View Categories

List of IT Abbreviations

2

2FA – Two Factor Authentication

A

ABAC – Attribute Based Access Control
AC – Alternating Current
ACK – Acknowledgment
AD – Active Directory
AFP – Apple Filing Protocol
AI – Artificial Intelligence
AiTM – Adversary in The Middle
API – Application Programming Interface
APT – Advanced Persistent Threat
AR – Augmented Reality
ARP – Address Resolution Protocol
AS – Authentication Server
ASM – Attack Surface Management
ASR – Attack Surface Reduction
ATO – Account Takeover
ATP – Advanced Threat Protection
AWS – Amazon Web Service
AXIS2 – open source framework

B

BCP – Business Continuity Plan
BEC – Business Email Compromise
BI – Business Intelligence
BIA – Business Impact Analysis
BPMN – Business Process Model and Notation
BPMS – Business Process Management Systems
BYOD – Bring Your Own Device
BYOVD – Bring Your Own Vulnerable Driver

C

C2 – Command and Control
CA – Certificate Authority
CAF – Cyber Assessment Framework
CAPTCHA – Completely Automated Public Turing test to tell Computers and Humans Apart
CASB – Cloud Access Security Broker
CDN – Content Delivery Network
CDS – Common Data Service
CE – Customer Engagement
CI/CD – Continuous Integration/Continuous Delivery
CIS – Center for Internet Security
CLI – Command Line Interface
COBIT – Control Objectives for Information and Related Technologies
COBO – Company Owned/Business Only
COPE – Company Owned/Business Enabled
COSU – Company Owned/Single Use
CPC – Cost Per Click
CPU – Central Processing Unit
CRM – Customer Relationship Management
CRUD – Create, Read, Update, Delete
CSN – Corporate Social Network
CSOC – Cyber Security Operations Centre
CSPM – Cloud Security Posture Management
CTR – Click Through Rate
CYOD – Choose Your Own Device

D

DAS – Direct Attached Storage
DBMS – Database Management System
DC – Direct Current
DCS – Distributed Control System
DDoS – Distributed Denial of Service
DevOps – Software Development and IT Operations
DEX – Digital Employee Experience
DKIM – Domain Keys Identified Mail
DLP – Data Loss Prevention
DMARC – Domain based Message Authentication Reporting and Conformance
DMZ – Demilitarised Zone
DNS – Domain Name System
DOM – Document Object Model
DORA – DevOps Research and Assessment
DoS – Denial of Service
DPI – Deep Packet Inspection
DPO – Data Protection Officer
DR – Disaster Recovery
DRaaS – Disaster Recovery as a Service
DSL – Digital Subscriber Line
DSR – Data Subject Requests
DUP – Dell Update Package

E

EDA – Exploratory Data Analysis
EDR – Endpoint Detection and Response
EHR – Electronic Health Records
ELT – Extract, Load, Transform
EMM – Enterprise Mobile Management
EPP – Endpoint Protection Plan
ERP – Enterprise Resource Planning
ESG – Environmental, Social, Governance
ETL – Extract, Transform, Load
EUC – End User Computing

F

FC – Fibre Channel
FDE – Full Disk Encryption
FIDO2 – open authentication standard, Fast Identity Online
FIM – File Integrity Monitoring
FTP – File Transfer Protocol
FWaaS – FireWall as a Service

G

GA4 – Google Analytics 4
GB – Gigabyte
GCP – Google Cloud Platform
GDPR – General Data Protection Regulations
GPA – Group Policy Authorisation
GPT – Generative Pre-trained Transformer
GPU – Graphics Processing Unit
GraphQL – query language
GUI – Graphical User Interface

H

HaaS – Hardware as a Service
HDDs – Hard Disk Drives
HIDPS – Host Intrusion Detection and Prevention System
HIDS – Host Intrusion Detection System
HLD – High Level Design
HMI – Human Machine Interface
HPC – High Performance Computing
HTTP and HTTPS – Hyper Text Transfer Protocol/Secure

I

IaaS – Infrastructure as a Service
IaC – Infrastructure as Code
IAM – Identity and Access Management
ICMP – Internet Control Message Protocol
ICS – Industrial Control Systems
IDaaS – Identity as a Service
IDE – Integrated Development Environment
IdP – Identity Provider
IDPS – Intrusion Detection and Prevention System
IDR – Incident Detection and Response
IDS – Intrusion Detection System
IM – Instant Messaging
IoC – Indicators of Compromise
IoT – Internet of Things
IP – Internet Protocol
IPS – Intrusion Prevention System
IRP – Incident Response Plan
ISP – Incident Service Provider
ITIL – Information Technology Infrastructure Library
ITSM – Information Technology Service Manager

J

JSON – JavaScript Object Notation

K

KDC – Key Distribution Centre
KPI – Key Performance Indicators

L

LAN – Local Area Network
LLD – Low Level Design
LMS – Learning Management Systems
LUKS – Linux Unified Key Setup

