Cyber Dictionary
A reference for the terms, acronyms, and frameworks we use every day in security work — from MDR to NIS2.
219 entries
#
- 2FA Two-Factor Authentication
Authentication that requires two distinct verification factors before granting access.
- 3DES Triple Data Encryption Standard
Symmetric block cipher that applies DES three times to each data block; now considered legacy.
A
- ABAC Attribute-Based Access Control
Authorisation model that grants access based on attributes of the user, resource, and environment.
- AD Active Directory
Microsoft's directory service for managing identities, devices, and policies in Windows networks.
- AES Advanced Encryption Standard
Symmetric block cipher standardised by NIST and used worldwide for protecting sensitive data.
- AGI Artificial General Intelligence
Hypothetical AI that can perform any cognitive task a human can.
- AI Artificial Intelligence
Computer systems that perform tasks normally requiring human intelligence.
- AIDR AI Detection and Response
Vendor category for detecting and responding to threats targeting AI systems and agents.
- AISPM AI Security Posture Management
Continuous discovery, assessment, and prioritisation of risk across an organisation's AI footprint.
- AML Anti-Money Laundering
Regulatory regime requiring institutions to detect and report suspicious financial transactions.
- API Application Programming Interface
A defined contract that lets software systems exchange data and invoke functions.
- APT Advanced Persistent Threat
A sophisticated, often state-sponsored adversary that maintains long-term unauthorised access to a target.
- ARP Address Resolution Protocol
Protocol that maps IP addresses to MAC addresses on a local network.
- ASM Attack Surface Management
Practice of continuously discovering, inventorying, and reducing an organisation's exposed assets.
B
- BCP Business Continuity Plan
Documented strategy for keeping critical operations running during disruptions.
- BEC Business Email Compromise
Targeted fraud where attackers impersonate executives or vendors to redirect payments or data.
- BGP Border Gateway Protocol
Routing protocol that exchanges path information between autonomous systems on the internet.
- BIA Business Impact Analysis
Process of identifying and quantifying the impact of disruptions on critical business functions.
- BIOS Basic Input/Output System
Firmware that initialises hardware during boot before handing off to the operating system.
- BYOD Bring Your Own Device
Policy that lets employees use personal devices for work, requiring extra access and data controls.
C
- C2 Command and Control
Infrastructure attackers use to direct compromised systems, often via covert channels.
- CA Certificate Authority
Entity that issues and vouches for digital certificates used to verify identities online.
- CAASM Cyber Asset Attack Surface Management
Discipline that gives security teams a unified inventory of internal and external cyber assets.
- CASB Cloud Access Security Broker
Control point between users and cloud services that enforces policy on data, access, and risk.
- CCPA California Consumer Privacy Act
California state law granting consumers rights over how businesses collect and sell their data.
- CERT Computer Emergency Response Team
Coordinating body that handles cybersecurity incidents at national or organisational level.
- CI/CD Continuous Integration / Continuous Delivery
Practice of automatically building, testing, and shipping code changes throughout the day.
- CIEM Cloud Infrastructure Entitlement Management
Discipline that governs who and what has which permissions across multi-cloud environments.
- CIO Chief Information Officer
Executive responsible for the organisation's IT strategy and operations.
- CIS Center for Internet Security
Non-profit that publishes the CIS Controls and CIS Benchmarks used as security baselines.
- CISA Cybersecurity and Infrastructure Security Agency
U.S. federal agency responsible for protecting critical infrastructure and coordinating cyber response.
- CISO Chief Information Security Officer
Executive accountable for the organisation's information security programme.
- CMMC Cybersecurity Maturity Model Certification
U.S. Department of Defense framework that certifies contractors against tiered security controls.
- CNAPP Cloud-Native Application Protection Platform
Integrated platform combining CSPM, CWPP, CIEM, and code scanning for cloud-native applications.
- COTS Commercial Off-The-Shelf
Ready-made commercial software or hardware procured rather than custom-built.
