Bitmuncher

Bauschicon with Laptop

Abbreviations in IT and Cybersecurity

In IT, and therefore also in information security, many different abbreviations are used. Here you can find an alphabetically sorted list of common abbreviations.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Abbrev. Meaning Explanation
A
ACL Access Control List A list that regulates which users or systems have access to certain resources and what actions they are allowed to perform on them, based on defined rules.
AD Active Directory A directory service developed by Microsoft that is used in Windows networks to centrally manage users, computers, groups, resources, and policies to control access and security.
AES Advanced Encryption Standard A symmetric encryption method that protects data using strong and efficient algorithms and is recognized worldwide as the standard for secure data transmission.
AI Artificial Intelligence The ability of machines or computer systems to perform human-like tasks such as learning, problem solving, and decision making through the use of algorithms and data.
API Application Programming Interface An interface that enables different software applications to communicate with each other and exchange functions or data without revealing their internal logic.
APT Advanced Persistent Threat A targeted, long-term cyberattack method in which attackers use sophisticated techniques to infiltrate a network undetected and steal sensitive data or cause damage.
AV Anti-Virus Software that protects computer systems from harmful software such as viruses, Trojans, worms, and other malware by detecting, blocking, and, if necessary, removing them.
AWS Amazon Web Services A comprehensive cloud computing platform from Amazon that provides a wide range of services such as computing power, storage, databases, and machine learning for companies worldwide.
B
BCM Business Continuity Management A systematic approach to ensuring the operational capability of an organization during and after a crisis or disruption through preventive measures, contingency plans, and recovery strategies.
BO Buffer Overflow A security vulnerability in which a program writes more data to a memory buffer than it can hold, allowing adjacent memory to be overwritten and potentially allowing attackers to execute malicious code.
BYOD Bring Your Own Device A company policy that allows employees to use personal end user devices such as laptops, smartphones, or tablets for work purposes. This offers flexibility, but also requires special security measures to protect company data from unauthorized access or loss.
C
CA Certificate Authority A trusted organization or authority that issues digital certificates to verify the identity of websites, users, or organizations and ensure secure communication.
CDN Content Delivery Network A network of servers distributed worldwide that delivers content such as web pages, videos, and files quickly and reliably to users by providing data from geographically close servers.
CERT Computer Emergency Response Team A specialized group dedicated to analyzing, preventing, and responding to IT security incidents in order to minimize damage and restore system security.
CLI Command-Line Interface A text-based user interface through which commands can be entered directly to control an operating system or programs..
CMDB Configuration Management Database A central database that stores and manages information about all IT assets and their relationships within an organization to support processes such as IT service management.
COBO Corporate Owned, Business Only An IT management model in which companies provide their employees with company-owned devices that may only be used for business purposes. This strict separation increases security and facilitates compliance with compliance guidelines, as private use is excluded.
COPE Corporate Owned, Personally Enabled An IT management model in which companies provide their employees with company-owned devices (e.g., smartphones or laptops) that can be used for both business and personal purposes. This allows companies to maintain control over security policies and data protection, while employees enjoy a certain degree of flexibility in how they use the devices.
CORS Cross-Origin Resource Sharing A security mechanism that determines whether and how web browsers can request resources from a domain that differs from the domain of the original request in order to prevent unauthorized access.
CPU Central Processing Unit The central processing unit of a computer, which executes commands, conducts calculations, and controls the flow of data between the various components of the system.
CSP Content Security Policy A security policy that allows web developers to specify which sources are allowed to provide content such as scripts, stylesheets, or media on a website in order to prevent attacks such as cross-site scripting (XSS).
CSP Cloud Service Provider A provider that offers IT services such as computing power, storage, networks, or software over the Internet. Well-known examples include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud.
CVE Common Vulnerabilities and Exposures A publicly accessible database that provides standardized identifiers for known security vulnerabilities and weaknesses in IT systems to facilitate their management and remediation.
CVSS Common Vulnerability Scoring System A standardized rating system that quantifies and prioritizes the severity of security vulnerabilities in IT systems based on defined criteria.
D
DAST Dynamic Application Security Testing A security testing method in which applications are tested during runtime to uncover vulnerabilities in their interaction with the environment, such as injection or authentication problems.
DES Data Encryption Standard Ein veraltetes symmetrisches Verschlüsselungsverfahren, das früher zur sicheren Datenübertragung verwendet wurde, jedoch aufgrund seiner kurzen Schlüssellänge als unsicher gilt.
DKIM DomainKeys Identified Mail An email authentication method that adds a digital signature to outgoing emails to ensure that the message has not been tampered with during transmission and actually originates from the specified sender.
