| Acronyms |
Computing
Terminology & Cyber Threat Intelligence NOTE: As in any dictionary this
list is a continual work in progress |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Return to Main |
320 acronyms as of December 2023 |
https://csrc.nist.gov/glossary |
|
| 1 |
3G, 4G, 5G |
Third, Fourth, Fifth, etc
Generation |
|
|
Authentication |
|
| 2 |
2LD, 3LD |
Second, Third etc Level
Domain of DNS |
|
|
Cyber Threat
Intelligence acronymns most relevant & peculiar see also
https://socradar.io/cti-glossary/ |
|
| 3 |
AAS |
As A Service; bunch of xAAs where x may be S (software) D
(desktop) I (infrastructure) P (Platform) , F
(Firewall) etc |
This Page |
NIST |
|
0-day |
Zero Day |
|
OTP |
|
| 4 |
ABI |
Application Binary Interface
also see Embedded ABI (EABI) |
|
|
|
SSO |
|
| 5 |
ARP |
Address Resolution Protocol |
A |
A |
|
ACL |
Access Control List |
|
AD |
|
| 6 |
ASP |
Active Server Pages |
B |
B |
|
AD |
Active Directory |
|
RADIUS |
|
| 7 |
ACL |
Access Control List |
C |
C |
|
|
APT |
Advanced Persistent Threat |
|
LDAP |
|
| 8 |
AD |
Active Directory or Analog/Digital |
D |
D |
|
C2 or CC |
Command & Control |
|
API |
|
| 9 |
AML |
Anti Money Laundering |
E |
E |
|
CERT |
Computer Emergency Response Team |
|
SCIM |
System for Cross-domain Identity
Management |
| 10 |
API |
Application Programming Interface - Source code level |
F |
F |
|
CIC |
Command Information Center |
|
IDaM |
Identiy & Access Management |
|
| 11 |
APK |
Android Package Kit |
G |
G |
|
CIRT |
Computer Incident Response Team |
|
TLS |
|
| 12 |
APPX |
Application Package Extension - File extension for package Microsoft
appications ready to install |
H |
H |
|
CM |
Continuous Monitorin |
|
SSL |
|
| 13 |
APT |
Advanced Persistent Threat |
I |
I |
|
CMF |
Collection Management Framework |
|
AWS |
|
| 14 |
ARM |
Advanced RISC Machine |
J |
J |
|
CNAa |
Computer Network Attack |
|
EC2 |
|
| 15 |
ASIC |
Application Specific Interated Circuit |
K |
K |
|
CND |
Computer Network Defence |
|
SQL |
|
| 16 |
ASLR |
Address Space Location Randomization |
L |
L |
|
CNE |
Computer Network Exploitation |
|
VM |
Virtual Machine |
|
| 17 |
ASN |
Autonomous System Numbers |
|
|
|
COA |
Courses Of Action |
|
OAM |
Oracle Access Manager |
|
| 18 |
ASP |
Active Server Pages & ASPX (extended) |
M |
M |
|
CTA |
Cyber Threat Analyst |
|
OAM |
Operations Administration &
Maintenance |
| 19 |
ASR |
Attack Surface Reduction |
N |
N |
|
CTI |
Cyber Threat Intelligence |
|
OAM |
Open Application Model |
|
| 20 |
AV |
Anti-Virus |
O |
O |
|
CVE |
Common Vulnerabilities &
Exposures |
|
OAM |
Object Access Method |
|
| 21 |
AWS |
Amazon Web Services |
|
|
|
DNS |
Domain Name Service |
|
OAM |
Officially Appointed Mechnaism |
|
| 22 |
BGP |
Border Gateway Protocol |
P |
P |
|
DOX |
Doxing -searching for OSINT,
typically for malicious intent; revealing private info |
|
OAM |
OCP (Open Compute Project)
Accelerator Module |
| 23 |
BIOS |
Basic Input-Output System |
Q |
Q |
|
EDR |
Endpoint Detection & Response |
|
| 24 |
BIN |
Bank Identification Number |