- CPE Common Platform Enumeration
Structured naming scheme for IT products and platforms used in vulnerability data.
- CSIRT Computer Security Incident Response Team
Team within an organisation that detects, responds to, and recovers from cyber incidents.
- CSPM Cloud Security Posture Management
Tooling that continuously assesses cloud configurations against security and compliance baselines.
- CSRF Cross-Site Request Forgery
Web attack that tricks an authenticated user's browser into performing unwanted actions on a trusted site.
- CTI Cyber Threat Intelligence
Evidence-based knowledge about threats and adversaries used to inform defensive decisions.
- CTO Chief Technology Officer
Executive responsible for the organisation's technology direction and engineering.
- CVE Common Vulnerabilities and Exposures
Global identifier system for publicly disclosed software and hardware vulnerabilities.
- CVSS Common Vulnerability Scoring System
Open framework for assigning numeric severity scores to security vulnerabilities.
- CWE Common Weakness Enumeration
Community-driven catalogue of software and hardware weakness types underlying CVEs.
- CWPP Cloud Workload Protection Platform
Security platform that protects VMs, containers, and serverless workloads at runtime.
D
- DAST Dynamic Application Security Testing
Black-box testing that probes a running application for vulnerabilities from the outside.
- DCS Distributed Control System
Control architecture for industrial processes where controllers are spread across the plant.
- DDoS Distributed Denial of Service
Attack that overwhelms a target with traffic from many distributed sources.
- DES Data Encryption Standard
Legacy symmetric block cipher, now considered insecure and superseded by AES.
- DevOps Development and Operations
Practice that unites software development and IT operations to shorten delivery cycles.
- DevSecOps Development, Security, and Operations
Extension of DevOps that embeds security into every stage of the delivery pipeline.
- DHCP Dynamic Host Configuration Protocol
Protocol that automatically assigns IP addresses and network settings to devices on a network.
- DKIM DomainKeys Identified Mail
Email authentication standard that cryptographically signs outgoing messages to prove sender identity.
- DLP Data Loss Prevention
Controls that detect and block unauthorised movement of sensitive data.
- DMARC Domain-based Message Authentication, Reporting and Conformance
Email policy and reporting standard that builds on SPF and DKIM to combat spoofing.
- DNS Domain Name System
Hierarchical naming system that translates human-readable domain names into IP addresses.
- DNSSEC DNS Security Extensions
Cryptographic extensions to DNS that authenticate the origin and integrity of DNS records.
- DoH DNS over HTTPS
Protocol that performs DNS resolution over an encrypted HTTPS connection.
- DORA Digital Operational Resilience Act
EU regulation that mandates operational resilience requirements for financial entities and their ICT providers.
- DoS Denial of Service
Attack that disrupts a service's availability for its intended users.
- DoT DNS over TLS
Protocol that performs DNS resolution over a TLS-encrypted connection on a dedicated port.
- DPO Data Protection Officer
Role required by GDPR to oversee data protection strategy and compliance.
- DRM Digital Rights Management
Technologies that control how digital content can be accessed, copied, or distributed.
- DRP Disaster Recovery Plan
Documented procedures for recovering IT systems and data after a disruptive event.
E
- E2EE End-to-End Encryption
Encryption scheme where only the communicating endpoints can read the message content.
- EASM External Attack Surface Management
Continuous discovery and assessment of internet-exposed assets visible to an attacker.
- ECC Elliptic Curve Cryptography
Public-key cryptography based on elliptic curves, offering strong security with smaller keys.
- EDR Endpoint Detection and Response
Security tooling that records endpoint activity and supports detection, investigation, and response.
- EKS Elastic Kubernetes Service
AWS managed Kubernetes service that runs the control plane on the customer's behalf.
- EMM Enterprise Mobility Management
Combined approach to managing devices, applications, and content on the corporate mobile fleet.
- ENISA European Union Agency for Cybersecurity
EU agency that promotes a high common level of cybersecurity across member states.
