For the complete documentation index, see /llms.txt. Markdown version of this page: /en/insights/dictionary.md.
Insights

Cyber Dictionary

A reference for the terms, acronyms, and frameworks we use every day in security work — from MDR to NIS2.

219 entries

#

  • 2FA Two-Factor Authentication

    Authentication that requires two distinct verification factors before granting access.

  • 3DES Triple Data Encryption Standard

    Symmetric block cipher that applies DES three times to each data block; now considered legacy.

A

  • ABAC Attribute-Based Access Control

    Authorisation model that grants access based on attributes of the user, resource, and environment.

  • AD Active Directory

    Microsoft's directory service for managing identities, devices, and policies in Windows networks.

  • AES Advanced Encryption Standard

    Symmetric block cipher standardised by NIST and used worldwide for protecting sensitive data.

  • AGI Artificial General Intelligence

    Hypothetical AI that can perform any cognitive task a human can.

  • AI Artificial Intelligence

    Computer systems that perform tasks normally requiring human intelligence.

  • AIDR AI Detection and Response

    Vendor category for detecting and responding to threats targeting AI systems and agents.

  • AISPM AI Security Posture Management

    Continuous discovery, assessment, and prioritisation of risk across an organisation's AI footprint.

  • AML Anti-Money Laundering

    Regulatory regime requiring institutions to detect and report suspicious financial transactions.

  • API Application Programming Interface

    A defined contract that lets software systems exchange data and invoke functions.

  • APT Advanced Persistent Threat

    A sophisticated, often state-sponsored adversary that maintains long-term unauthorised access to a target.

  • ARP Address Resolution Protocol

    Protocol that maps IP addresses to MAC addresses on a local network.

  • ASM Attack Surface Management

    Practice of continuously discovering, inventorying, and reducing an organisation's exposed assets.

B

  • BCP Business Continuity Plan

    Documented strategy for keeping critical operations running during disruptions.

  • BEC Business Email Compromise

    Targeted fraud where attackers impersonate executives or vendors to redirect payments or data.

  • BGP Border Gateway Protocol

    Routing protocol that exchanges path information between autonomous systems on the internet.

  • BIA Business Impact Analysis

    Process of identifying and quantifying the impact of disruptions on critical business functions.

  • BIOS Basic Input/Output System

    Firmware that initialises hardware during boot before handing off to the operating system.

  • BYOD Bring Your Own Device

    Policy that lets employees use personal devices for work, requiring extra access and data controls.

C

  • C2 Command and Control

    Infrastructure attackers use to direct compromised systems, often via covert channels.

  • CA Certificate Authority

    Entity that issues and vouches for digital certificates used to verify identities online.

  • CAASM Cyber Asset Attack Surface Management

    Discipline that gives security teams a unified inventory of internal and external cyber assets.

  • CASB Cloud Access Security Broker

    Control point between users and cloud services that enforces policy on data, access, and risk.

  • CCPA California Consumer Privacy Act

    California state law granting consumers rights over how businesses collect and sell their data.

  • CERT Computer Emergency Response Team

    Coordinating body that handles cybersecurity incidents at national or organisational level.

  • CI/CD Continuous Integration / Continuous Delivery

    Practice of automatically building, testing, and shipping code changes throughout the day.

  • CIEM Cloud Infrastructure Entitlement Management

    Discipline that governs who and what has which permissions across multi-cloud environments.

  • CIO Chief Information Officer

    Executive responsible for the organisation's IT strategy and operations.

  • CIS Center for Internet Security

    Non-profit that publishes the CIS Controls and CIS Benchmarks used as security baselines.

  • CISA Cybersecurity and Infrastructure Security Agency

    U.S. federal agency responsible for protecting critical infrastructure and coordinating cyber response.

  • CISO Chief Information Security Officer

    Executive accountable for the organisation's information security programme.

  • CMMC Cybersecurity Maturity Model Certification

    U.S. Department of Defense framework that certifies contractors against tiered security controls.

  • CNAPP Cloud-Native Application Protection Platform

    Integrated platform combining CSPM, CWPP, CIEM, and code scanning for cloud-native applications.

