Cyber Security Degree
  • Career Guide
  • School Interviews
  • FAQs
Skip to the content
Home > FAQs > FAQ: What are some common terms and acronyms used in the field of cybersecurity?

Question: What are some common terms and acronyms used in the field of cybersecurity? Glossary of Common Cybersecurity Terms, Abbreviations, Acronyms, and Initialisms

Updated: January 11, 2023

Cybersecurity, like many technical fields, has its own nomenclature, filled with terms, abbreviations, acronyms, and initialisms that reference the various agencies and organizations, titles and certifications, methods and strategies, and tools and technologies that are familiar to cybersecurity professionals. This glossary is designed to provide those who are not familiar with cyber terminology with a convenient guide to the field’s most commonly used terms, and to assist students who are considering a cybersecurity degree program with an overview of many of the terms they may encounter while researching programs and careers in the field.

Abbreviation, Acronym, or InitialismMeaning
2FATwo-Factor Authentication
aaSas a Service
ACLAccess Control List
AESAdvanced Encryption Standard
AIArtificial Intelligence
APIApplication Programming Interface
APAccess Point
APTAdvanced Persistent Threat
APWGAnti-Phishing Working Group
ATT&CKAdversarial Tactics, Techniques and Common Knowledge
AVAnti-Virus
BASBreach, Attack and Simulation Tools
BCPBusiness Continuity Plan
BGPBorder Gateway Protocol
C2Command and Control
CAROComputer Antivirus Research Organization
CEHCertified Ethical Hacker
CERTComputer Emergency Response Team
CISCenter for Internet Security
CISACertified Information Systems Auditor
CISMCertified Information Security Manager
CISOChief Information Security Officer
CISSPCertified Information Systems Security Professional
CMDBConfiguration Management Database
CNAComputer Network Attack
CNDComputer Network Defense
CNEComputer Network Exploitation
CRISCCertified in Risk and Information Systems Control
CSACloud Security Alliance
CSPCloud Service Provider
CRESTCouncil for Registered Ethical Security Testers
CTICyber Threat Intelligence
CVVSCommon Vulnerability Scoring System
DDoSDistribute Denial of Service
DHSDepartment of Homeland Security
DLPData Loss Prevention
DNSDomain Name Server
DoDDepartment of Defense
EC-CouncilInternational Council of Electronic Commerce Consultants
EDREndpoint Detection and Response
FISMAFederal Information Security Modernization Act
FTPFile Transfer Protocol
FWaaSFirewall as a Service
GDPRGeneral Data Protection Regulation
GIACGlobal Information Assurance Certification
GISGeospatial Information Systems
GRCGovernance, Risk Management and Compliance
HIPPAHealth Insurance Portability and Protection Act
HTTPSSecure Hypertext Transfer Protocol
IAInformation Assurance
IaaSInfrastructure as a Service
IAMIdentity and Access Management
IBEIdentity Based Encryption
IDSIntrusion Detection System
IoTInternet of Things
IPSIntrusion Prevention System
IRIncident Response
ISC²Information Systems Security Certification Consortium
ISMSInformation Security Management System
ISPInternet Service Provider
ISSAInformation Systems Security Association
ISSAFInformation System Security Assessment Framework
ISSOInformation Systems Security Officer
ITInformation Technology
LANLocal Access Network
MDRManaged Detection and Response
MFAMultifactor Authentication
MLMachine Learning
MSPManaged Service Provider
MSSPManaged Security Service Provider
NACNetwork Access Control
NGFWNext-Generation Firewall
NICCSNational Initiative for Cybersecurity Careers and Studies
NICENational Institute for Cybersecurity Education
NISTNational Institute of Standards and Technology
OISSGOpen Information Security Systems Group
OSIOpen Systems Interconnection
OWASPOpen Web Application Security Project
PaaSPlatform as a Service
PCI-DDSPayment Card Industry Data Security Standard
PTESPenetration Testing Execution Standard
SaaSSoftware as a Service
SCFSecure Controls Framework
SIEMSecurity Information and Event Management
SOCSecurity Operations Center
SQLStructured Query Language
SWGSecure Web Gateway
TCP/IPTransmission Control Protocol/Internet Protocol
UTMUnified Threat Management
VPNVirtual Private Network
WANWide Access Network
WAPWireless Application Protocol
WSTGWeb Security Testing Guide
ZTNAZero Trust Network Access

General Cybersecurity FAQs:

  • FAQ: What is the difference between IT security and cybersecurity?
Be Informed

For more information on our research methods, data sources, program classifications, and other important information to consider while visiting this site, please review our Sources and Disclaimers page.

footer-logo-img
  • About Us
  • Contact Us
  • Disclaimers
  • Privacy Policy

Copyright© 2020-2025, CyberSecurityDegree.com

All Rights Reserved.

Follow us on Facebook