- EPSS Exploit Prediction Scoring System
Data-driven model that estimates the probability a vulnerability will be exploited in the wild.
- ERM Enterprise Risk Management
Holistic approach to identifying, assessing, and managing risks across the whole organisation.
F
- FaaS Function as a Service
Cloud execution model where the provider runs individual functions on demand without managing servers.
- FedRAMP Federal Risk and Authorization Management Program
U.S. government programme that standardises security authorisation for cloud services.
- FISMA Federal Information Security Management Act
U.S. law requiring federal agencies to develop and maintain information security programmes.
- FTP File Transfer Protocol
Legacy protocol for transferring files between client and server, considered insecure without TLS.
G
- GAI Generative AI
AI systems that produce new content such as text, images, or code from learned patterns.
- GDPR General Data Protection Regulation
EU regulation governing how personal data of individuals in the EU/EEA must be processed.
- GKE Google Kubernetes Engine
Google Cloud's managed Kubernetes service for running containerised workloads.
- GRC Governance, Risk, and Compliance
Integrated discipline that aligns governance, risk management, and regulatory compliance.
H
- HIDS Host-based Intrusion Detection System
Software that monitors a single host for signs of intrusion or anomalous activity.
- HIPAA Health Insurance Portability and Accountability Act
U.S. law setting standards for the privacy and security of protected health information.
- HMAC Hash-based Message Authentication Code
Cryptographic construct that uses a hash function and secret key to authenticate messages.
- HOTP HMAC-based One-Time Password
Algorithm that generates one-time passwords from a shared secret and an incrementing counter.
- HSM Hardware Security Module
Tamper-resistant device that generates, stores, and uses cryptographic keys.
- HTTP Hypertext Transfer Protocol
Application protocol used to request and deliver resources on the web.
- HTTPS HTTP Secure
HTTP transported over TLS to provide confidentiality and integrity for web traffic.
- HUMINT Human Intelligence
Intelligence collected from human sources through interviews, recruitment, or observation.
I
- IaaS Infrastructure as a Service
Cloud model where the provider supplies virtualised compute, storage, and networking on demand.
- IaC Infrastructure as Code
Managing and provisioning infrastructure through machine-readable definition files.
- IAM Identity and Access Management
Discipline and tooling that controls who can access which resources under which conditions.
- IAST Interactive Application Security Testing
Hybrid testing that observes application behaviour from inside while exercising it from outside.
- ICMP Internet Control Message Protocol
Network protocol used for diagnostics and error reporting between IP devices, such as ping.
- ICS Industrial Control Systems
Hardware and software systems that monitor and control industrial processes.
- IDS Intrusion Detection System
System that monitors traffic or hosts and alerts on signs of malicious activity.
- IEC International Electrotechnical Commission
International standards organisation for electrical, electronic, and related technologies.
- IIoT Industrial Internet of Things
Application of IoT in industrial settings such as manufacturing, energy, and logistics.
- IMAP Internet Message Access Protocol
Protocol for retrieving and managing email messages stored on a mail server.
- IoA Indicator of Attack
Behavioural signal that reveals adversary actions, regardless of whether known malware is involved.
- IoC Indicator of Compromise
Forensic artefact (hash, IP, domain) suggesting a system has been compromised.
- IoT Internet of Things
Network of physical objects embedded with sensors, software, and connectivity.
- IP Internet Protocol
Network-layer protocol that addresses and routes packets across the internet.
- IPS Intrusion Prevention System
Inline security control that detects and actively blocks malicious traffic or behaviour.
- IR Incident Response
Coordinated process for handling cybersecurity incidents from detection through recovery and lessons learned.
- IRM Integrated Risk Management
Approach that unifies risk processes across the enterprise into a single view.
- ISO International Organization for Standardization
Body that develops international standards including the ISO/IEC 27000 information security series.
J
- JEA Just Enough Administration
Microsoft model that limits administrators to the minimum capabilities needed for a task.
- JIT Just-In-Time access
Pattern that grants elevated privileges only for a limited window when needed.
