Acronyms Computing Terminology & Cyber Threat Intelligence NOTE: As in any dictionary this list is a continual work in progress
Return to Main 320 acronyms as of December 2023  https://csrc.nist.gov/glossary 
1 3G, 4G, 5G Third, Fourth, Fifth, etc  Generation Authentication
2 2LD, 3LD Second, Third etc  Level Domain of DNS Cyber Threat Intelligence acronymns most relevant & peculiar see also https://socradar.io/cti-glossary/
3 AAS As A Service; bunch of xAAs where x may be S (software) D (desktop) I (infrastructure) P (Platform) , F (Firewall) etc This Page NIST 0-day Zero Day OTP
4 ABI Application Binary Interface  also see Embedded ABI (EABI) SSO
5 ARP Address Resolution Protocol A A ACL Access Control List AD
6 ASP Active Server Pages B B AD Active Directory RADIUS
7 ACL Access Control List C C APT Advanced Persistent Threat LDAP
8 AD Active Directory or Analog/Digital D D C2 or CC Command & Control API
9 AML Anti Money Laundering E E CERT Computer  Emergency Response Team SCIM System for Cross-domain Identity Management
10 API Application Programming Interface - Source code level F F CIC Command Information Center IDaM Identiy & Access Management
11 APK Android Package Kit G G CIRT Computer Incident Response Team TLS
12 APPX Application Package Extension - File extension for package Microsoft appications ready to install H H CM Continuous Monitorin SSL
13 APT Advanced Persistent Threat I I CMF Collection Management Framework AWS
14 ARM Advanced RISC Machine J J CNAa Computer Network Attack EC2
15 ASIC Application Specific Interated Circuit K K CND Computer Network Defence SQL
16 ASLR Address Space Location Randomization L L CNE Computer Network Exploitation VM Virtual Machine
17 ASN Autonomous System Numbers COA Courses Of Action OAM Oracle Access Manager
18 ASP Active Server Pages & ASPX (extended) M M CTA Cyber Threat Analyst OAM Operations Administration & Maintenance
19 ASR Attack Surface Reduction N N CTI Cyber Threat Intelligence OAM Open Application Model
20 AV Anti-Virus O O CVE Common Vulnerabilities & Exposures OAM Object Access Method
21 AWS Amazon Web Services DNS Domain Name Service OAM Officially Appointed Mechnaism
22 BGP Border Gateway Protocol P P DOX Doxing -searching for OSINT, typically for malicious intent; revealing private info OAM OCP (Open Compute Project) Accelerator Module
23 BIOS Basic Input-Output System Q Q EDR Endpoint Detection & Response
24 BIN Bank Identification Number R R ETW Event Tracing for Windows
25 BLOB Binary Large Object S S FW FireWall
26 BNF Backus-Naur Form GEOINT Geospatial Intelligence
27 BOLO Be On Look Out (law enforcement term) T T HUMINT Human Intelligence
28 BRT Breach Response Team U U IC Intelligence Community
29 BS Base Station IDS Intrusion Detection System
30 BT BitTorrent (file sharing protocol) V V IPS Intrusion Prevention System
31 BTS Base Transceiver Stations IOA Indicators of Attack
32 BYOD Bring Your Own Device W W IOB Indicators of Behavior
33 C2 Command and Control X X IOC Indicators Of Compromise
34 CA Certificate or Certifying Authority IPS Intrusion Prevention System
35 CAPEC Common Attack Pattern Enumeration & Classification Y Y IR Incident Response
36 CASB Cloud Access Security Broker MASINT Measurement and Signature Intelligence
37 CC Command & Control Z Z MDR Management Detection & Response
38 CCI Control Correlation Identifiers MI Military Intellignce
39 CASB Cloud Access Security Broker MISP Malware Information Sharing Platform
40 CDM Continuing Diagnostics Mitigtion; Code Division Multiplexor OPSEC Operational Security
