Acronyms
When specializing in a field, it is common to use and come across acronyms. In some cases, acronyms break the perimeter of the field and start being used by people at large. It is handy to say DNA rather than Deoxyribonucleic acid, so it is no wonder why many acronyms populate our everyday language.
In many cases, however, acronyms are a small barrier for people becoming familiar with a field. In here, I wanted to collect a not particularly complete list of acronyms I have encountered so far during my working life. The list is a continuous WIP (work in progress) and I am maintaining it for my own future reference. On the other hand I realized that it could be helpful to a broader audience and so here we are!
A
AAA Authentication, Authorization and Accounting
AAC Adaptive Access Control
AD Active Directory
ADFS Active Directory Federation Services
AEP Advanced Endpoint Protection
AMD Advanced Malware Detection
AMP Advanced Malware Protection
APM Application Portfolio Management
ARPU Average Revenue Per User
APT Advanced Persistent Threat
ATP Advanced Threat Protection
AUP Acceptable Use Policy
B
BIA Business Impact Analysis
C
CIS Center for Internet Security
COOP Continuity of Operation
CMP Certificate Management Protocol
CNF Carrier Neutral Facility
CSP Cloud Service Provider
D
DC Domain Controller
DCS Distributed Control System
DRM Digital Right Management
E
EAL Evaluation Assurance Level
EAPOL Extensible Authentication Protocol over Lan
EDRM Enterprise Digital Right Management
EH Ethical Hacking
EMM Enterprise Mobility Management
EPP End-Point Protection
ERP Enterprise Resource Planning
F
FPE Field Preserving Encryption
G
GRC Governance, Risk & Compliance
H
HLD High Level Design
HSM Hardware Storage Modules
HSM Hardware Security Modules
I
IAM Identity and Access Management
ICAP Internet Content Adaptation Protocol
ICFR Internal Control Over Financial Reporting
IDaaS Identity as a Service
IEC International Electrotechnical Commission
I&TS Information & Technology Services
IoT Internet of Things
IRM Information Right Management
IT Information Technology
ISMS Information Security Management System
J
K
KMIP Key Management Interoperability Protocol
L
M
MAB MAC Authentication Bypass
MAP Management Assessment Process
MIB Management Information Base
MFA Multi-Factor Authentication
MVNO Mobile Virtual Network Operator
N
NAC Network Access Control
NSM Network and System Management
O
OCSP Online Certificate Status Protocol
P
PAC Proxy Auto-Config
PAM Privileged Access Management
PDU Protocol Data Unit
PII Personal Identifiable Information
PLC Programmable Logic Controller
PLC Power Line Communication
PT Penetration Testing
Q
R
RFP Request For Proposal
RMS Right Management Solution
ROI Return On Investement
RTU Remote Terminal Unit
S
SAML Security Assertion Markup Language
SCEP Simple Certificate Enrollment Protocol
SIEM Security Information and Event Management
SMM System Management Mode
SLA Service Level Agreement
SOAR Security Orchestration, Automation and Response
SRM Security and Risk Management
STS Security Token Service
SSO Single Sign On
SWG Secure Web Gateway
T
TCB Trusted Computing Base
TCO Total Cost of Ownership
TFTP Trivial File Transfer Protocol
U
UEBA User and Entity Behavior Analysis
URI Uniform Resource Identifier
URL Uniform Resource Locator
UTC Coordinated Universal Time
V
W
WAF Web Application Firewall
WBE Work Breakdown Element
WBS Work Breakdown Structure
WSS Web Services Security