K
- K8s Kubernetes
Open-source platform for orchestrating containerised applications across a cluster of machines.
- KDF Key Derivation Function
Algorithm that derives one or more cryptographic keys from a secret value such as a password.
- KEV Known Exploited Vulnerabilities
CISA-maintained catalogue of vulnerabilities that have been observed exploited in attacks.
- KMS Key Management Service
Service that creates, stores, rotates, and controls access to cryptographic keys.
- KSPM Kubernetes Security Posture Management
Tooling that assesses Kubernetes clusters against security and compliance baselines.
- KYC Know Your Customer
Regulatory process for verifying customer identity to prevent fraud and money laundering.
L
- LAN Local Area Network
Network that connects devices within a limited geographic area such as an office or building.
- LDAP Lightweight Directory Access Protocol
Protocol for accessing and maintaining distributed directory services over IP networks.
- LFI Local File Inclusion
Vulnerability that lets attackers include arbitrary local files through an application input.
- LLM Large Language Model
Neural network trained on vast text corpora and used for tasks like generation and reasoning.
- LLMOps Large Language Model Operations
Practices for deploying, monitoring, and governing LLMs in production.
M
- MD5 Message Digest 5
Cryptographically broken hash function, retained only for checksums and legacy use.
- MDM Mobile Device Management
Tooling that configures, secures, and monitors mobile devices used by an organisation.
- MDR Managed Detection and Response
Outsourced security service combining technology, analysts, and processes for 24/7 detection and response.
- MFA Multi-Factor Authentication
Authentication requiring two or more independent factors before access is granted.
- MITM Man-in-the-Middle
Attack where the adversary secretly intercepts and possibly alters communication between two parties.
- ML Machine Learning
AI subfield where systems learn patterns from data rather than being explicitly programmed.
- mTLS Mutual TLS
TLS configuration where both client and server present and verify certificates.
- MTTD Mean Time to Detect
Average time between an incident occurring and being detected by the security team.
- MTTR Mean Time to Respond
Average time between detecting an incident and starting effective response actions.
N
- NAC Network Access Control
Solution that authenticates devices and enforces policy before granting network access.
- NAT Network Address Translation
Technique that maps multiple internal IP addresses to one or more public addresses.
- NDR Network Detection and Response
Security tooling that analyses network traffic to detect, investigate, and respond to threats.
- NGFW Next-Generation Firewall
Firewall that combines stateful inspection with application awareness, IPS, and threat intelligence.
- NIDS Network-based Intrusion Detection System
IDS that monitors network traffic at one or more points rather than on each host.
- NIS2 Network and Information Security Directive 2
EU directive expanding cybersecurity obligations for essential and important entities.
- NIST National Institute of Standards and Technology
U.S. agency that publishes widely used cybersecurity standards including the NIST CSF and SP 800 series.
- NLP Natural Language Processing
Field of AI focused on understanding and generating human language.
O
- OAuth Open Authorization
Open standard that lets users grant scoped access to their data without sharing credentials.
- OIDC OpenID Connect
Identity layer on top of OAuth 2.0 that lets clients verify a user's identity via an identity provider.
- OSINT Open Source Intelligence
Intelligence collected from publicly available sources such as websites, news, and social media.
- OT Operational Technology
Hardware and software that monitors and controls physical devices and industrial processes.
- OTP One-Time Password
Password valid for only one login session or transaction.
P
- PAM Privileged Access Management
Discipline and tooling for securing, controlling, and monitoring privileged accounts and sessions.
- PCI DSS Payment Card Industry Data Security Standard
Security standard for organisations that store, process, or transmit cardholder data.
- PGP Pretty Good Privacy
Cryptographic system widely used for encrypting and signing emails and files.
- PHI Protected Health Information
Individually identifiable health data protected under regulations such as HIPAA.
- PII Personally Identifiable Information
Any data that can be used to identify a specific individual.
