Cyber Security Acronym Glossary
If you haven’t already, test your knowledge and take our cyber security acronym quiz by clicking here!
ACL
CERT
CISSP
CNAPP
Access Control List
Advanced Persistent Threat
Computer Emergency Response Team
Certified Information Systems Security Professional
Cloud Native Protection Platforms
Dynamic Application Security Testing
Endpoint Protection Scoring System
Human Intelligence
MDR
NAC
A formal and approved list of users who have defined access rights to an asset. Access control lists are also installed in routers or switches, where they act as filters, managing which traffic can access the network.
APT
CND
Computer network defense
DAST
A bad actor, usually state-sponsored or nation-state group, which uses sophisticated techniques for their criminality. APTs can remain undetected for some time.
Cloud Security Posture Management
A group of security experts within a company responsible for incidents and reporting.
CSPM
This certification covers the fundamentals of cybersecurity. Individuals that are CISSPs are considered extremely knowledgeable in the cybersecurity field. This certification is offered by ISC.
A cloud-based software platform that simplifies monitoring, detecting, and dealing with cloud security threats and vulnerabilities. CNAPP takes an integrated, lifecycle approach to protecting both hosts and workloads for cloud application development environments.
Actions taken to defend against unauthorized activity within computer networks. CND includes monitoring, detection, analysis (such as trend and pattern analysis), and response and restoration activities.
Concentrates on security assessment and compliance monitoring for workloads in public cloud environments. It can be used to provide a unified view across disparate cloud environments.
Is the process of analysing a web application through the front-end to find vulnerabilities through simulated attacks.
EPSS
An open, data-driven effort for predicting when software vulnerabilities will be exploited.
HUMINT
This abbreviation refers to information collected by threat researchers from sources across the dark web. These teams are out there hunting down potential threats and stopping them before they occur.
IAM
Identity Access Management
A framework of policies and technologies to ensure that the right users have the appropriate access to technology resources.
Managed Detection and Response
Providers deliver technology and human expertise to perform threat hunting, monitoring, and response.
Network Access Control
SSL
Secure Sockets Layer
TLS
Transport Layer Security
A widely adopted cryptographic protocol designed to provide privacy and data security for communications over the Internet. TLS is designed to prevent data from being eavesdropped on or tampered with. It protects the integrity of private communications and sensitive information.
WAF
Web Application Firewall
An approach to computer security that attempts to unify endpoint security technology, user or system authentication and network security enforcement, providing visibility and control of devices accessing a corporate network.
The standard technology for keeping an internet connection secure and safeguarding any sensitive data that is being sent between two systems, preventing criminals from reading and modifying any information transferred, including potential personal details.
A Web Application Firewall is a type of firewall that filters, monitors, and blocks HTTP traffic to and from a web service. It is designed to prevent attacks exploiting a web application's known vulnerabilities, such as SQL injection, cross-site scripting, file inclusion, and improper system configuration.
XDR
Extended Detection and Response
is about taking multiple security products into a cohesive security operations system. Essentially, XDR is about taking a holistic approach to more efficient, effective detection and response.