41 CDN Content Delivery Network  caches content near users OSINT Open Source Intelligence
42 CERT Computer Emergency Response Team OSSEM Open Source Security Events MetaData
43 CI/CD Continuous Integration / Continuous Delivery - application updating RCE Remote Code Execution
44 CIDR Classless Internet Domain Routing RDP Remote Desktop Protocol
45 CIRT Computer Incident Response Team SA Situational Awareness
46 CISC Complex Instruction Set Computing SIEM Security Information & Event Management
47 CISO Chief Information Security Officer SIGINT Signals Intelligence
48 CL  Command Line SOC Security Operations Center
49 CLI Command Line Interface SOCMINT Social Media Intelligence
50 CLM Constrained Language Mode (Powershell) STIX-TAXII Structured Incident Expression
51 CLSID Class ID TaHiTI Targeted Hunting Integrationof Threat Intelligence
52 CM Continuous Monitoring TIP Threat Intelligence Platform
53 CnC Command and Control TLP Traffic Light Protocol
54 CND Computer Network Defense TOR The Onion Router
55 CNE Computer Network Exploitation TTP Tactics, Techniques & Procedures
56 CNN Combinatorial Neural Network UBA User Behavior Analytics
57 CNP Card Not Present (credit card transaction) XDR Extensible Detection & Response
58 COA Course of Action CISA Cybersecurity and Infrastructure Security Agency 
59 COM Common Object Model; Communications NIST National Institute of Standards & Technology
60 COMSEC Communications Security
61 CONOPS Concept of Operations
62 COTS Commercial Off the Shelf
63 CPT Cyber Protection Team
64 CPU Central Processing Unit
65 CSIRT Computer Security Incident Response Team
66 CSP Cloud Service Provider
67 CSS Cross-Site Scripting or Cascading Style Sheets
68 CSU/DSU Channel Service Unit / Data Service Unit
69 CSV Comma Separated Value
70 CTA Cyber Threat Analyst
71 CTF Capture The Flag
72 CTI Cyber Threat Intelligence
73 CUI Controlled Unclassified Information
74 CVE Common Vulnerabilites and Exposures
75 CVSS Common Vulnerability Scoring System
76 CVV Card Verification Value also known as CVN (number) or CVC (code)
77 CWE Common Weakness Enumeration
78 DAAS Data As A Service or Desktop As A Service
79 DB Database
80 DCOM Distributed Component Object Model
81 DDE Dynamic Data Exchange
82 DDOS Distributed Denial Of Service
83 DDR Double Data Rate; see also GDDR
84 DEP Data Execution Prevention
85 DGA Domain Generation Algorithm
86 DHCP Dynamic Host Configuration Protocol
87 DLL Dynamic Link Library
88 DLP Data Loss Prevention
89 DKIM DomainKeys Identified Mail - IETF Std 7372
90 DMA Direct Memory Access
91 DMARC Domain-based Message Authentication, Reporting and Conformance IETF 7489
92 DNI Digital Network Intellgence
93 DNR Dialed Number Recognition
94 DNS Domain Name Service
95 DNSSEC Domain Name Security Security
96 DOM Document Object Model
97 DOS Denial Of Service
98 DOX Short for Doxing or searching for OSINT
99 DPI Deep Packet Inspection
100 DTE Data Terminal Equipment
101 EDR Endpoint Detection & Response
102 eFuse Electronic Fuse
103 ELF Execute & Link Format
104 ETH Ethernet
105 ETL Extract Transform Load
106 ETW Event Tracing for Windows
107 EV SSL Extended Validation Secure Sockets Layer 
108 EXE Executable
109 FDDI Fiber Distributed Data Interface
110 FF Fast Flux
111 FOUO For Official Use Only
112 FPGA Field Processor Gate Array
113 FPOC Field Point Of Connection
114 FTP File Transfer Protocol
115 FQDN Fully Qualified Domain Name
116 FW Firewall
117 FWaaS FireWall as a Service 
118 Gb GigaByte
119 GCID Global Cell ID
120 GDDR Graphics Double Data Rate
121 GEOINT Geospatial Intelligence
122 GHZ GigaHertz