- PIM Privileged Identity Management
Capability for managing, activating, and auditing privileged roles, often time-bound.
- PKI Public Key Infrastructure
Framework of certificates, keys, and authorities that enables trusted use of public-key cryptography.
- PLC Programmable Logic Controller
Industrial digital controller used to automate processes such as machinery and assembly lines.
- POP3 Post Office Protocol 3
Legacy protocol for downloading email from a server to a client, typically deleting on download.
R
- RAG Retrieval-Augmented Generation
Technique where an LLM retrieves external context and uses it to ground its generated response.
- RASP Runtime Application Self-Protection
Security technology embedded in the application that detects and blocks attacks at runtime.
- RAT Remote Access Trojan
Malware that gives an attacker covert remote control over an infected device.
- RBAC Role-Based Access Control
Access model where permissions are assigned to roles, and users gain permissions through role membership.
- RCE Remote Code Execution
Vulnerability or attack class that lets an adversary run arbitrary code on a target system.
- RFI Remote File Inclusion
Vulnerability that lets an attacker include and execute remote files via an application input.
- RPO Recovery Point Objective
Maximum acceptable amount of data, measured in time, that may be lost in a disruption.
- RSA Rivest-Shamir-Adleman
Public-key cryptosystem widely used for secure data transmission and digital signatures.
- RTO Recovery Time Objective
Maximum acceptable time to restore a service after a disruption.
S
- SaaS Software as a Service
Cloud delivery model where the provider hosts the application and customers access it over the network.
- SAML Security Assertion Markup Language
XML-based standard for exchanging authentication and authorisation data between parties.
- SASE Secure Access Service Edge
Architecture combining networking and network security into a unified cloud-delivered service.
- SAST Static Application Security Testing
White-box testing that analyses source code or binaries for vulnerabilities without running them.
- SBOM Software Bill of Materials
Machine-readable inventory of components and dependencies that make up a piece of software.
- SCA Software Composition Analysis
Practice of identifying and assessing open-source components and their known vulnerabilities.
- SCADA Supervisory Control and Data Acquisition
Industrial control system that supervises and collects data from distributed equipment.
- SD-WAN Software-Defined Wide Area Network
Network architecture that uses software to dynamically route WAN traffic across multiple links.
- SDLC Software Development Life Cycle
Structured process covering planning, building, testing, releasing, and maintaining software.
- SFTP SSH File Transfer Protocol
File transfer protocol that runs over SSH, providing authentication and encryption.
- SHA Secure Hash Algorithm
Family of cryptographic hash functions published by NIST, with SHA-2 and SHA-3 in current use.
- SIEM Security Information and Event Management
Platform that aggregates, correlates, and analyses log data from across the enterprise for security use.
- SIGINT Signals Intelligence
Intelligence gathered by intercepting electronic signals and communications.
- SMTP Simple Mail Transfer Protocol
Standard protocol used to send email between servers across the internet.
- SOAR Security Orchestration, Automation, and Response
Platform that automates and orchestrates security workflows across tools and teams.
- SOC Security Operations Center
Team and facility responsible for continuously monitoring and defending an organisation's security.
- SOC 2 Service Organization Control 2
AICPA audit framework that reports on a service provider's controls around security, availability, and privacy.
- SOX Sarbanes-Oxley Act
U.S. law setting requirements for financial reporting and related internal controls in public companies.
- SPF Sender Policy Framework
Email authentication that lets domains list authorised sending servers to combat spoofing.
- SQLi SQL Injection
Attack where untrusted input is inserted into SQL queries to manipulate database operations.
- SSE Security Service Edge
Cloud-delivered security stack — typically SWG, CASB, and ZTNA — without the networking pieces of SASE.
- SSH Secure Shell
Protocol that provides encrypted remote login and tunneling over an untrusted network.
- SSL Secure Sockets Layer
Deprecated predecessor of TLS, still loosely referenced when people say 'SSL certificate'.
- SSO Single Sign-On
Authentication scheme that lets a user access multiple systems with one set of credentials.