R |
R |
|
ETW |
Event Tracing for Windows |
|
| 25 |
BLOB |
Binary Large Object |
S |
S |
|
FW |
FireWall |
|
| 26 |
BNF |
Backus-Naur Form |
|
|
|
GEOINT |
Geospatial Intelligence |
|
| 27 |
BOLO |
Be On Look Out (law enforcement term) |
T |
T |
|
HUMINT |
Human Intelligence |
|
| 28 |
BRT |
Breach Response Team |
U |
U |
|
IC |
Intelligence Community |
|
| 29 |
BS |
Base Station |
|
|
|
IDS |
Intrusion Detection System |
|
| 30 |
BT |
BitTorrent (file sharing protocol) |
V |
V |
|
IPS |
Intrusion Prevention System |
|
| 31 |
BTS |
Base Transceiver Stations |
|
|
|
IOA |
Indicators of Attack |
|
| 32 |
BYOD |
Bring Your Own Device |
W |
W |
|
IOB |
Indicators of Behavior |
|
| 33 |
C2 |
Command and Control |
X |
X |
|
IOC |
Indicators Of Compromise |
|
| 34 |
CA |
Certificate or Certifying Authority |
|
|
|
IPS |
Intrusion Prevention System |
|
| 35 |
CAPEC |
Common Attack Pattern Enumeration & Classification |
Y |
Y |
|
IR |
Incident Response |
|
| 36 |
CASB |
Cloud Access Security Broker |
|
|
|
MASINT |
Measurement and Signature
Intelligence |
|
| 37 |
CC |
Command & Control |
Z |
Z |
|
MDR |
Management Detection & Response |
|
| 38 |
CCI |
Control Correlation Identifiers |
|
MI |
Military Intellignce |
|
| 39 |
CASB |
Cloud Access Security Broker |
|
|
|
MISP |
Malware Information Sharing Platform |
|
| 40 |
CDM |
Continuing Diagnostics Mitigtion; Code Division Multiplexor |
|
OPSEC |
Operational Security |
|
| 41 |
CDN |
Content Delivery Network caches
content near users |
|
OSINT |
Open Source Intelligence |
|
| 42 |
CERT |
Computer Emergency Response Team |
|
OSSEM |
Open Source Security Events MetaData |
|
| 43 |
CI/CD |
Continuous Integration / Continuous Delivery - application updating |
|
RCE |
Remote Code Execution |
|
| 44 |
CIDR |
Classless Internet Domain Routing |
|
RDP |
Remote Desktop Protocol |
|
| 45 |
CIRT |
Computer Incident Response Team |
|
SA |
Situational Awareness |
|
| 46 |
CISC |
Complex Instruction Set Computing |
|
SIEM |
Security Information & Event
Management |
|
| 47 |
CISO |
Chief Information Security Officer |
|
SIGINT |
Signals Intelligence |
|
| 48 |
CL |
Command Line |
|
SOC |
Security Operations Center |
|
| 49 |
CLI |
Command Line Interface |
|
SOCMINT |
Social Media Intelligence |
|
| 50 |
CLM |
Constrained Language Mode (Powershell) |
|
STIX-TAXII |
Structured Incident Expression |
|
| 51 |
CLSID |
Class ID |
|
TaHiTI |
Targeted Hunting Integrationof
Threat Intelligence |
|
| 52 |
CM |
Continuous Monitoring |
|
TIP |
Threat Intelligence Platform |
|
| 53 |
CnC |
Command and Control |
|
TLP |
Traffic Light Protocol |
|
| 54 |
CND |
Computer Network Defense |
|
TOR |
The Onion Router |
|
| 55 |
CNE |
Computer Network Exploitation |
|
TTP |
Tactics, Techniques & Procedures |
|
| 56 |
CNN |
Combinatorial Neural Network |
|
UBA |
User Behavior Analytics |
|
| 57 |
CNP |
Card Not Present (credit card transaction) |
|
XDR |
Extensible Detection & Response |
|
|
|
| 58 |
COA |
Course of Action |
|
CISA |
Cybersecurity and
Infrastructure Security Agency |