  • COTS Commercial Off-The-Shelf

    Ready-made commercial software or hardware procured rather than custom-built.

  • CPE Common Platform Enumeration

    Structured naming scheme for IT products and platforms used in vulnerability data.

  • CSIRT Computer Security Incident Response Team

    Team within an organisation that detects, responds to, and recovers from cyber incidents.

  • CSPM Cloud Security Posture Management

    Tooling that continuously assesses cloud configurations against security and compliance baselines.

  • CSRF Cross-Site Request Forgery

    Web attack that tricks an authenticated user's browser into performing unwanted actions on a trusted site.

  • CTI Cyber Threat Intelligence

    Evidence-based knowledge about threats and adversaries used to inform defensive decisions.

  • CTO Chief Technology Officer

    Executive responsible for the organisation's technology direction and engineering.

  • CVE Common Vulnerabilities and Exposures

    Global identifier system for publicly disclosed software and hardware vulnerabilities.

  • CVSS Common Vulnerability Scoring System

    Open framework for assigning numeric severity scores to security vulnerabilities.

  • CWE Common Weakness Enumeration

    Community-driven catalogue of software and hardware weakness types underlying CVEs.

  • CWPP Cloud Workload Protection Platform

    Security platform that protects VMs, containers, and serverless workloads at runtime.

D

  • DAST Dynamic Application Security Testing

    Black-box testing that probes a running application for vulnerabilities from the outside.

  • DCS Distributed Control System

    Control architecture for industrial processes where controllers are spread across the plant.

  • DDoS Distributed Denial of Service

    Attack that overwhelms a target with traffic from many distributed sources.

  • DES Data Encryption Standard

    Legacy symmetric block cipher, now considered insecure and superseded by AES.

  • DevOps Development and Operations

    Practice that unites software development and IT operations to shorten delivery cycles.

  • DevSecOps Development, Security, and Operations

    Extension of DevOps that embeds security into every stage of the delivery pipeline.

  • DHCP Dynamic Host Configuration Protocol

    Protocol that automatically assigns IP addresses and network settings to devices on a network.

  • DKIM DomainKeys Identified Mail

    Email authentication standard that cryptographically signs outgoing messages to prove sender identity.

  • DLP Data Loss Prevention

    Controls that detect and block unauthorised movement of sensitive data.

  • DMARC Domain-based Message Authentication, Reporting and Conformance

    Email policy and reporting standard that builds on SPF and DKIM to combat spoofing.

  • DNS Domain Name System

    Hierarchical naming system that translates human-readable domain names into IP addresses.

  • DNSSEC DNS Security Extensions

    Cryptographic extensions to DNS that authenticate the origin and integrity of DNS records.

  • DoH DNS over HTTPS

    Protocol that performs DNS resolution over an encrypted HTTPS connection.

  • DORA Digital Operational Resilience Act

    EU regulation that mandates operational resilience requirements for financial entities and their ICT providers.

  • DoS Denial of Service

    Attack that disrupts a service's availability for its intended users.

  • DoT DNS over TLS

    Protocol that performs DNS resolution over a TLS-encrypted connection on a dedicated port.

  • DPO Data Protection Officer

    Role required by GDPR to oversee data protection strategy and compliance.

  • DRM Digital Rights Management

    Technologies that control how digital content can be accessed, copied, or distributed.

  • DRP Disaster Recovery Plan

    Documented procedures for recovering IT systems and data after a disruptive event.

E

  • E2EE End-to-End Encryption

    Encryption scheme where only the communicating endpoints can read the message content.

  • EASM External Attack Surface Management

    Continuous discovery and assessment of internet-exposed assets visible to an attacker.

  • ECC Elliptic Curve Cryptography

    Public-key cryptography based on elliptic curves, offering strong security with smaller keys.

  • EDR Endpoint Detection and Response

    Security tooling that records endpoint activity and supports detection, investigation, and response.

  • EKS Elastic Kubernetes Service

    AWS managed Kubernetes service that runs the control plane on the customer's behalf.

  • EMM Enterprise Mobility Management

    Combined approach to managing devices, applications, and content on the corporate mobile fleet.

  • ENISA European Union Agency for Cybersecurity

    EU agency that promotes a high common level of cybersecurity across member states.

