AES Advanced Encryption Standard
API Application Programming Interface
APT Advanced Persistent Threat
AV Antivirus
BYOD Bring Your Own Device
CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart
CISO Chief Information Security Officer
CSRF Cross-Site Request Forgery
CVE Common Vulnerabilities and Exposures
DDoS Distributed Denial of Service
DLP Data Loss Prevention
DMZ Demilitarized Zone
DNS Domain Name System
DoS Denial of Service
DRM Digital Rights Management
EDR Endpoint Detection and Response
FTP File Transfer Protocol
GDPR General Data Protection Regulation
HIDS Host-based Intrusion Detection System
HTTP Hypertext Transfer Protocol
HTTPS Hypertext Transfer Protocol Secure
IDS Intrusion Detection System
IoT Internet of Things
IPS Intrusion Prevention System
IPsec Internet Protocol Security
ISO International Organization for Standardization
IT Information Technology
LAN Local Area Network
LDAP Lightweight Directory Access Protocol
MAC Media Access Control
MDM Mobile Device Management
MFA Multi-Factor Authentication
MITM Man-in-the-Middle
MSSP Managed Security Service Provider
NAC Network Access Control
NAT Network Address Translation
NIST National Institute of Standards and
Technology
OSINT Open Source Intelligence
OTP One-Time Password
PGP Pretty Good Privacy
PII Personally Identifiable Information
PKI Personal Key Infrastructure
RAT Remote Access Trojan
RCE Remote Code Execution
RDP Remote Desktop Protocol
SaaS Software as a Service
SIEM Security Information and Event
Management
SOC Security Operations Center
SSH Secure Shell
SSL Secure Sockets Layer
SSL/TLS Secure Sockets Layer/Transport
Layer Security
TCP/IP Transmission Control Protocol/ Internet Protocol
UTM Unified Threat Management
VAPT Vulnerability Assessment and
Penetration Testing
VLAN Virtual Local Area Network
VPN Virtual Private Network
WAF Web Application Firewall
WEP Wired Equivalent Privacy
WPA Wi-Fi Protected Access
XSS Cross-Site Scripting