|
| 59 |
COM |
Common Object Model; Communications |
|
NIST |
National Institute of Standards
& Technology |
|
| 60 |
COMSEC |
Communications Security |
|
| 61 |
CONOPS |
Concept of Operations |
|
| 62 |
COTS |
Commercial Off the Shelf |
|
| 63 |
CPT |
Cyber Protection Team |
|
| 64 |
CPU |
Central Processing Unit |
|
| 65 |
CSIRT |
Computer Security Incident Response Team |
|
| 66 |
CSP |
Cloud Service Provider |
|
| 67 |
CSS |
Cross-Site Scripting or Cascading Style Sheets |
|
| 68 |
CSU/DSU |
Channel Service Unit / Data Service Unit |
|
| 69 |
CSV |
Comma Separated Value |
|
| 70 |
CTA |
Cyber Threat Analyst |
|
| 71 |
CTF |
Capture The Flag |
|
| 72 |
CTI |
Cyber Threat Intelligence |
|
| 73 |
CUI |
Controlled Unclassified Information |
|
| 74 |
CVE |
Common Vulnerabilites and Exposures |
|
| 75 |
CVSS |
Common Vulnerability Scoring System |
|
| 76 |
CVV |
Card Verification Value also known as CVN (number) or CVC (code) |
|
| 77 |
CWE |
Common Weakness Enumeration |
|
| 78 |
DAAS |
Data As A Service or Desktop As A Service |
|
| 79 |
DB |
Database |
|
| 80 |
DCOM |
Distributed Component Object Model |
|
| 81 |
DDE |
Dynamic Data Exchange |
|
| 82 |
DDOS |
Distributed Denial Of Service |
|
| 83 |
DDR |
Double Data Rate; see also GDDR |
|
| 84 |
DEP |
Data Execution Prevention |
|
| 85 |
DGA |
Domain Generation Algorithm |
|
| 86 |
DHCP |
Dynamic Host Configuration Protocol |
|
| 87 |
DLL |
Dynamic Link Library |
|
| 88 |
DLP |
Data Loss Prevention |
|
| 89 |
DKIM |
DomainKeys Identified Mail - IETF Std 7372 |
|
| 90 |
DMA |
Direct Memory Access |
|
| 91 |
DMARC |
Domain-based Message Authentication, Reporting and
Conformance IETF 7489 |
|
| 92 |
DNI |
Digital Network Intellgence |
|
| 93 |
DNR |
Dialed Number Recognition |
|
| 94 |
DNS |
Domain Name Service |
|
| 95 |
DNSSEC |
Domain Name Security Security |
|
| 96 |
DOM |
Document Object Model |
|
| 97 |
DOS |
Denial Of Service |
|
| 98 |
DOX |
Short for Doxing or searching for OSINT |
|
| 99 |
DPI |
Deep Packet Inspection |
|
| 100 |
DTE |
Data Terminal Equipment |
|
| 101 |
EDR |
Endpoint Detection & Response |
|
| 102 |
eFuse |
Electronic Fuse |
|
| 103 |
ELF |
Execute & Link Format |
|
| 104 |
ETH |
Ethernet |
|
| 105 |
ETL |
Extract Transform Load |
|
| 106 |
ETW |
Event Tracing for Windows |
|
| 107 |
EV SSL |
Extended Validation Secure Sockets Layer |
|
| 108 |
EXE |
Executable |
|
| 109 |
FDDI |
Fiber Distributed Data Interface |
|
| 110 |
FF |
Fast Flux |
|
| 111 |
FOUO |
For Official Use Only |
|
| 112 |
FPGA |
Field Processor Gate Array |
|
| 113 |
FPOC |
Field Point Of Connection |
|
| 114 |
FTP |
File Transfer Protocol |
|
| 115 |
FQDN |
Fully Qualified Domain Name |
|
| 116 |
FW |
Firewall |
|
| 117 |
FWaaS |
FireWall as a Service |
|
| 118 |
Gb |
GigaByte |
|
| 119 |
GCID |
Global Cell ID |
|
| 120 |
GDDR |
Graphics Double Data Rate |
|
| 121 |
GEOINT |
Geospatial Intelligence |
|
| 122 |
GHZ |
GigaHertz |
|
| 123 |
GPO |
Group Policy Orchestrator |
|
| 124 |
GRC |
Governance Risk & Compliance |
|
| 125 |
GSM |
