Routers and packet-filtering firewalls perform basic filtering using an ACL to control traffic based on networks, subnets, IP addresses, ports, and some protocols. In NTFS, a list of ACEs makes up the ACL for a resource. 

400

ASLR

Address Space Layout Randomization. Address Space Layout Randomization (ASLR) is a cybersecurity technique that randomizes the memory locations of key program areas like the stack, heap, and libraries to prevent attackers from predicting where to inject malicious code. 

400

BPDU

Bridge Protocol Data Unit. A Bridge Protocol Data Unit (BPDU) is a network message used by network switches to communicate and prevent network loops through the Spanning Tree Protocol (STP). 

400

CER

Certificate. A "certificate in cybersecurity" can refer to a broad category of credentials, including entry-level certifications like CompTIA Security+ or Google Cybersecurity Certificate, which validate foundational skills, and more specialized or advanced certifications for specific roles. 

400

CP

Contingency Planning. Contingency planning. Plans for contingencies in the event of a disaster to keep an organization operational. BCPs include contingency planning. 

400

CTO

Chief Technology Officer. Chief Technology Officer. A "C" level executive position in some organizations. CTOs focus on technology and evaluate new technologies. 

400

DHCP

Dynamic Host Configuration Protocol. Dynamic Host Configuration Protocol. A service used to dynamically assign TCP/ IP configuration information to clients. DHCP is often used to assign IP addresses, subnet masks, default gateways, DNS server addresses, and much more. 

400

DSA

Digital Signature Algorithm. Digital Signature Algorithm. A digital signature is an encrypted hash of a message. The sender's private key encrypts the hash of the message to create the digital signature. The recipient decrypts the hash with the sender's public key, and, if successful, it provides authentication, non-repudiation, and integrity. Authentication identifies the sender. Integrity verifies the message has not been modified. Non-repudiation is used with online transactions and prevents the sender from later denying he sent the email. 

400

EMP

Electro Magnetic Pulse. An electromagnetic pulse (EMP) is a powerful burst of energy that can damage or destroy electronic systems, presenting a unique cybersecurity threat by physically disabling hardware rather than attacking software. 

400

FTPS

Secured File Transfer Protocol. File Transfer Protocol Secure. An extension of FTP that uses SSL to encrypt FTP traffic. Some implementations of FTPS use TCP ports 989 and 990. 

400

FACL

File System Access Control List. An ACL used for file systems. As an example, NTFS uses the DAC model to protect files and folders.

400

LSO

Local shared objects or locally shared objects. A Flash cookie created by Adobe Flash player.

500

AES

Advanced Encryption Standard. Advanced Encryption Standard. A symmetric algorithm used to encrypt data and provide confidentiality. AES is a block cipher and it encrypts data in 128-bit blocks. It is quick, highly secure, and used in a wide assortment of cryptography schemes. It includes key sizes of 128 bits, 192 bits, or 256 bits. 

500

ASP

Application Service Provider. Application Service Provider. Provides an application as a service over a network. 

500

BYOD

Bring Your Own Device. Bring your own device. A policy allowing employees to connect personally owned devices, such as tablets and smartphones, to a company network. Data security is often a concern with BYOD policies and organizations often use VLANs to isolate mobile devices. 

500

CER

Cross-over Error Rate. the Cross-over Error Rate (CER), also known as the Equal Error Rate (EER), is a metric for evaluating the performance of biometric systems. 

500

CRC

Cyclical Redundancy Check. Cyclical Redundancy Check. An error detection code used to detect accidental changes that can affect the integrity of data. 

500

CTR

Counter. "counter" refers to the methods and actions used to prevent, detect, and respond to cyber threats and attacks. 

500

DHE

Data-Handling Electronics. Data-Handling Electronics. Term used at NASA indicating electronic systems that handle data. 

500

DSL

Digital Subscriber Line. Digital subscriber line. Improvement over traditional dial-up to access the Internet. 

500

ERP

Enterprise Resource Planning. ERP (Enterprise Resource Planning) cybersecurity involves a multi-layered approach to protecting sensitive business data within an ERP system by using technologies like encryption and AI-powered threat detection, implementing strong access controls and regular employee training, and maintaining software through automated patching. 