123 GPO Group Policy Orchestrator
124 GRC Governance Risk & Compliance
125 GSM Global System for Mobile Communications
126 GUI Graphical User Interface
127 GUID Global Identifier
128 HMAC Hash-based Message Authentication Code
129 HSM Hardware Security Module
130 HTML HyperText Markup Language
131 HTTP HyperText Transport Protocol
132 HUMINT Human Intelligence
133 HV HyperVisor
134 HW Hardware
135 HZ Hertz - Cycles per Second
136 IAAS Infrastructure As A Service
137 IAM Identity & Access Management
138 IARPA Intelligence Research Projects Agency
139 IC Intelligence Community or Integrated Circuit
140 ICMP Internet Control Message Protocol
141 ICS Industrial Control System
142 ICT Information and Communication Technology
143 IDAM IDentity & Access Management
144 IDE Integrated Development Environment
145 IDS Intrusion Detection System
146 IETF Internet Engineering Task Force
147 IMAP Internet Message Protocol
148 IMINT Image Intelligence
149 IO Input Output
150 IOA Indicators of Attack
151 IOB Indicators of Behavior
152 IOC Indicators of Compromise
153 IP  Internet Protocol
154 IPS Intrusion Prevention System
155 IR Incident Response
156 IRC Inter Relay Chat
157 IRL In Real Life
158 ISO International Standards Organization 
159 ISP Internet Service Provider
160 ITAM Information Technology Asset Management
161 ISAC Information Security & Analysis Center
162 JIE Joint Information Environment
163 JS JAVAScript
164 JSON JAVAScript Object Notation
165 Kb KiloByte (1024 bits)
166 KYC Know Your Customer
167 LAC LAI Location Area Code, Location Area Identifier
168 LAN Local Area Network
169 LDAP Lightweight Directory Access Protocol
170 LE Law Enforcement
171 MA Mission Assurance
172 MAC Media Access Control or Message Authentication Code
173 MASINT Measurement And Signature Intelligence
174 MB MegaByte or MotherBoard
175 MBR Master Boot Record
176 MDR Managed Detection & Response
177 MFA Multi Factor Authentication
178 MHz MegaHertz
179 MI Military Intelligence
180 ML Machine Learning
181 MOE Measures of Effectiveness
182 MOP Measures of Performance
183 MOU Memorandum of Understanding
184 MPLS Multi-Protocol Label Switching
185 MRU Most Recent Used
186 MSCCM Microsoft System Center Configuration Manager
187 MSSP Managed Security Services, MSS Provider
188 MTA Mail Transfer Agent
189 NAC Network Access Control
190 NAT Network Address Translation
191 NPM Node Package Manager - code packages
192 NTLM Windows NT (an Operating System) Lan Manager
193 NTP Network Time Protocol
194 NVD National Vulnerability Database
195 OAuth Open Authentication
196 ON Optical Network
197 OPSEC Operations Security
198 OSI Open Systems Interconnect
199 OSINT Open Source Intelligence
200 OS Operating System
201 OT Operational Technology - control systems controllers, sensors, & actuators
202 OTN Optical Transport Network
203 OTP One Time Password
204 P2P Point to Point Protocol
205 PAAS Platform As A Service
206 PAT Port Address Translation
207 PCAP Packet Capture
208 PCI Peripheral Component Interface or Payment Card Industry
209 PE Portable Executable
210 PID Program IDentifier
211 PII Personal Identifiable Information (name, address, SSN, etc)
212 PLC Programmable Logic Controller
213 POC Point of Connection; or PoC Proof of Concept
214 POI(s) Person(s) of Interest
215 POP Post Office Protocol
216 PPP Point to Point Protocol
217 PS PowerShell
218 PtH Pass the Hash
219 PnP Plug and Play
220 PUA Potentially Unwanted Application
221 PUP Potentially Unwanted Program
222 QOS Quality Of Service
223 RADIUS Remote Authentication Dial In User Service
224 RAM Random Access Memeory
