2
2FA – Two Factor Authentication
A
ABAC – Attribute Based Access Control
AC – Alternating Current
ACK – Acknowledgment
AD – Active Directory
AFP – Apple Filing Protocol
AI – Artificial Intelligence
AiTM – Adversary in The Middle
API – Application Programming Interface
APT – Advanced Persistent Threat
AR – Augmented Reality
ARP – Address Resolution Protocol
AS – Authentication Server
ASM – Attack Surface Management
ASR – Attack Surface Reduction
ATO – Account Takeover
ATP – Advanced Threat Protection
AWS – Amazon Web Service
AXIS2 – open source framework
C
C2 – Command and Control
CA – Certificate Authority
CAF – Cyber Assessment Framework
CAPTCHA – Completely Automated Public Turing test to tell Computers and Humans Apart
CASB – Cloud Access Security Broker
CDN – Content Delivery Network
CDS – Common Data Service
CE – Customer Engagement
CI/CD – Continuous Integration/Continuous Delivery
CIS – Center for Internet Security
CLI – Command Line Interface
COBIT – Control Objectives for Information and Related Technologies
COBO – Company Owned/Business Only
COPE – Company Owned/Business Enabled
COSU – Company Owned/Single Use
CPC – Cost Per Click
CPU – Central Processing Unit
CRM – Customer Relationship Management
CRUD – Create, Read, Update, Delete
CSN – Corporate Social Network
CSOC – Cyber Security Operations Centre
CSPM – Cloud Security Posture Management
CTR – Click Through Rate
CYOD – Choose Your Own Device
D
DAS – Direct Attached Storage
DBMS – Database Management System
DC – Direct Current
DCS – Distributed Control System
DDoS – Distributed Denial of Service
DevOps – Software Development and IT Operations
DEX – Digital Employee Experience
DKIM – Domain Keys Identified Mail
DLP – Data Loss Prevention
DMARC – Domain based Message Authentication Reporting and Conformance
DMZ – Demilitarised Zone
DNS – Domain Name System
DOM – Document Object Model
DORA – DevOps Research and Assessment
DoS – Denial of Service
DPI – Deep Packet Inspection
DPO – Data Protection Officer
DR – Disaster Recovery
DRaaS – Disaster Recovery as a Service
DSL – Digital Subscriber Line
DSR – Data Subject Requests
DUP – Dell Update Package
E
EDA – Exploratory Data Analysis
EDR – Endpoint Detection and Response
EHR – Electronic Health Records
ELT – Extract, Load, Transform
EMM – Enterprise Mobile Management
EPP – Endpoint Protection Plan
ERP – Enterprise Resource Planning
ESG – Environmental, Social, Governance
ETL – Extract, Transform, Load
EUC – End User Computing
I
IaaS – Infrastructure as a Service
IaC – Infrastructure as Code
IAM – Identity and Access Management
ICMP – Internet Control Message Protocol
ICS – Industrial Control Systems
IDaaS – Identity as a Service
IDE – Integrated Development Environment
IdP – Identity Provider
IDPS – Intrusion Detection and Prevention System
IDR – Incident Detection and Response
IDS – Intrusion Detection System
IM – Instant Messaging
IoC – Indicators of Compromise
IoT – Internet of Things
IP – Internet Protocol
IPS – Intrusion Prevention System
IRP – Incident Response Plan
ISP – Incident Service Provider
ITIL – Information Technology Infrastructure Library
ITSM – Information Technology Service Manager
J
JSON – JavaScript Object Notation
M
MaaS – Malware as a Service
MAC – Media Access Control
macOS – operating system for Apple’s MAC computers
MAM – Mobile Application Management
MDM – Mobile Device Management
MFA – Multi Factor Authentication
MFP – Multifunction Printer
MITM – Man In The Middle
MITRE ATT&CK – Adversarial Tactics, Techniques, and Common Knowledge developed by the Mitre corporation
ML – Machine Learning
MPS – Managed Print Services
MSP – Managed Service Provider
MSSP – Managed Security Service Provider
MTTR – Mean Time To Recovery
N
NAND – Not And
NAS – Network Attached Storage
NCSC – National Cyber Security Centre
NFS – Network File System
NGAV – Next Generation Anti Virus
NGFWS – Next Generation Firewalls
NGP – Next Generation Protection
NIC – Network Interface Card
NIDPS – Network Intrusion Detection and Prevention System
NIDS – Network Intrusion Detection System
NIST – US government agency
NLP – Natural Language Processing
NOC – Network Operations Center
NTA – Network Traffic Analysis
NTLM – NT Lan Manager
NTP – Network Time Protocol
P
PaaS – Platform as a Service
PC – Personal Computer
PGP – Pretty Good Privacy
PII – Personally Identifiable Information
PIN – Personal Identification Number
PKI – Public Key Infrastructure
PLC – Programmable Logic Controller
PoE – Power over Ethernet
PPC – Pay Per Click
PSU – Power Supply Unit
PUPM – Per User Per Month
R
RaaS – Ransomware as a Service
RAID – Redundant Array of Independent Disks
RAM – Random Access Memory
RATs – Remote Access Trojans
RBAC – Role Based Access Control
RDBMS – Relational Database Management System
RDS – Relational Database Service
REST & RESTful – Representational State Transfer
RMF – Risk Management Framework
RPA – Robotic Process Automation
RPM – Revolutions Per Minute
RPO – Recovery Point Objective
RTO – Recovery Time Objective
S
S/MIME – Secure/Multipurpose Internet Mail Extensions
SaaS – Software as a Service
SAML – Security Assertion Markup Language
SAN – Storage Area Network
SASE – Secure Access Service Edge
SCADA – Supervisory Control and Data Acquisition
SD – Storage Device
SDN – Software Defined Networking
SD-WAN – Software-Defined Wide Area Network
SecOps – Security Operations
SEO – Search Engine Optimisation
SERP – Search Engine Results Page
SFA – Single Factor Authentication
SI – System Integration
SIEM – Security Information and Event Management
SIPOC – Suppliers, Inputs, Process, Outputs, and Customers
SLA – Service Level Agreement
SMB – Server Message Block
SMO – Service Managed Office
SMS – Short Message Service
SMTP – Simple Mail Transfer Protocol
SOAP – Simple Object Access Protocol
SOAR – Security, Orchestration, Automation and Response
SOC – Security Operations Centre
SOP – Standard Operating Procedure
SPF – Sender Policy Framework
SPs – Service Providers
SQL – Structured Query Language
SQLi – Structured Query Language injection
SSDs – Solid State Drives
SSL – Secure Sockets Layer
SSO – Single Sign On
SWG – Secure Web Gateway
SYN – Synchronise, a type of cyberattack
T