Global System for Mobile Communications |
|
| 126 |
GUI |
Graphical User Interface |
|
| 127 |
GUID |
Global Identifier |
|
| 128 |
HMAC |
Hash-based Message Authentication Code |
|
| 129 |
HSM |
Hardware Security Module |
|
| 130 |
HTML |
HyperText Markup Language |
|
| 131 |
HTTP |
HyperText Transport Protocol |
|
| 132 |
HUMINT |
Human Intelligence |
|
| 133 |
HV |
HyperVisor |
|
| 134 |
HW |
Hardware |
|
| 135 |
HZ |
Hertz - Cycles per Second |
|
| 136 |
IAAS |
Infrastructure As A Service |
|
| 137 |
IAM |
Identity & Access Management |
|
| 138 |
IARPA |
Intelligence Research Projects Agency |
|
| 139 |
IC |
Intelligence Community or Integrated Circuit |
|
| 140 |
ICMP |
Internet Control Message Protocol |
|
| 141 |
ICS |
Industrial Control System |
|
| 142 |
ICT |
Information and Communication Technology |
|
| 143 |
IDAM |
IDentity & Access Management |
|
| 144 |
IDE |
Integrated Development Environment |
|
| 145 |
IDS |
Intrusion Detection System |
|
| 146 |
IETF |
Internet Engineering Task Force |
|
| 147 |
IMAP |
Internet Message Protocol |
|
| 148 |
IMINT |
Image Intelligence |
|
| 149 |
IO |
Input Output |
|
| 150 |
IOA |
Indicators of Attack |
|
| 151 |
IOB |
Indicators of Behavior |
|
| 152 |
IOC |
Indicators of Compromise |
|
| 153 |
IP |
Internet Protocol |
|
| 154 |
IPS |
Intrusion Prevention System |
|
| 155 |
IR |
Incident Response |
|
| 156 |
IRC |
Inter Relay Chat |
|
| 157 |
IRL |
In Real Life |
|
| 158 |
ISO |
International Standards Organization |
|
| 159 |
ISP |
Internet Service Provider |
|
| 160 |
ITAM |
Information Technology Asset Management |
|
| 161 |
ISAC |
Information Security & Analysis Center |
|
| 162 |
JIE |
Joint Information Environment |
|
| 163 |
JS |
JAVAScript |
|
| 164 |
JSON |
JAVAScript Object Notation |
|
| 165 |
Kb |
KiloByte (1024 bits) |
|
| 166 |
KYC |
Know Your Customer |
|
| 167 |
LAC LAI |
Location Area Code, Location Area Identifier |
|
| 168 |
LAN |
Local Area Network |
|
| 169 |
LDAP |
Lightweight Directory Access Protocol |
|
| 170 |
LE |
Law Enforcement |
|
| 171 |
MA |
Mission Assurance |
|
| 172 |
MAC |
Media Access Control or Message Authentication Code |
|
| 173 |
MASINT |
Measurement And Signature Intelligence |
|
| 174 |
MB |
MegaByte or MotherBoard |
|
| 175 |
MBR |
Master Boot Record |
|
| 176 |
MDR |
Managed Detection & Response |
|
| 177 |
MFA |
Multi Factor Authentication |
|
| 178 |
MHz |
MegaHertz |
|
| 179 |
MI |
Military Intelligence |
|
| 180 |
ML |
Machine Learning |
|
| 181 |
MOE |
Measures of Effectiveness |
|
| 182 |
MOP |
Measures of Performance |
|
| 183 |
MOU |
Memorandum of Understanding |
|
| 184 |
MPLS |
Multi-Protocol Label Switching |
|
| 185 |
MRU |
Most Recent Used |
|
| 186 |
MSCCM |
Microsoft System Center Configuration Manager |
|
| 187 |
MSSP |
Managed Security Services, MSS Provider |
|
| 188 |
MTA |
Mail Transfer Agent |
|
| 189 |
NAC |
Network Access Control |
|
| 190 |
NAT |
Network Address Translation |
|
| 191 |
NPM |
Node Package Manager - code packages |
|
| 192 |
NTLM |