225 RAN Radio Access Network (ususlly applied to cellular networks)
226 RCE Remote Code Execution
227 RDP Remote Desktop Protocol
228 REST Representational State Transfer; an API between Internet Client-Server
229 RFC Request For Comment
230 RISC Reduced Instruction Set Computing
231 RMF Risk Management Framework
232 RMON Remote Monitor
233 ROC Remote or Regional Operations Center
234 ROM Read Only Memory
235 ROP Return Oriented Programming
236 RPC Remote Procedure Call
237 RPKI Resource Public Key Infrastructure
238 RSA Rivest Shamir Adleman 
239 SAAS Software As A Service
240 SAM Security Access Manager
241 SAML Security Assertion Markup Language
242 SAN Storage Area Network
243 SASE Secure Access Service Edge https://en.wikipedia.org/wiki/Secure_Access_Service_Edge
244 SBGP Security in Border Gateway Protocol
245 SBOM Software Bill of Materials
246 SCADA Supervisory Control and Data Acquisition
247 SCAP Security Content Automation Protocol
248 SCCM System Center Configuration Manager (SCCM) - Microsoft
249 SD Software Defined or Systems Development or Security Descriptor
250 SDK System Development Kit
251 SDLC Systems Development Life Cycle
252 SDN Software Defined Networking
253 SDR Software Defined Radio
254 SDRAM Sychronous Dynamic Random Access Memory
255 SDWAN Software Defined Wide Area Network
256 SE Software Engineering
257 SIEM Security Information & Event Management
258 SIGINT Signals Intelligence
259 SIP Session Initiation Protocol
260 SLA Service Level Agreement
261 SMB Server Message Block
262 SMS Systems Management Server - renamed to Microsoft System Center Configuration Manager (MSCCM)
263 SMS Short Message Service
264 SMTP Simple Mail Transport Protocol
265 SNA Social Network Analysis
266 SNMP Simple Network Management Protocol
267 SOAP Simple Object Access Protocol
268 SOAR Security Orchestration Automation & Response
269 SOC Security Operations Center or System On a Chip
270 SPOF Single Point of Failure
271 SPF Sender Policy Framework - Authentication STD IETF 7208
272 SQL Structured Query Language
273 SSH Secure Shell
274 SSL Secure Sockets Layer see also EV SSL
275 SSO Single Sign On
276 STIX Structure Threat Information eXpression
277 STS Security Token Service
278 SW Software
279 SWF Shockwave Flash File
280 SWG Secure Web Gateway
281 TAXII Trusted Automated eXchange of Indicator Information
282 TCP Transmission Control Protocol
283 Tb TerraByte
284 TELCO Telephone Company
285 TLD Top Level Domain
286 TLP Traffic Light Protocol
287 TLS Transport Layer Security
288 TPM Trusted Platform Module
289 TTI Technical Threat Intelligence
290 TTL Time to Live
291 TTP Tactics, Techniques & Procedures
292 U2F Universal 2nd Factor
293 UAC User Account Control
294 UBA User Behavior Analytics
295 UDP User Datagram Protocol
296 UEFI Unified Extensible Firmware Interface
297 UI User Interface
298 UID User ID
299 uPnP Univeral Plug and Play
300 URL Universal Resource Locator
301 USB Universal Serial Bus
302 USC United States Code
303 UTM Unified Threat Management
304 UUID Universally Unique Identifier
305 UX User Experience
306 VDI Virtual Desktop Infrastructure
307 VLR Visitor Location Register
308 VM Virtual Machine; Virtual Memory
309 VPC Virtual Private Cloud
310 VPN Virtual Private Network
311 VPS Virtual Private Server
312 VR Virtual Reality
313 WAF Web Application Firewall
314 WAN Wide Area Network
315 XDR Extended Detection & Response
316 XML Extensible MarkUp Language
317 XSRF Cross Site Request Forgery
318 XSS Cross Site Scripting
319 ZTA Zero Trust Architecture
320 ZTNA Zero Trust Network Access
321
322