- SSRF Server-Side Request Forgery
Vulnerability that lets an attacker coerce a server into making requests on the attacker's behalf.
- STIX Structured Threat Information Expression
Standardised language for representing cyber threat intelligence.
- SWG Secure Web Gateway
Web proxy that enforces policy, filters URLs, and blocks malicious or unwanted web traffic.
T
- TAXII Trusted Automated eXchange of Indicator Information
Protocol for sharing cyber threat intelligence, typically used with STIX.
- TCP Transmission Control Protocol
Connection-oriented transport protocol that guarantees ordered, reliable byte streams.
- TDD Test-Driven Development
Development practice where tests are written before the production code they validate.
- TEE Trusted Execution Environment
Isolated processing environment that protects code and data from the rest of the system.
- TI Threat Intelligence
Information about adversaries, tools, and techniques used to inform defensive decisions.
- TIP Threat Intelligence Platform
System that aggregates, normalises, and operationalises threat intelligence feeds.
- TLP Traffic Light Protocol
Set of designations (red, amber, green, white) used to control sharing of sensitive information.
- TLS Transport Layer Security
Cryptographic protocol that provides confidentiality, integrity, and authentication for network traffic.
- TOTP Time-based One-Time Password
Algorithm that generates one-time passwords from a shared secret and the current time.
- TPM Trusted Platform Module
Hardware chip that provides secure key storage and cryptographic functions for the host system.
- TPRM Third-Party Risk Management
Programme for identifying and managing risk introduced by suppliers and partners.
- TTP Tactics, Techniques, and Procedures
Behavioural patterns used by threat actors, often catalogued via the MITRE ATT&CK framework.
U
- UBA User Behavior Analytics
Analytical approach that profiles normal user behaviour and surfaces deviations.
- UDP User Datagram Protocol
Connectionless transport protocol that prioritises speed and low overhead over reliability.
- UEBA User and Entity Behavior Analytics
UBA extended to also profile non-human entities such as service accounts, hosts, and devices.
- UEFI Unified Extensible Firmware Interface
Modern firmware standard that replaces BIOS and brings features like secure boot.
- UEM Unified Endpoint Management
Single platform for managing PCs, mobile devices, and other endpoints under one policy framework.
V
- vCISO Virtual Chief Information Security Officer
Outsourced CISO function delivered on a fractional or interim basis.
- VEX Vulnerability Exploitability eXchange
Machine-readable advisory that states whether a product is actually affected by a given CVE.
- VLAN Virtual LAN
Logical network segmentation within a switched physical network.
- VPN Virtual Private Network
Encrypted tunnel that extends a private network across an untrusted one, such as the internet.
- VPR Vulnerability Priority Rating
Tenable's risk score that combines CVSS, exploit data, and threat context to prioritise vulnerabilities.
- VRM Vendor Risk Management
Process for assessing and monitoring risk arising from suppliers and service providers.
W
- WAF Web Application Firewall
Inline filter that inspects HTTP traffic to block attacks targeting web applications.
- WAN Wide Area Network
Network that spans a large geographic area, typically connecting multiple LANs.
- WEP Wired Equivalent Privacy
Obsolete and broken Wi-Fi encryption standard, fully replaced by WPA and successors.
- WPA Wi-Fi Protected Access
Family of Wi-Fi security protocols replacing WEP, with WPA2 and WPA3 in current use.
X
- XDR Extended Detection and Response
Security platform that correlates telemetry across endpoints, identity, cloud, and network for unified detection and response.
- XSS Cross-Site Scripting
Web vulnerability that lets attackers inject and execute scripts in another user's browser.
Y
- YARA Yet Another Recursive Acronym
Pattern-matching tool widely used to write rules that identify malware and other artefacts.
Z
- ZTA Zero Trust Architecture
Security model that assumes no implicit trust and verifies every access request based on identity and context.
- ZTNA Zero Trust Network Access
Access model that grants application-specific access based on identity and context rather than network location.