Cyber Security Abbreviations 0 0

A dictionary of cybersecurity solutions their naming conventions and abbreviations

Note: Some acronyms are not strictly cybersecurity but are related and essential in cybersecurity

A

API

Application Programming Interface

ATP

Advanced Threat Protection

AV

Anti-Virus

AWS

Amazon Web Services commonly referred to as AWS, is a cloud computing service, it provides software as a service, platform as a service and infrastructure as a service

Always On

Tunneling all the traffic towards a gateway

Application Control

Technology to identify and then block/allow Internet applications

Azure

Microsoft Azure, commonly referred to as Azure, is a cloud computing service, it provides software as a service, platform as a service and infrastructure as a service

C

C2

Stands for Command and Control used by attackers to retain communications with compromised systems within a target network and submit commands for execution by the malware

CA

Certification Authority

CASB

Cloud Access Security Broker

CEF

Common Event Format

CI/CD

A method to frequently deliver apps to customers by introducing automation into the stages of app development aka agile development. Specifically, CI/CD introduces ongoing automation and continuous monitoring throughout the lifecycle of apps, from integration and testing phases to delivery and deployment.

CSPM

Cloud Security Posture Management is a process of continuous monitoring and improvement of the cloud system security.

CSWG

Cloud Security Web Gateway

B

BYOD

Bring your own device

Bandwidth shaping

Technology used to control the amount of traffic flowing between two network endpoints.

Browser Isolation

Service that runs a remote browser and provides streaming or "read-only" type of service for the end-user, such capability is isolating the user from any internet harm while browsing

E

EDR

Endpoint Detection and Response, is a technology used to detect malicious activity on the endpoints

EPP

Endpoint Protection Platform, most of the time refers to traditional Anti-Virus companies or NGAV vendors

Entitlement (IAM)

A permission (allowed action) and a scope that allowed action applies to (e.g. read files in folder, start a VM in a specific project)

D

DAST

Dynamic Application Security Testing, demonstrates the attack and provides a proof of exploit for every risk uncovered

DC

Domain Controller or Data Center

DLP

Data Leak Prevention — Technology to stop data exfiltration

DNS

Domain Name Service

Data Classification

Process of organizing data into categories that make it is easy to retrieve, sort and store for future use. A well-planned data classification system makes essential data easy to find and retrieve.

DoH

DoH stands for DNS over HTTPS and is a standard DNS protocol that uses HTTPS transport to keep the DNS exchange data protected from eavesdropping. Web browsers, like Mozilla's Firefox, Microsoft's Edge and Google's Chrome, all have the ability to use DoH with the goal of increasing data privacy and security for the users.

G

GCP

Google Cloud Platform, offered by Google, is a suite of cloud computing services that runs on the same infrastructure that Google uses internally for its end-user products

GRC

H

HIDS

Host IDS Intrusion Detection System Governance, risk management and compliance (GRC) is the term covering an organization's approach across these three practices: Governance, Risk management, and Compliance.

I

IAST

Interactive Application Security Testing, analyzes code for security vulnerabilities while the app is run by an automated test, human tester, or any activity with the application functionality.

IAG

Identity Access Governance, the practice of managing access granted to identities

IAM

Identity and Access Management, a wide field covering things like IGA, SSO, PAM, MFA, IDM and others

ICS

Industrial Control Systems

IDS

Intrusion Detection System, technology used for detection of network threats, unable to prevent this threats but cable of sending alerts upon detection (passive)

IGA

Identity Governance and Administration, products used to govern and manage identities and their access (coarse or granular)

IGW

Integrnet Gateway

IIoT

Industrial Internet of Things

IPS

Intrusion Prevention System, technology used for detection and prevention of network threats (active)

IPSEC

Internet Protocol Security — one of the technologies used for traffic encryption between peers

IaaS

Infrastructure as a Service are mainly public cloud services, such as AWS,AZURE and GCP

IaaS

Infrastructure as a Service

IoMT

Internet of Medical Things

IoT

Internet of Things

M

MDR

Managed Detection and Response is a managed security service providing threat intelligence, from incident detection and response to incident monitoring and analysis

MFA

Multi-Factor Authentication

MUD

Manufacturer Usage Descriptions, a file containing YANG-based JSON that describes a Thing and associated suggested specific network behavior. RFC 8520

Malware

Software, designed to intentionally cause damage to a computer, server, client or computer network. A wide variety of Malware types exists, including computer viruses, worms, Trojan horses, ransomware, spyware, adware and more

L

LEEF

Log Event Extended Format

N

NAC

Network access control is a method of enhancing the security of a private organizational network by restricting the availability of network resources to endpoint devices that comply with the organization’s security policy

NBA

Network Traffic Analysis/Network Behavior Analysis describe technologies that use rule based analysis tools, machine learning, or other tools for suspicions network activity detection.

NGAV

Next Generation Anti Virus

NGFW

Next-Generation Firewall (Application control, User-ID, Parallel traffic inspection)

NIC

Network Interface Card, Network Interface Controller, Network Adaptor

NOC

Network Operations Center, NOC is a central point for software distribution and updating, performance monitoring, coordination with affiliated networks, network troubleshooting, and router and domain name management.

NTA

Network Traffic Analysis/Network Behavior Analysis describe technologies that use rule based analysis tools, machine learning, or other tools for suspicions network activity detection.

NIDS

** The time is base on America/Chicago timezone