M

MaaS – Malware as a Service
MAC – Media Access Control
macOS – operating system for Apple’s MAC computers
MAM – Mobile Application Management
MDM – Mobile Device Management
MFA – Multi Factor Authentication
MFP – Multifunction Printer
MITM – Man In The Middle
MITRE ATT&CK – Adversarial Tactics, Techniques, and Common Knowledge developed by the Mitre corporation
ML – Machine Learning
MPS – Managed Print Services
MSP – Managed Service Provider
MSSP – Managed Security Service Provider
MTTR – Mean Time To Recovery

N

NAND – Not And
NAS – Network Attached Storage
NCSC – National Cyber Security Centre
NFS – Network File System
NGAV – Next Generation Anti Virus
NGFWS – Next Generation Firewalls
NGP – Next Generation Protection
NIC – Network Interface Card
NIDPS – Network Intrusion Detection and Prevention System
NIDS – Network Intrusion Detection System
NIST – US government agency
NLP – Natural Language Processing
NOC – Network Operations Center
NTA – Network Traffic Analysis
NTLM – NT Lan Manager
NTP – Network Time Protocol

O

OS – Operating System
OSI – Open Systems Interconnection
OSINT – Open Source Intelligence
OTP – One Time Password

P

PaaS – Platform as a Service
PC – Personal Computer
PGP – Pretty Good Privacy
PII – Personally Identifiable Information
PIN – Personal Identification Number
PKI – Public Key Infrastructure
PLC – Programmable Logic Controller
PoE – Power over Ethernet
PPC – Pay Per Click
PSU – Power Supply Unit
PUPM – Per User Per Month

R

RaaS – Ransomware as a Service
RAID – Redundant Array of Independent Disks
RAM – Random Access Memory
RATs – Remote Access Trojans
RBAC – Role Based Access Control
RDBMS – Relational Database Management System
RDS – Relational Database Service
REST & RESTful – Representational State Transfer
RMF – Risk Management Framework
RPA – Robotic Process Automation
RPM – Revolutions Per Minute
RPO – Recovery Point Objective
RTO – Recovery Time Objective

S

S/MIME – Secure/Multipurpose Internet Mail Extensions
SaaS – Software as a Service
SAML – Security Assertion Markup Language
SAN – Storage Area Network
SASE – Secure Access Service Edge
SCADA – Supervisory Control and Data Acquisition
SD – Storage Device
SDN – Software Defined Networking
SD-WAN – Software-Defined Wide Area Network
SecOps – Security Operations
SEO – Search Engine Optimisation
SERP – Search Engine Results Page
SFA – Single Factor Authentication
SI – System Integration
SIEM – Security Information and Event Management
SIPOC – Suppliers, Inputs, Process, Outputs, and Customers
SLA – Service Level Agreement
SMB – Server Message Block
SMO – Service Managed Office
SMS – Short Message Service
SMTP – Simple Mail Transfer Protocol
SOAP – Simple Object Access Protocol
SOAR – Security, Orchestration, Automation and Response
SOC – Security Operations Centre
SOP – Standard Operating Procedure
SPF – Sender Policy Framework
SPs – Service Providers
SQL – Structured Query Language
SQLi – Structured Query Language injection
SSDs – Solid State Drives
SSL – Secure Sockets Layer
SSO – Single Sign On
SWG – Secure Web Gateway
SYN – Synchronise, a type of cyberattack

T

TCP & TCP/IP – Transmission Control Protocol/Internet Protocol
TDD – Test Driven Development
TGS – Ticket Granting Server
TGT – Ticket Granting Ticket
TLS – Transport Layer Security
TOR – The Onion Router
TOTP – Time-based One Time Password
TPM – Trusted Platform Module
TTL – Time To Live
TTP – Tactics, Techniques & Procedures

U

UAT – User Acceptance Testing
UDP – User Datagram Protocol
URI – Uniform Resource Identifier
URL – Uniform Resource Locator
USB – Universal Serial Bus
UX – User Experience

V

VDI – Virtual Desktop Interface
VLAN – Virtual Local Area Network
VM – Virtual Machine
VPC – Virtual Private Cloud
VPN – Virtual Private Network
VR – Virtual Reality

W

WAF – Web Application Firewall
WAN – Wide Area Network
WAP – Wireless Access Point
WLAN – Wireless Local Area Network
WPA3 – security protocol designed to protect WiFi networks
WSDL – Web Services Description Language

X

XDR – Extended Detection and Response
XML – Extensible Markup Language
XP – Extreme Programming
XSLT – Extensible Stylesheet Language Transformations
XSS – Cross Site Scripting

Z

ZTA – Zero Trust Architecture
ZTNA – Zero Trust Network Architecture

Get a free 30 minute IT consultation

We'd love to find out more about your IT...

Pick up the phone and call 0333 444 3455 today so we can discuss how we can help your business move forward. Our support Hotline is available 08:30 - 17:30 Monday - Friday

You can also reach us using the form here, Commercial Networks Ltd looks forward to becoming your preferred IT partner.

OFFICE LOCATIONS
Stoke on Trent
Newcastle Under Lyme
Falkirk
Manchester
Oswestry

© 2025 Commercial Networks LTD
Privacy Policy
Cookie Policy
Terms and Conditions