  • EPSS Exploit Prediction Scoring System

    Data-driven model that estimates the probability a vulnerability will be exploited in the wild.

  • ERM Enterprise Risk Management

    Holistic approach to identifying, assessing, and managing risks across the whole organisation.

F

  • FaaS Function as a Service

    Cloud execution model where the provider runs individual functions on demand without managing servers.

  • FedRAMP Federal Risk and Authorization Management Program

    U.S. government programme that standardises security authorisation for cloud services.

  • FISMA Federal Information Security Management Act

    U.S. law requiring federal agencies to develop and maintain information security programmes.

  • FTP File Transfer Protocol

    Legacy protocol for transferring files between client and server, considered insecure without TLS.

G

  • GAI Generative AI

    AI systems that produce new content such as text, images, or code from learned patterns.

  • GDPR General Data Protection Regulation

    EU regulation governing how personal data of individuals in the EU/EEA must be processed.

  • GKE Google Kubernetes Engine

    Google Cloud's managed Kubernetes service for running containerised workloads.

  • GRC Governance, Risk, and Compliance

    Integrated discipline that aligns governance, risk management, and regulatory compliance.

H

  • HIDS Host-based Intrusion Detection System

    Software that monitors a single host for signs of intrusion or anomalous activity.

  • HIPAA Health Insurance Portability and Accountability Act

    U.S. law setting standards for the privacy and security of protected health information.

  • HMAC Hash-based Message Authentication Code

    Cryptographic construct that uses a hash function and secret key to authenticate messages.

  • HOTP HMAC-based One-Time Password

    Algorithm that generates one-time passwords from a shared secret and an incrementing counter.

  • HSM Hardware Security Module

    Tamper-resistant device that generates, stores, and uses cryptographic keys.

  • HTTP Hypertext Transfer Protocol

    Application protocol used to request and deliver resources on the web.

  • HTTPS HTTP Secure

    HTTP transported over TLS to provide confidentiality and integrity for web traffic.

  • HUMINT Human Intelligence

    Intelligence collected from human sources through interviews, recruitment, or observation.

I

  • IaaS Infrastructure as a Service

    Cloud model where the provider supplies virtualised compute, storage, and networking on demand.

  • IaC Infrastructure as Code

    Managing and provisioning infrastructure through machine-readable definition files.

  • IAM Identity and Access Management

    Discipline and tooling that controls who can access which resources under which conditions.

  • IAST Interactive Application Security Testing

    Hybrid testing that observes application behaviour from inside while exercising it from outside.

  • ICMP Internet Control Message Protocol

    Network protocol used for diagnostics and error reporting between IP devices, such as ping.

  • ICS Industrial Control Systems

    Hardware and software systems that monitor and control industrial processes.

  • IDS Intrusion Detection System

    System that monitors traffic or hosts and alerts on signs of malicious activity.

  • IEC International Electrotechnical Commission

    International standards organisation for electrical, electronic, and related technologies.

  • IIoT Industrial Internet of Things

    Application of IoT in industrial settings such as manufacturing, energy, and logistics.

  • IMAP Internet Message Access Protocol

    Protocol for retrieving and managing email messages stored on a mail server.

  • IoA Indicator of Attack

    Behavioural signal that reveals adversary actions, regardless of whether known malware is involved.

  • IoC Indicator of Compromise

    Forensic artefact (hash, IP, domain) suggesting a system has been compromised.

  • IoT Internet of Things

    Network of physical objects embedded with sensors, software, and connectivity.

  • IP Internet Protocol

    Network-layer protocol that addresses and routes packets across the internet.

  • IPS Intrusion Prevention System

    Inline security control that detects and actively blocks malicious traffic or behaviour.

  • IR Incident Response

    Coordinated process for handling cybersecurity incidents from detection through recovery and lessons learned.

  • IRM Integrated Risk Management

    Approach that unifies risk processes across the enterprise into a single view.

  • ISO International Organization for Standardization

    Body that develops international standards including the ISO/IEC 27000 information security series.

J

  • JEA Just Enough Administration

    Microsoft model that limits administrators to the minimum capabilities needed for a task.

