No
Categories
Only
Acronyms
For CySA
100


LFI 



Local File Inclusion

A vulnerability that allows an attacker to include files on a server through the web browser.


100


PKI 



Public Key Infrastructure

A framework for creating a secure method for exchanging information based on public key cryptography.


100

PID


Process Identifier

A unique number used by operating systems to identify a process.


100


RFI 



Remote File Inclusion

A type of vulnerability most often found on websites that allows an attacker to include a remote file, usually through a script on the web server.


100


IoC 



Indicators of Compromise

Artifacts observed on a network or in an operating system that indicate a potential intrusion.


200

SAML


Security Assertion Markup Language

An open standard for exchanging authentication and authorization data between parties.


200

API


Application Programming Interface


A set of protocols and tools for building software and applications


200

SDN


Software-defined Networking

An approach to networking that uses software-based controllers to direct traffic on the network.


200

SLO


Service-level Objective

A key element of a service level agreement between a service provider and a customer.


200

SASE


Secure Access Secure Edge

A network architecture that combines wide-area networking and security functions.


300

STIX


Structured Threat Information Expression

A standardized language for representing cyber threat information.


300


SQL 



Structured Query Languge

 A standard programming language for managing and manipulating databases.


300

CASB


 Cloud Access Security Broker

Security policy enforcement points are placed between cloud service consumers and providers.


300

CVSS


Common Vulnerability Scoring System

A free and open industry standard for assessing the severity of computer system security vulnerabilities.


300

PAM


Privileged Access Management

Tools and technology used to secure, control, and monitor access to an organization’s critical information and resources.


400

GPO


Group Policy Objects

A feature of Windows that provides centralized management and configuration of operating systems, applications, and users’ settings.


400

UEBA


User and Entity Behavior Analytics

A cybersecurity process that uses machine learning to analyze user behavior and detect anomalies.


400


URL 



Uniform Resource Locator

A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it


400

XML


Extensible Markup Language

A markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable


400

XSS


Cross-site Scripting

A security vulnerability that allows an attacker to inject malicious scripts into content from otherwise trusted websites.


500

OSSTMM


Open Source Security Testing Methodology Manual

A peer-reviewed methodology for performing security tests and metrics.


500

ARP


Address Resolution Protocol

A protocol used to map an IP address to a physical machine address (MAC address).


500

C2


Command and Control

The set of organizational and technical capabilities that allow leaders to direct and control forces and operations.


500


PLC 



Programmable Logic Controller

An industrial digital computer used for automation of electromechanical processes.


500


CDN 



Content Delivery Network

A network of servers that deliver web content to users based on their geographic location.