500

GCM

Galois Counter Mode. Galois/Counter Mode (GCM) is a widely used encryption mode that provides both data confidentiality (encryption) and integrity (authentication) simultaneously, making it essential for modern cybersecurity applications like TLS and VPNs. 

500

FCoE

Fibre Channel over Ethernet. A lower-cost alternative to traditional SANs. It supports sending Fibre Channel commands over an IP network.

500

NDP

Neighbor Discovery Protocol performs several functions on IPv6. For example, it performs functions similar to ARP, which is used on IPv4. It also performs autoconfiguration of device IPv6 addresses and discovers other devices on the network such as the IPv6 address of the default gateway.

600

AES256

Advanced Encryption Standards 256bit. Advanced Encryption Standard 256 bit. AES sometimes includes the number of bits used in the encryption keys and AES-256 uses 256-bit encryption keys. Interestingly, Blowfish is quicker than AES-256. 

600

AUP

Acceptable Use Policy. Acceptable use policy. An AUP defines proper system usage. It will often describe the purpose of computer systems and networks, how users can access them, and the responsibilities of users when accessing the systems. 

600

CA

Certificate Authority. Certificate Authority. An organization that manages, issues, and signs certificates and is part of a PKI. Certificates are an important part of asymmetric encryption. Certificates include public keys along with details on the owner of the certificate and on the CA that issued the certificate. Certificate owners share their public key by sharing a copy of their certificate. 

600

CERT

Computer Emergency Response Team. Computer Emergency Response Team. A group of experts who respond to security incidents. Also known as CIRT, SIRT, or IRT. 

600

CRL

Certificate Revocation List. Certification revocation list. A list of certificates that a CA has revoked. Certificates are commonly revoked if they are compromised, or issued to an employee who has left the organization. The Certificate Authority (CA) that issued the certificate publishes a CRL, and a CRL is public. 

600

CYOD

Choose Your Own Device. "Choose Your Own Device" (CYOD) in cybersecurity is a policy where employees select a device for work from a pre-approved list of company-chosen hardware, offering a balance between security and employee flexibility. 

600

DHE

Diffie-Hellman Ephemeral. Diffie-Hellman Ephemeral. An alternative to traditional Diffie-Hellman. Instead of using static keys that stay the same over a long period, DHE uses ephemeral keys, which change for each new session. Sometimes listed as EDH. 

600

DSU

Data Service Unit. Data Service Unit. An interface used to connect equipment to a T1 and similar lines. It typically connects with a CSU as a CSU/ DSU. 

600

ESN

Electronic Serial Number. Electronic Serial Number. Numbers used to uniquely identify mobile devices. 

600

GPG

Gnu Privacy Guard. GNU Privacy Guard (GPG). Free software based on the OpenPGP standard and used to encrypt and decrypt files. It is similar to PGP but avoids any conflict with existing licensing by using open standards. 

600

GUI

Graphical user interface. Users interact with the graphical elements instead of typing in commands from a text interface. Windows is an example of a GUI.

600

NetBIOS

Network Basic Input/ Output System (NetBIOS) is a name resolution service for NetBIOS names on internal networks. NetBIOS also includes session services for both TCP and UDP communication. NetBIOS uses UDP ports 137 and 138, and TCP port 139. It can use TCP port 137, but rarely does.

700

AH

Authentication Header. Authentication Header. IPsec includes both AH and ESP. AH provides authentication and integrity using HMAC. ESP provides confidentiality, integrity, and authentication using HMAC, and AES or 3DES. AH is identified with protocol ID number 51. 

700

AV

Antivirus. Antivirus software is a cybersecurity tool that detects, removes, and prevents malware from infecting devices. 

700

CAC

Common Access Card. Common Access Card. A specialized type of smart card used by the U.S. Department of Defense. It includes photo identification and provides confidentiality, integrity, authentication, and non-repudiation for the users. It is similar to a PIV. 

700

CFB

Cipher Feedback. Cipher Feedback (CFB) mode is a type of block cipher that converts a block cipher into a stream cipher by using the previous ciphertext block as feedback for the next encryption step. 

700

CSIRT

Computer Security Incident Response Team. A Computer Security Incident Response Team (CSIRT) is a specialized group in cybersecurity that handles security breaches and cyberattacks. 