  • JIT Just-In-Time access

    Pattern that grants elevated privileges only for a limited window when needed.

K

  • K8s Kubernetes

    Open-source platform for orchestrating containerised applications across a cluster of machines.

  • KDF Key Derivation Function

    Algorithm that derives one or more cryptographic keys from a secret value such as a password.

  • KEV Known Exploited Vulnerabilities

    CISA-maintained catalogue of vulnerabilities that have been observed exploited in attacks.

  • KMS Key Management Service

    Service that creates, stores, rotates, and controls access to cryptographic keys.

  • KSPM Kubernetes Security Posture Management

    Tooling that assesses Kubernetes clusters against security and compliance baselines.

  • KYC Know Your Customer

    Regulatory process for verifying customer identity to prevent fraud and money laundering.

L

  • LAN Local Area Network

    Network that connects devices within a limited geographic area such as an office or building.

  • LDAP Lightweight Directory Access Protocol

    Protocol for accessing and maintaining distributed directory services over IP networks.

  • LFI Local File Inclusion

    Vulnerability that lets attackers include arbitrary local files through an application input.

  • LLM Large Language Model

    Neural network trained on vast text corpora and used for tasks like generation and reasoning.

  • LLMOps Large Language Model Operations

    Practices for deploying, monitoring, and governing LLMs in production.

M

  • MD5 Message Digest 5

    Cryptographically broken hash function, retained only for checksums and legacy use.

  • MDM Mobile Device Management

    Tooling that configures, secures, and monitors mobile devices used by an organisation.

  • MDR Managed Detection and Response

    Outsourced security service combining technology, analysts, and processes for 24/7 detection and response.

  • MFA Multi-Factor Authentication

    Authentication requiring two or more independent factors before access is granted.

  • MITM Man-in-the-Middle

    Attack where the adversary secretly intercepts and possibly alters communication between two parties.

  • ML Machine Learning

    AI subfield where systems learn patterns from data rather than being explicitly programmed.

  • mTLS Mutual TLS

    TLS configuration where both client and server present and verify certificates.

  • MTTD Mean Time to Detect

    Average time between an incident occurring and being detected by the security team.

  • MTTR Mean Time to Respond

    Average time between detecting an incident and starting effective response actions.

N

  • NAC Network Access Control

    Solution that authenticates devices and enforces policy before granting network access.

  • NAT Network Address Translation

    Technique that maps multiple internal IP addresses to one or more public addresses.

  • NDR Network Detection and Response

    Security tooling that analyses network traffic to detect, investigate, and respond to threats.

  • NGFW Next-Generation Firewall

    Firewall that combines stateful inspection with application awareness, IPS, and threat intelligence.

  • NIDS Network-based Intrusion Detection System

    IDS that monitors network traffic at one or more points rather than on each host.

  • NIS2 Network and Information Security Directive 2

    EU directive expanding cybersecurity obligations for essential and important entities.

  • NIST National Institute of Standards and Technology

    U.S. agency that publishes widely used cybersecurity standards including the NIST CSF and SP 800 series.

  • NLP Natural Language Processing

    Field of AI focused on understanding and generating human language.

O

  • OAuth Open Authorization

    Open standard that lets users grant scoped access to their data without sharing credentials.

  • OIDC OpenID Connect

    Identity layer on top of OAuth 2.0 that lets clients verify a user's identity via an identity provider.

  • OSINT Open Source Intelligence

    Intelligence collected from publicly available sources such as websites, news, and social media.

  • OT Operational Technology

    Hardware and software that monitors and controls physical devices and industrial processes.

  • OTP One-Time Password

    Password valid for only one login session or transaction.

P

  • PAM Privileged Access Management

    Discipline and tooling for securing, controlling, and monitoring privileged accounts and sessions.

  • PCI DSS Payment Card Industry Data Security Standard

    Security standard for organisations that store, process, or transmit cardholder data.

  • PGP Pretty Good Privacy

    Cryptographic system widely used for encrypting and signing emails and files.

  • PHI Protected Health Information

    Individually identifiable health data protected under regulations such as HIPAA.

  • PII Personally Identifiable Information

    Any data that can be used to identify a specific individual.