Windows NT (an Operating System) Lan Manager |
|
| 193 |
NTP |
Network Time Protocol |
|
| 194 |
NVD |
National Vulnerability Database |
|
| 195 |
OAuth |
Open Authentication |
|
| 196 |
ON |
Optical Network |
|
| 197 |
OPSEC |
Operations Security |
|
| 198 |
OSI |
Open Systems Interconnect |
|
| 199 |
OSINT |
Open Source Intelligence |
|
| 200 |
OS |
Operating System |
|
| 201 |
OT |
Operational Technology - control systems controllers, sensors, &
actuators |
|
| 202 |
OTN |
Optical Transport Network |
|
| 203 |
OTP |
One Time Password |
|
| 204 |
P2P |
Point to Point Protocol |
|
| 205 |
PAAS |
Platform As A Service |
|
| 206 |
PAT |
Port Address Translation |
|
| 207 |
PCAP |
Packet Capture |
|
| 208 |
PCI |
Peripheral Component Interface or Payment Card Industry |
|
| 209 |
PE |
Portable Executable |
|
| 210 |
PID |
Program IDentifier |
|
| 211 |
PII |
Personal Identifiable Information (name, address, SSN, etc) |
|
| 212 |
PLC |
Programmable Logic Controller |
|
| 213 |
POC |
Point of Connection; or PoC Proof of Concept |
|
| 214 |
POI(s) |
Person(s) of Interest |
|
| 215 |
POP |
Post Office Protocol |
|
| 216 |
PPP |
Point to Point Protocol |
|
| 217 |
PS |
PowerShell |
|
| 218 |
PtH |
Pass the Hash |
|
| 219 |
PnP |
Plug and Play |
|
| 220 |
PUA |
Potentially Unwanted Application |
|
| 221 |
PUP |
Potentially Unwanted Program |
|
| 222 |
QOS |
Quality Of Service |
|
| 223 |
RADIUS |
Remote Authentication Dial In User Service |
|
| 224 |
RAM |
Random Access Memeory |
|
| 225 |
RAN |
Radio Access Network (ususlly applied to cellular networks) |
|
| 226 |
RCE |
Remote Code Execution |
|
| 227 |
RDP |
Remote Desktop Protocol |
|
| 228 |
REST |
Representational State Transfer; an API between Internet Client-Server |
|
| 229 |
RFC |
Request For Comment |
|
| 230 |
RISC |
Reduced Instruction Set Computing |
|
| 231 |
RMF |
Risk Management Framework |
|
| 232 |
RMON |
Remote Monitor |
|
| 233 |
ROC |
Remote or Regional Operations Center |
|
| 234 |
ROM |
Read Only Memory |
|
| 235 |
ROP |
Return Oriented Programming |
|
| 236 |
RPC |
Remote Procedure Call |
|
| 237 |
RPKI |
Resource Public Key Infrastructure |
|
| 238 |
RSA |
Rivest Shamir Adleman |
|
| 239 |
SAAS |
Software As A Service |
|
| 240 |
SAM |
Security Access Manager |
|
| 241 |
SAML |
Security Assertion Markup Language |
|
| 242 |
SAN |
Storage Area Network |
|
| 243 |
SASE |
Secure Access Service Edge |
https://en.wikipedia.org/wiki/Secure_Access_Service_Edge |
|
| 244 |
SBGP |
Security in Border Gateway Protocol |
|
|
| 245 |
SBOM |
Software Bill of Materials |
|
|
| 246 |
SCADA |
Supervisory Control and Data Acquisition |
|
|
| 247 |
SCAP |
Security Content Automation Protocol |
|
| 248 |
SCCM |
System Center Configuration Manager (SCCM) - Microsoft |
|
| 249 |
SD |
Software Defined or Systems Development or Security Descriptor |
|
| 250 |
SDK |
System Development Kit |
|
| 251 |
SDLC |
Systems Development Life Cycle |
|
| 252 |
SDN |
Software Defined Networking |
|
| 253 |
SDR |
Software Defined Radio |
|
| 254 |
SDRAM |
Sychronous Dynamic Random Access Memory |