700

DAC

Discretionary Access Control. Discretionary access control. An access control model where all objects have owners and owners can modify permissions for the objects (files and folders). Microsoft NTFS uses the DAC model. Other access control models are MAC and RBAC. 

700

DLL

Dynamic Link Library. Dynamic Link Library. A compiled set of code that can be called from other programs. 

700

EAP

Extensible Authentication Protocol. Extensible Authentication Protocol. An authentication framework that provides general guidance for authentication methods. Variations include EAP-TLS, EAP-TTLS, LEAP, and PEAP. 

700

ESP

Encapsulated Security Payload. Encapsulating Security Protocol. IPsec includes both AH and ESP. AH provides authentication and integrity using HMAC. ESP provides confidentiality, integrity, and authentication using HMAC and AES or 3DES. ESP is identified with protocol ID number 50. 

700

GPO

Group Policy Object. Group Policy Object. Group Policy is used within Microsoft Windows to manage users and computers. It is implemented on a domain controller within a domain. Administrators use it to create password policies, lock down the GUI, configure host-based firewalls, and much more. 

700

IDS

Intrusion detection system. A detective control used to detect attacks after they occur. Monitors a network (NIDS) or host (HIDS) for intrusions and provides ongoing protection against various threats. IDSs include sniffing capabilities. Many IDSs use numbering systems to identify vulnerabilities.

700

NIC

Network interface card. Provides connectivity to a network.

800

ALE

Annualized Loss Expectancy. Annual (or annualized) loss expectancy. The ALE identifies the expected annual loss and is used to measure risk with ARO and SLE in a quantitative risk assessment. The calculation is SLE × ARO = ALE. 

800

AV

Asset Value. asset value is the monetary and operational worth an organization assigns to its digital and physical assets, such as data, systems, and intellectual property 

800

CAN

Controller Area Network. Controller Area Network. A standard that allows microcontrollers and devices to communicate with each other without a host computer. 

800

CHAP

Challenge Handshake Authentication Protocol. Challenge Handshake Authentication Protocol. Authentication mechanism where a server challenges a client. More secure than PAP and uses PPP. MS-CHAPv2 is an improvement over CHAP and uses mutual authentication. 

800

CSO

Chief Security Officer. A Chief Security Officer (CSO) in cybersecurity is a senior executive responsible for protecting an organization's physical and digital assets, while a Chief Information Security Officer (CISO) focuses specifically on information and cyber threats. 

800

DBA

Database Administrator. Database administrator. A DBA administers databases on database servers. 

800

DLP

Data Loss Prevention. Data loss prevention. A network-based DLP system can examine and analyze network traffic. It can detect if confidential company data or any PII data is included in email and reduce the risk of internal users emailing sensitive data outside the organization. End-point DLP systems can prevent users from copying or printing sensitive data. 

800

ECB

Electronic Code Book. In cybersecurity, the Electronic Codebook (ECB) is a simple block cipher mode where each block of plaintext is encrypted independently with the same key. 

800

EF

Exposure Factor. exposure factor (EF) is the estimated percentage of an asset's value that would be lost if a specific threat materializes. 

800

GPS

Global Positioning System. Global Positioning System. GPS tracking can help locate lost mobile devices. Remote wipe, or remote sanitize, erases all data on lost devices. Full disk encryption protects the data on the device if it is lost. 

800

IGMP

Internet Group Management Protocol. Used for multicasting. Computers belonging to a multicasting group have a multicasting IP address in addition to a standard unicast IP address.

800

NOP

No operation, sometimes listed as NOOP. NOP instructions are often used in a buffer overflow attack. An attacker often writes a large number of NOP instructions as a NOP sled into memory, followed by malicious code. Some processors use hexadecimal code x90 for NOP so a string of x90 characters indicates a potential buffer overflow attack.

900

AP

Access Point. Access point, short for wireless access point (WAP). APs provide access to a wired network to wireless clients. Many APs support Isolation mode to segment wireless users from other wireless users. 

900

BAC

Business Availability Center. Business Availability Center. An application that shows availability and performance of applications used or provided by a business. 