  • PIM Privileged Identity Management

    Capability for managing, activating, and auditing privileged roles, often time-bound.

  • PKI Public Key Infrastructure

    Framework of certificates, keys, and authorities that enables trusted use of public-key cryptography.

  • PLC Programmable Logic Controller

    Industrial digital controller used to automate processes such as machinery and assembly lines.

  • POP3 Post Office Protocol 3

    Legacy protocol for downloading email from a server to a client, typically deleting on download.

R

  • RAG Retrieval-Augmented Generation

    Technique where an LLM retrieves external context and uses it to ground its generated response.

  • RASP Runtime Application Self-Protection

    Security technology embedded in the application that detects and blocks attacks at runtime.

  • RAT Remote Access Trojan

    Malware that gives an attacker covert remote control over an infected device.

  • RBAC Role-Based Access Control

    Access model where permissions are assigned to roles, and users gain permissions through role membership.

  • RCE Remote Code Execution

    Vulnerability or attack class that lets an adversary run arbitrary code on a target system.

  • RFI Remote File Inclusion

    Vulnerability that lets an attacker include and execute remote files via an application input.

  • RPO Recovery Point Objective

    Maximum acceptable amount of data, measured in time, that may be lost in a disruption.

  • RSA Rivest-Shamir-Adleman

    Public-key cryptosystem widely used for secure data transmission and digital signatures.

  • RTO Recovery Time Objective

    Maximum acceptable time to restore a service after a disruption.

S

  • SaaS Software as a Service

    Cloud delivery model where the provider hosts the application and customers access it over the network.

  • SAML Security Assertion Markup Language

    XML-based standard for exchanging authentication and authorisation data between parties.

  • SASE Secure Access Service Edge

    Architecture combining networking and network security into a unified cloud-delivered service.

  • SAST Static Application Security Testing

    White-box testing that analyses source code or binaries for vulnerabilities without running them.

  • SBOM Software Bill of Materials

    Machine-readable inventory of components and dependencies that make up a piece of software.

  • SCA Software Composition Analysis

    Practice of identifying and assessing open-source components and their known vulnerabilities.

  • SCADA Supervisory Control and Data Acquisition

    Industrial control system that supervises and collects data from distributed equipment.

  • SD-WAN Software-Defined Wide Area Network

    Network architecture that uses software to dynamically route WAN traffic across multiple links.

  • SDLC Software Development Life Cycle

    Structured process covering planning, building, testing, releasing, and maintaining software.

  • SFTP SSH File Transfer Protocol

    File transfer protocol that runs over SSH, providing authentication and encryption.

  • SHA Secure Hash Algorithm

    Family of cryptographic hash functions published by NIST, with SHA-2 and SHA-3 in current use.

  • SIEM Security Information and Event Management

    Platform that aggregates, correlates, and analyses log data from across the enterprise for security use.

  • SIGINT Signals Intelligence

    Intelligence gathered by intercepting electronic signals and communications.

  • SMTP Simple Mail Transfer Protocol

    Standard protocol used to send email between servers across the internet.

  • SOAR Security Orchestration, Automation, and Response

    Platform that automates and orchestrates security workflows across tools and teams.

  • SOC Security Operations Center

    Team and facility responsible for continuously monitoring and defending an organisation's security.

  • SOC 2 Service Organization Control 2

    AICPA audit framework that reports on a service provider's controls around security, availability, and privacy.

  • SOX Sarbanes-Oxley Act

    U.S. law setting requirements for financial reporting and related internal controls in public companies.

  • SPF Sender Policy Framework

    Email authentication that lets domains list authorised sending servers to combat spoofing.

  • SQLi SQL Injection

    Attack where untrusted input is inserted into SQL queries to manipulate database operations.

  • SSE Security Service Edge

    Cloud-delivered security stack — typically SWG, CASB, and ZTNA — without the networking pieces of SASE.

  • SSH Secure Shell

    Protocol that provides encrypted remote login and tunneling over an untrusted network.

  • SSL Secure Sockets Layer

    Deprecated predecessor of TLS, still loosely referenced when people say 'SSL certificate'.

  • SSO Single Sign-On

    Authentication scheme that lets a user access multiple systems with one set of credentials.