DNS Domain Name System A protocol that translates domain names such as www.beispiel.de into IP addresses to enable communication between computers on the Internet.
DoS Denial of Service An attack technique that aims to overload an IT system or a service running on it so that its use is restricted or completely impossible.
DDoS Distributed Denial of Service Like DoS, but a large number of attacking systems are used to flood the target with requests.
DPA Data Processing Addendum A contractual agreement between controllers and processors that regulates compliance with data protection laws such as the GDPR and specifies how personal data is processed and protected.
DPIA Data Protection Impact Assessment A procedure conducted in accordance with Article 35 of the GDPR to systematically assess the potential risks to the rights and freedoms of individuals when processing personal data and to implement appropriate safeguards.
DPMS Data Protection Management System A systematic approach to managing and ensuring compliance with data protection requirements by defining and monitoring processes, policies, and measures for handling personal data.
DPO Data Protection Official An independent person or body that assists companies or organizations in complying with data protection laws, monitors data protection policies, and serves as a point of contact for authorities and data subjects.
DSA Digital Signature Algorithm A cryptographic algorithm used to generate and verify digital signatures to ensure the authenticity and integrity of data.
E
E2E End-to-End An encryption method in which data is encrypted throughout the entire transmission from the sender to the recipient, so that third parties cannot access the content during transmission.
EOL End of Life The point in time at which a product, such as software or hardware, is no longer supported or developed by the manufacturer, which can often entail security risks.
F
FOSS Free and Open Source Software Software that can be freely used, modified, and distributed because its source code is openly accessible and published under a license that grants these freedoms.
FTP File Transfer Protocol A standardized network protocol that enables the transfer of files between a client and a server over a network, such as the Internet.
G
GCP Google Cloud Platform A cloud computing platform from Google that provides a variety of services such as computing power, storage, databases, and machine learning for businesses and developers.
GDPR General Data Protection Regulation Also EU-GDPR and EU GDPR. An EU-wide regulation that governs the protection of personal data and the rights of data subjects, and imposes binding requirements on companies and organizations for handling data.
GPU Graphics Processing Unit A specialized processor component optimized for parallel processing of graphics data and often used for computationally intensive tasks such as machine learning.
GUI Graphical User Interface An interface that allows users to operate computers and software through visual elements such as windows, icons, and menus, rather than by entering commands.
H
HTTP Hypertext Transfer Protocol A communication protocol that enables the transfer of data such as web pages between web browsers and servers on the Internet.
I
IaC Infrastructure as Code An approach to managing and provisioning IT infrastructure using machine-readable configuration files instead of conducting manual configurations, promoting automation and consistency.
IAM Identity & Access Management A framework of policies, processes, and technologies that ensures the right people in an organization have access to the right resources at the right time.
ICT Information & Communication Technology Refers to the combination of technologies and services used to process, store, transmit, and display information, as well as to communicate in digital and analog formats. Used primarily in official documents.
IDE Integrated Development Environment Software that supports developers with tools such as code editors, debuggers, and build automation in a unified interface to make software development more efficient.
IDS Intrusion Detection System A security solution that monitors networks or systems for suspicious activity and potential security breaches and issues appropriate alerts.
IOC Indicators of Compromise Signs or data indicating that an IT system may have been compromised, such as unusual network activity, malicious files, or suspicious changes to systems.
IoT Internet of Things A network of physical devices, vehicles, sensors, and other objects connected to the Internet to collect data, exchange information, and enable automated processes.
IP Internet Protocol A network address that uniquely identifies devices and enables communication between them on the Internet or local networks.
IPS Intrusion Prevention System A security solution that not only detects suspicious activities and attacks in networks or systems, but also actively blocks them to prevent damage.
ISMS Information Security Management System A systematic approach to managing and securing information through policies, processes, and technical measures to ensure confidentiality, integrity, and availability in accordance with standards such as ISO 27001.
ISO Information Security Officer A responsible person within an organization who oversees information security management, assesses risks, coordinates security measures, and ensures compliance with standards such as ISO 27001.
ISP Internet Service Provider A provider that provides access to the Internet and can offer additional services such as email, web hosting, or security solutions.
IT Information Technology Includes the use of computer and network systems for processing, storing, transmitting, and managing data, as well as for supporting business and communication processes. Colloquially often used as a synonym for ICT.d>
ITIL Information Technology Infrastructure Library A framework for IT service management (ITSM) that provides best practices for efficiently planning, delivering, and managing IT services to support business processes.
ITSM IT Service Management An approach to planning, delivering, managing, and optimizing IT services that aims to align IT with business needs and improve service quality.
J
JRE Java Runtime Environment A runtime environment required to run Java applications, as it provides the Java Virtual Machine (JVM) and basic libraries.