900

CAPTCHA 

Completely Automated Public Turing Test to Tell Computers and Humans Apart. Completely Automated Public Turing Test to Tell Computers and Humans Apart. Technique used to prevent automated tools from interacting with a web site. Users must type in text, often from a slightly distorted image. 

900

CIO

Chief Information Officer. Chief Information Officer. A "C" level executive position in some organizations. A CIO focuses on using methods within the organization to answer relevant questions and solve problems. 

900

CSP

Cloud Service Provider. A cloud service provider (CSP) in cybersecurity is a company that offers security services and solutions for cloud-based environments, managing the security of data, applications, and infrastructure. 

900

DDoS

Distributed Denial of Service. Distributed denial-of-service. An attack on a system launched from multiple sources intended to make a computer's resources or services unavailable to users. DDoS attacks typically include sustained, abnormally high network traffic. Compare to DoS. 

900

DMZ

Demilitarized Zone. Demilitarized zone. A buffer zone between the Internet and an internal network. It allows access to services while segmenting access to the internal network. Internet clients can access the services hosted on servers in the DMZ, but the DMZ provides a layer of protection for the internal network. DNAT— Dynamic Network Address Translation. A form of NAT that uses multiple public IP addresses. In contrast, PAT uses a single public IP address. It hides addresses on an internal network. 

900

ECC

Elliptic Curve Cryptography. Elliptic curve cryptography. An asymmetric encryption algorithm commonly used with smaller wireless devices. It uses smaller key sizes and requires less processing power than many other encryption methods. 

900

FACL

File System Access Control List. File System Access Control List. An ACL used for file systems. As an example, NTFS uses the DAC model to protect files and folders. 

900

GPU

Graphic Processing Unit. GPUs are used in cybersecurity for tasks like high-speed, real-time threat detection and response due to their parallel processing capabilities, which can accelerate malware analysis and intrusion detection. 

900

IPv4

Internet Protocol version 4. Identifies hosts using a 32-bit IP address. IPv4 is expressed in dotted decimal format with decimal numbers separated by dots or periods like this: 192.168.1.1.

900

NOS

Network Operating System. Software that runs on a server and enables the server to manage resources on a network.

1000

API

Application Programming Interface. Application Programming Interface. A software module or component that identifies inputs and outputs for an application. 

1000

BCP

Business Continuity Planning. Business continuity plan. A plan that helps an organization predict and plan for potential outages of critical services or functions. It includes disaster recovery elements that provide the steps used to return critical functions to operation after an outage. A BIA is a part of a BCP and the BIA drives decisions to create redundancies such as failover clusters or alternate sites. 

1000

CAR

Corrective Action Report. Corrective Action Report. A report used to document actions taken to correct an event, incident, or outage. 

1000

CIRT

Computer Incident Response Team. Computer Incident Response Team. A group of experts who respond to security incidents. Also known as CERT, SIRT, or IRT. 

1000

CSR

Certificate Signing Request. Certificate signing request. A method of requesting a certificate from a CA. It starts by creating an RSA-based private/ public key pair and then including the public key in the CSR. 

1000

DEP

Data Execution Prevention. Data Execution Prevention. A security feature in some operating systems. It helps prevent an application or service from executing code from a nonexecutable memory region. 

1000

DNAT

Destination Network Address Transaction. Destination Network Address Translation. A form of NAT that changes the destination IP address for incoming traffic. It is used for port forwarding. 

1000

ECDHE

Elliptic Curve Diffie-Hellman Ephemeral. Elliptic Curve Diffie-Hellman Ephemeral. A version of Diffie-Hellman that uses ECC to generate encryption keys. Ephemeral keys are re-created for each session. 

1000

FAR

False Acceptance Rate. False Acceptance Rate (FAR) in cybersecurity measures the probability that a system will incorrectly grant access to an unauthorized user, 

1000

GRE

Generic Routing Encapsulation. Generic Routing Encapsulation. A tunneling protocol developed by Cisco Systems. 

1000

IPv6

Internet Protocol version 6. Identifies hosts using a 128-bit address. IPv6 has a significantly larger address space than IPv4. IPsec is built in to IPv6 and can encrypt any type of IPv6 traffic.

1000

NoSQL

Not only Structured Query Language. An alternative to traditional SQL databases. NoSQL databases use unstructured query language queries instead of traditional SQL queries.

M
e
n
u