  • SSRF Server-Side Request Forgery

    Vulnerability that lets an attacker coerce a server into making requests on the attacker's behalf.

  • STIX Structured Threat Information Expression

    Standardised language for representing cyber threat intelligence.

  • SWG Secure Web Gateway

    Web proxy that enforces policy, filters URLs, and blocks malicious or unwanted web traffic.

T

  • TAXII Trusted Automated eXchange of Indicator Information

    Protocol for sharing cyber threat intelligence, typically used with STIX.

  • TCP Transmission Control Protocol

    Connection-oriented transport protocol that guarantees ordered, reliable byte streams.

  • TDD Test-Driven Development

    Development practice where tests are written before the production code they validate.

  • TEE Trusted Execution Environment

    Isolated processing environment that protects code and data from the rest of the system.

  • TI Threat Intelligence

    Information about adversaries, tools, and techniques used to inform defensive decisions.

  • TIP Threat Intelligence Platform

    System that aggregates, normalises, and operationalises threat intelligence feeds.

  • TLP Traffic Light Protocol

    Set of designations (red, amber, green, white) used to control sharing of sensitive information.

  • TLS Transport Layer Security

    Cryptographic protocol that provides confidentiality, integrity, and authentication for network traffic.

  • TOTP Time-based One-Time Password

    Algorithm that generates one-time passwords from a shared secret and the current time.

  • TPM Trusted Platform Module

    Hardware chip that provides secure key storage and cryptographic functions for the host system.

  • TPRM Third-Party Risk Management

    Programme for identifying and managing risk introduced by suppliers and partners.

  • TTP Tactics, Techniques, and Procedures

    Behavioural patterns used by threat actors, often catalogued via the MITRE ATT&CK framework.

U

  • UBA User Behavior Analytics

    Analytical approach that profiles normal user behaviour and surfaces deviations.

  • UDP User Datagram Protocol

    Connectionless transport protocol that prioritises speed and low overhead over reliability.

  • UEBA User and Entity Behavior Analytics

    UBA extended to also profile non-human entities such as service accounts, hosts, and devices.

  • UEFI Unified Extensible Firmware Interface

    Modern firmware standard that replaces BIOS and brings features like secure boot.

  • UEM Unified Endpoint Management

    Single platform for managing PCs, mobile devices, and other endpoints under one policy framework.

V

  • vCISO Virtual Chief Information Security Officer

    Outsourced CISO function delivered on a fractional or interim basis.

  • VEX Vulnerability Exploitability eXchange

    Machine-readable advisory that states whether a product is actually affected by a given CVE.

  • VLAN Virtual LAN

    Logical network segmentation within a switched physical network.

  • VPN Virtual Private Network

    Encrypted tunnel that extends a private network across an untrusted one, such as the internet.

  • VPR Vulnerability Priority Rating

    Tenable's risk score that combines CVSS, exploit data, and threat context to prioritise vulnerabilities.

  • VRM Vendor Risk Management

    Process for assessing and monitoring risk arising from suppliers and service providers.

W

  • WAF Web Application Firewall

    Inline filter that inspects HTTP traffic to block attacks targeting web applications.

  • WAN Wide Area Network

    Network that spans a large geographic area, typically connecting multiple LANs.

  • WEP Wired Equivalent Privacy

    Obsolete and broken Wi-Fi encryption standard, fully replaced by WPA and successors.

  • WPA Wi-Fi Protected Access

    Family of Wi-Fi security protocols replacing WEP, with WPA2 and WPA3 in current use.

X

  • XDR Extended Detection and Response

    Security platform that correlates telemetry across endpoints, identity, cloud, and network for unified detection and response.

  • XSS Cross-Site Scripting

    Web vulnerability that lets attackers inject and execute scripts in another user's browser.

Y

  • YARA Yet Another Recursive Acronym

    Pattern-matching tool widely used to write rules that identify malware and other artefacts.

Z

  • ZTA Zero Trust Architecture

    Security model that assumes no implicit trust and verifies every access request based on identity and context.

  • ZTNA Zero Trust Network Access

    Access model that grants application-specific access based on identity and context rather than network location.

Questions or inquiry? [email protected] Contact us →