- DoS (Denial of Service): Service interruption from bugs or vulnerabilities.
- DDoS (Distributed Denial of Service): A flood of traffic meant to overload resources and cause them to crash.
- CVE (Common Vulnerabilities and Exposures): A database of known vulnerabilities found in various open-market software.
- DNS (Domain Name Service): Is one of the Internet's backbone protocols for translating domain names to IP addresses.
- FQDN (Fully Qualified Domain Name): This is a friendly domain name for web services linked to an IP address.
- SSH (Secure Shell): An encrypted remote-control protocol for controlling servers and other network equipment.
- RCE (Remote Code Execution): An exploit allowing for execution of malicious code.
- XSS (Cross-Site Scripting): A web vulnerability allowing for the injection of malicious scripts.
- IDS (Intrusion Detection System): Background procedures monitoring an environment for anomalies in network traffic.
- IPS (Intrusion Prevention System): A system that proactively blocks and contains anomalies in network traffic.
- JWT (JSON Web Token): Tokens are sent to a web application for authentication and authorization.
- MitM (Man in the Middle): Interception of a web data transfer to eavesdrop on traffic.
- MFA (Multifactor Authentication): An added layer of authentication requirements to improve the protection of accounts.
- EPP (Endpoint Protection Platform): Infrastructure used to protect vulnerable endpoints such as smartphones or laptops.
- VPN (Virtual Private Network): A tunneling service that adds data encryption between a user endpoint and the internal network.
- AV (Antivirus): Software running on a server or user device that prevents malicious code from executing on the local machine.
- SOC (Security Operation Center): An enterprise team with a group of security analysts reviewing and investigating potential cyber-events.
- ZTNA (Zero-Trust Network Access): Is a methodology for improving security by always validating resource requests for authorized access.
- C2 (Command and Control): Malware used to remotely control a device and send data back to a central attacker-controlled server.
- IR (Incident Response): A process to contain, eradicate, and investigate a cyber-incident.
- TI (Threat Intelligence): The collection of information from various darknet locations and cleanest sources to better understand zero-day threats and the cybersecurity landscape.
- INFOSEC (Information Security): A general term for information security.
- IPSec (IP Security): A set of rules created to define how security and encryption perform over an IP network.
- NIST (National Institute of Standards and Technology): A US institute that creates best practices and methodologies for better data security.
- OPSEC (Operational Security): A general term used to refer to strategies for operational security.
- CISO (Chief Information Security Officer): Enterprise employee overseeing cybersecurity and data protection.
- Pen-Test (Penetration Testing): Finding corporate software and hardware vulnerabilities.
- SAST (Static Application Security Testing): Whitebox detection of finding vulnerabilities, usually done as developers create their code.
- DAST (Dynamic Application Security Testing): Blackbox testing deployed applications using scripts and methods like attackers.
- RFI (Remote File Inclusion): An exploit to add a malicious file for execution against a remote site.
- LFI (Local File Inclusion): An exploit in web applications to access sensitive files remotely.
- VLAN (Virtual Local Area Network): Virtual networks running on physical switches that could be misconfigured to allow unauthorized access.
- 0D (Zero-Day): A vulnerability or exploit unseen in the wild and often used to bypass security scanners.
- CI (Command Injection): Exploits such as SQL injection or LDAP injection are used to inject malicious commands into a server or application.
- LDAP (Lightweight Directory Access Protocol): A protocol to authenticate users to a directory of resources shared in a heterogeneous environment.
- NAT (Network Address Translation): Is a translation tool for turning private, unrouteable IP addresses into public addresses.
- CTF (Capture the Flag): A game played by hackers to improve their skills and compete with other experienced hackers.
- ACL (Access Control List): A list of rules to disallow or allow specific protocols or ports often used on a router.
- RAT (Remote Access Trojan): Malware installed on a targeted system allows an attacker to control or exfiltrate data.
- APT (Advanced Persistent Threat): Malware or exploits that can often bypass common security controls with backdoors to avoid complete eradication.
- RDP (Remote Desktop Protocol): A Microsoft Windows protocol that remotely controls a Windows-based server or desktop.
- HTTPS (Hypertext Transfer Protocol Secure): Is a secure way to transfer data between two devices using the HTTP protocol.
- CSP (Content Security Policy): Server headers limit executable code from loading on pages such as JavaScript or CSS.
- DLP (Data Loss Prevention): Methodologies and best practices for preventing data loss from cyber-risks and vulnerabilities.
- DRAAS (Disaster Recovery as a Service): Cloud-based services used to protect data from loss after downtime and application failure.
- SANS (SysAdmin, Audit, Network, and Security): An institution for training cybersecurity professionals and guiding best practices and policies.
- SSID (Service Set Identifier): An identification value broadcasted by Wi-Fi routers to offer user connections.
- PUP (Potentially Unwanted Program): Unwanted software is usually downloaded to a local device but causes malicious behavior, such as adware or spyware.
- DMARC (Domain-Based Message Authentication, Reporting, and Conformance): A set of rules and methods to validate email senders and stop spam.
- SPF (Sender Policy Framework): Is an email authentication protocol that helps prevent email spoofing, a common tactic in phishing and spam. SPF allows receiving mail servers to verify if incoming emails are sent from a domain authorized by that domain's administrator.
Click the image below to download the list of acronyms.