|
| 255 |
SDWAN |
Software Defined Wide Area Network |
|
| 256 |
SE |
Software Engineering |
|
| 257 |
SIEM |
Security Information & Event Management |
|
| 258 |
SIGINT |
Signals Intelligence |
|
| 259 |
SIP |
Session Initiation Protocol |
|
| 260 |
SLA |
Service Level Agreement |
|
| 261 |
SMB |
Server Message Block |
|
| 262 |
SMS |
Systems Management Server - renamed
to Microsoft System Center Configuration Manager (MSCCM) |
|
| 263 |
SMS |
Short Message Service |
|
| 264 |
SMTP |
Simple Mail Transport Protocol |
|
| 265 |
SNA |
Social Network Analysis |
|
| 266 |
SNMP |
Simple Network Management Protocol |
|
| 267 |
SOAP |
Simple Object Access Protocol |
|
| 268 |
SOAR |
Security Orchestration Automation & Response |
|
| 269 |
SOC |
Security Operations Center or System On a Chip |
|
| 270 |
SPOF |
Single Point of Failure |
|
| 271 |
SPF |
Sender Policy Framework - Authentication STD IETF 7208 |
|
| 272 |
SQL |
Structured Query Language |
|
| 273 |
SSH |
Secure Shell |
|
| 274 |
SSL |
Secure Sockets Layer see also EV SSL |
|
| 275 |
SSO |
Single Sign On |
|
| 276 |
STIX |
Structure Threat Information eXpression |
|
| 277 |
STS |
Security Token Service |
|
| 278 |
SW |
Software |
|
| 279 |
SWF |
Shockwave Flash File |
|
| 280 |
SWG |
Secure Web Gateway |
|
| 281 |
TAXII |
Trusted Automated eXchange of Indicator Information |
|
| 282 |
TCP |
Transmission Control Protocol |
|
| 283 |
Tb |
TerraByte |
|
| 284 |
TELCO |
Telephone Company |
|
| 285 |
TLD |
Top Level Domain |
|
| 286 |
TLP |
Traffic Light Protocol |
|
| 287 |
TLS |
Transport Layer Security |
|
| 288 |
TPM |
Trusted Platform Module |
|
| 289 |
TTI |
Technical Threat Intelligence |
|
| 290 |
TTL |
Time to Live |
|
| 291 |
TTP |
Tactics, Techniques & Procedures |
|
| 292 |
U2F |
Universal 2nd Factor |
|
| 293 |
UAC |
User Account Control |
|
| 294 |
UBA |
User Behavior Analytics |
|
| 295 |
UDP |
User Datagram Protocol |
|
| 296 |
UEFI |
Unified Extensible Firmware Interface |
|
| 297 |
UI |
User Interface |
|
| 298 |
UID |
User ID |
|
| 299 |
uPnP |
Univeral Plug and Play |
|
| 300 |
URL |
Universal Resource Locator |
|
| 301 |
USB |
Universal Serial Bus |
|
| 302 |
USC |
United States Code |
|
| 303 |
UTM |
Unified Threat Management |
|
| 304 |
UUID |
Universally Unique Identifier |
|
| 305 |
UX |
User Experience |
|
| 306 |
VDI |
Virtual Desktop Infrastructure |
|
| 307 |
VLR |
Visitor Location Register |
|
| 308 |
VM |
Virtual Machine; Virtual Memory |
|
| 309 |
VPC |
Virtual Private Cloud |
|
| 310 |
VPN |
Virtual Private Network |
|
| 311 |
VPS |
Virtual Private Server |
|
| 312 |
VR |
Virtual Reality |
|
| 313 |
WAF |
Web Application Firewall |
|
| 314 |
WAN |
Wide Area Network |
|
| 315 |
XDR |
Extended Detection & Response |
|
| 316 |
XML |
Extensible MarkUp Language |
|
| 317 |
XSRF |
Cross Site Request Forgery |
|
| 318 |
XSS |
Cross Site Scripting |
|
| 319 |
ZTA |
Zero Trust Architecture |
|
| 320 |
ZTNA |
Zero Trust Network Access |
|
| 321 |
|
| 322 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|