Cybersecurity Acronyms
Jobify
September 18, 2025
IT Knowledge
Organizational & Frameworks:
- CISO: Chief Information Security Officer
- CSIRT: Computer Security Incident Response Team
- DFIR: Digital Forensics and Incident Response
- GRC: Governance, Risk, and Compliance
- IAM: Identity and Access Management
- NIST: National Institute of Standards and Technology
- SOC: Security Operations Center
- SOAR: Security Orchestration, Automation, and Response
Attacks & Threats:
- APT: Advanced Persistent Threat
- BEC: Business Email Compromise
- DDoS: Distributed Denial of Service
- Malware: Malicious Software
- MITM: Man-in-the-Middle
- Phishing: A type of social engineering attack where an attacker attempts to trick a user into providing sensitive information, often through email.
- Ransomware: A type of malware that encrypts a victim's files and demands a ransom payment to restore access.
- SQLi: Structured Query Language Injection
- XSS: Cross-Site Scripting
Technologies & Tools:
- AV: Anti-Virus
- BYOD: Bring Your Own Device
- CASB: Cloud Access Security Broker
- DLP: Data Loss Prevention
- EDR: Endpoint Detection and Response
- EPP: Endpoint Protection Platform
- E-T-L: Encryption, Transport, and Logging
- FW: Firewall
- HIDS/NIDS: Host-based/Network-based Intrusion Detection System
- HTTPS: Hypertext Transfer Protocol Secure
- IAM: Identity and Access Management
- IDS/IPS: Intrusion Detection System/Intrusion Prevention System
- MFA: Multi-Factor Authentication
- SASE: Secure Access Service Edge
- SIEM: Security Information and Event Management
- VPN: Virtual Private Network
- WAF: Web Application Firewall
- XDR: Extended Detection and Response
- ZTNA: Zero Trust Network Access
Standards & Vulnerabilities:
- CIA: Confidentiality, Integrity, and Availability
- CVE: Common Vulnerabilities and Exposures
- CVSS: Common Vulnerability Scoring System
- GDPR: General Data Protection Regulation
- IoC: Indicator of Compromise
- PCI-DSS: Payment Card Industry Data Security Standard
- PII: Personally Identifiable Information