A dictionary of cybersecurity solutions their naming conventions and abbreviations
Note: Some acronyms are not strictly cybersecurity but are related and essential in cybersecurity
Application Programming Interface
Advanced Threat Protection
Anti-Virus
Amazon Web Services commonly referred to as AWS, is a cloud computing service, it provides software as a service, platform as a service and infrastructure as a service
Tunneling all the traffic towards a gateway
Technology to identify and then block/allow Internet applications
Microsoft Azure, commonly referred to as Azure, is a cloud computing service, it provides software as a service, platform as a service and infrastructure as a service
Stands for Command and Control used by attackers to retain communications with compromised systems within a target network and submit commands for execution by the malware
Certification Authority
Cloud Access Security Broker
Common Event Format
A method to frequently deliver apps to customers by introducing automation into the stages of app development aka agile development. Specifically, CI/CD introduces ongoing automation and continuous monitoring throughout the lifecycle of apps, from integration and testing phases to delivery and deployment.
Cloud Security Posture Management is a process of continuous monitoring and improvement of the cloud system security.
Cloud Security Web Gateway
Bring your own device
Technology used to control the amount of traffic flowing between two network endpoints.
Service that runs a remote browser and provides streaming or "read-only" type of service for the end-user, such capability is isolating the user from any internet harm while browsing
Endpoint Detection and Response, is a technology used to detect malicious activity on the endpoints
Endpoint Protection Platform, most of the time refers to traditional Anti-Virus companies or NGAV vendors
A permission (allowed action) and a scope that allowed action applies to (e.g. read files in folder, start a VM in a specific project)
Dynamic Application Security Testing, demonstrates the attack and provides a proof of exploit for every risk uncovered
Domain Controller or Data Center
Data Leak Prevention — Technology to stop data exfiltration
Domain Name Service
Process of organizing data into categories that make it is easy to retrieve, sort and store for future use. A well-planned data classification system makes essential data easy to find and retrieve.
DoH stands for DNS over HTTPS and is a standard DNS protocol that uses HTTPS transport to keep the DNS exchange data protected from eavesdropping. Web browsers, like Mozilla's Firefox, Microsoft's Edge and Google's Chrome, all have the ability to use DoH with the goal of increasing data privacy and security for the users.
Google Cloud Platform, offered by Google, is a suite of cloud computing services that runs on the same infrastructure that Google uses internally for its end-user products
Host IDS Intrusion Detection System Governance, risk management and compliance (GRC) is the term covering an organization's approach across these three practices: Governance, Risk management, and Compliance.
Interactive Application Security Testing, analyzes code for security vulnerabilities while the app is run by an automated test, human tester, or any activity with the application functionality.
Identity Access Governance, the practice of managing access granted to identities
Identity and Access Management, a wide field covering things like IGA, SSO, PAM, MFA, IDM and others
Industrial Control Systems
Intrusion Detection System, technology used for detection of network threats, unable to prevent this threats but cable of sending alerts upon detection (passive)
Identity Governance and Administration, products used to govern and manage identities and their access (coarse or granular)
Integrnet Gateway
Industrial Internet of Things
Intrusion Prevention System, technology used for detection and prevention of network threats (active)
Internet Protocol Security — one of the technologies used for traffic encryption between peers
Infrastructure as a Service are mainly public cloud services, such as AWS,AZURE and GCP
Infrastructure as a Service
Internet of Medical Things
Internet of Things
Managed Detection and Response is a managed security service providing threat intelligence, from incident detection and response to incident monitoring and analysis
Multi-Factor Authentication
Manufacturer Usage Descriptions, a file containing YANG-based JSON that describes a Thing and associated suggested specific network behavior. RFC 8520
Software, designed to intentionally cause damage to a computer, server, client or computer network. A wide variety of Malware types exists, including computer viruses, worms, Trojan horses, ransomware, spyware, adware and more
Log Event Extended Format
Network access control is a method of enhancing the security of a private organizational network by restricting the availability of network resources to endpoint devices that comply with the organization’s security policy
Network Traffic Analysis/Network Behavior Analysis describe technologies that use rule based analysis tools, machine learning, or other tools for suspicions network activity detection.
Next Generation Anti Virus
Next-Generation Firewall (Application control, User-ID, Parallel traffic inspection)
Network Interface Card, Network Interface Controller, Network Adaptor
Network Operations Center, NOC is a central point for software distribution and updating, performance monitoring, coordination with affiliated networks, network troubleshooting, and router and domain name management.
Network Traffic Analysis/Network Behavior Analysis describe technologies that use rule based analysis tools, machine learning, or other tools for suspicions network activity detection.