DEV Community

Abdelkrim
Abdelkrim

Posted on

Acronyms you should master in Cybersecurity

the update list is available here: https://altf1be.wordpress.com

  • ACID Atomicité, Cohérence, Isolation et Durabilité
  • AM Access Management
  • API Application Programming Interface
  • APT Advanced Persistent Threat
  • ARA Architecture Risk Analysis
  • ATP Advanced Threat Protection
  • BCP Business Continuity Plan
  • BIA Business Impact Analysis
  • CA Certificate Authority
  • CASB Cloud access security brokers are on-premises, or cloud-based security policy enforcement points, placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed www.gartner.com
  • CERT Computer Emergency Response Team
  • CICS Customer Information Control System
  • COSI Committee on Internal Security
  • CSPM Cloud security posture management implements continuous, automated security and compliance processes, primarily to secure the infrastructure where workloads are deployed.
  • CVE Common Vulnerabilities Exposure
  • CWPP Cloud Workload Protection Platform enables you to perform security functions across multiple environments.
  • DAG Data Access Governance
  • DCSA Data-Centric Security Architecture
  • DFIR Digital Forensics and Incident response
  • DLO Data loss objective
  • DLP Data Loss Prevention
  • DNS Domain Name System
  • DRP Disaster Recovery Plan
  • EDR Endpoint Detection and Response
  • EDR Endpoint detection and response is an integrated endpoint security solution that combines real-time continuous monitoring and collection of endpoint data with rules-based automated response and analysis capabilities. www.trellix.com
  • EDRM Enterprise Digital Rights Management
  • EFW Enterprise firewall
  • EOB End Of Business
  • EPP Endpoint protection platform is a solution deployed on endpoint devices to prevent file-based malware attacks, detect malicious activity, and provide the investigation and remediation capabilities needed to respond to dynamic security incidents and alerts www.gartner.com
  • ETDR endpoint threat detection and response www.trellix.com
  • FQDN Fully-Qualified Domain Name
  • GDPR General Data Protection Regulation (EU)2016/679
  • GRC Governance Risk & Compliance
  • HSM Hardware Security Module
  • ICS Industrial Control System
  • IDS Intrusion Detection System
  • IEC International Electrotechnical Commission
  • IFSMS Information Security Management System
  • IGA Identity Governance and Administration is at the center of IT operations, enabling and securing digital identities for all users, applications and data www.sailpoint.com
  • IoT Internet Of Things
  • IPS Intrusion Prevention Systems
  • IR Incident Response
  • ISA Information Security Advisor
  • ISMS Information Security Management System
  • ITSM Information Technologie and Service Management
  • KMS Key Management Service
  • MDM Mobile Device Management
  • MDR Managed Detection and response
  • MTD Mobile Threat Defense crsc.nist.gov
  • MTTR Mean time to Recover
  • NAC Network Access Control
  • OWASP Open Web Application Security Project
  • PAM Privileged Access Management
  • PKI Public Key Infrastructure
  • PSSI Pfolitique de sécurité des systèmes d’information
  • ROPA Record of Processing Activity
  • RPO Recovery Point Objective. The RPO of a business characterizes the maximum acceptable period of time that can pass between the time that data was last backed up and a critical failure such as a cyber-attack.[source]
  • RTO Recovery Time Objective
  • SABSA Sherwood Applied Business Security Architecture
  • SCADA Supervisory Control And Data Acquisition
  • SEG Secure Email Gateway is a solution that improves the protection of incoming and outgoing emails www.gatefy.com
  • SIAM Service Integration And Management
  • SIEM System Information & Event Management
  • SLA Service Level Agreement
  • SMSI Système de Management de la Sécurité d’Information
  • SOA Statement of Applicability
  • SOAR Security Orchestration, Automation, and Response
  • SOC Security Operating Center
  • SSLC Secured software lifecycle development
  • SWG Secure Web Gateway protects users from web-based threats in addition to applying and enforcing corporate acceptable use policies www.paloaltonetworks.com
  • TLS Transport Layer Security
  • TOGAF The Open Group Architecture Framework
  • UDC User-Driven Classification
  • UEBA User and Entity Behavior Analytics
  • UEM/UES Unified endpoint management/Unified Endpoint Security
  • UTM Unified Threat Management
  • VMDR Vulnerability Management, Detection and Response
  • VPN Virtual Private Network
  • WAAP Web Application API Protection
  • WAF Web Application Firewall
  • XDR Extended Detection and Response is a security solution based on the concept of correlating and analyzing data from multiple sources, including machine data, log * data, and network data into a single, unified stream www.extrahops.com
  • ZTNA Zero trust network access (ZTNA) is a product or service that creates an identity- and context-based, logical access boundary around an application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a set of named entities www.gartner.com

Sentry image

See why 4M developers consider Sentry, “not bad.”

Fixing code doesn’t have to be the worst part of your day. Learn how Sentry can help.

Learn more

Top comments (0)

Image of Timescale

Timescale – the developer's data platform for modern apps, built on PostgreSQL

Timescale Cloud is PostgreSQL optimized for speed, scale, and performance. Over 3 million IoT, AI, crypto, and dev tool apps are powered by Timescale. Try it free today! No credit card required.

Try free