JS Javascript A programming language primarily used for developing interactive and dynamic web content by extending the functionality of web pages.
L
LLM Large Language Model An AI model trained on extensive text data to understand and generate human-like language and perform complex tasks such as translation, question answering, and text analysis.
M
MBR Master Boot Record A special area on a hard disk or other storage device that contains information about the partitioning of the hard disk and starts the boot loader to load the operating system.
MDM Mobile Device Management A security solution that enables companies to centrally manage, configure, and protect mobile devices such as smartphones and tablets to secure corporate data and policies.
MFA Multi-Factor Authentication A security method that uses at least two different factors, such as knowledge (password), possession (token), and biometrics (fingerprint), to verify a user's identity.
MS Microsoft A global technology leader that develops and provides software, hardware, cloud services, and solutions such as the Windows operating system, the Office suite, and the Azure cloud platform.
N
NAS Network Attached Storage A network-connected storage device that allows multiple devices to store, retrieve, and share centralized data via a (local) network.
NAT Network Address Translation A network technology that converts private IP addresses into public IP addresses to enable access to the Internet while reducing the number of public addresses required and providing security benefits.
NIST National Institute of Standards and Technology A US federal agency that develops standards and policies, including in the field of information security, to promote innovation and protect critical infrastructure. NIST guidelines are often applied internationally.
NLP Natural Language Processing A part of machine learning that deals with the processing, analysis, and generation of natural language by computers in order to understand and respond to human communication.
O
OCR Optical Character Recognition A technology that recognizes text in images or scanned documents and converts it into machine-readable formats for digital processing and searching.
OS Operating System The basic software of a computer that manages the hardware, runs applications, and provides a user interface to enable interaction with the system.
OSS Open-Source Software Software that can be freely used, modified, and distributed because its source code is openly accessible and published under a license that grants these freedoms.
P
PDCA Plan-Do-Check-Act A continuous improvement process structured in four steps to plan, implement, review, and adjust processes, especially in management systems such as ISMS.
PGP Pretty Good Privacy An encryption tool used to secure emails and files by combining cryptographic techniques such as public key encryption and digital signatures to ensure confidentiality and authenticity.
PII Personally Identifiable Information Refers to personal information that can be used to identify a person directly or indirectly, such as name, address, date of birth, or social security number.
PIN Personal Identification Number A numeric secret number used to authenticate a person when accessing systems or services, for example, bank cards or mobile devices.
PKI Public Key Infrastructure A system of policies, procedures, and technologies that enables the management and use of digital certificates and cryptographic keys to ensure secure communication and authentication.
R
RAM Random Access Memory A volatile memory in computer systems that stores data and programs that need to be accessed quickly by the processor during use and is deleted when the device is turned off. Also referred to as RAM.
RAT Remote Access Trojan Sometimes also called Remote Administration Tool. This is malware that allows attackers to gain undetected remote access to an infected system in order to spy on data, control systems, or install further malware.
RBAC Role-Based Access Control An access control model in which permissions are assigned based on the roles of users within an organization to efficiently and securely manage access to resources.
RDP Remote Desktop Protocol A network protocol developed by Microsoft that enables remote access to desktops or applications by allowing users to control a graphical user interface on a remote computer via a network connection.
ROM Read-Only Memory Non-volatile memory that permanently stores data that can only be read and not changed, such as basic firmware or startup programs on a computer.
RSA Rivest, Shamir, Adleman An asymmetric encryption method based on the mathematical difficulty of factoring large numbers, used for secure data transmission, digital signatures, and key exchange. The abbreviation RSA is derived from the initials of its developers, who developed the algorithm in 1977.
RTFM Read the fine manual Also "Read the fucking manual". A humorous request to read the documentation or instructions first before asking questions..
S
SAST Static Application Security Testing A method for analyzing the source code of applications in order to identify and eliminate security vulnerabilities early in the development process.
SDK Software Development Kit A collection of tools, libraries, and documentation that help developers create applications or features for a specific platform, software, or hardware.
SEO Search Engine Optimization The process of optimizing websites and content to improve their visibility in organic search engine results and thereby generate more traffic.
SIEM Security Information and Event Management A software solution that centrally collects, analyzes, and correlates security-related events and data from IT systems to detect, monitor, and respond to security incidents.
SLA Service Level Agreement A contractual agreement between a service provider and a customer that defines the expected performance characteristics, availability, and responsibilities for a service.
SOC Security Operations Center A central organization where IT security experts continuously monitor networks, systems, and data for threats, analyze security incidents, and initiate coordinated response measures.
SoC System on a Chip An integrated circuit that combines all the essential components of a computer system, such as a processor, memory, and interfaces, on a single chip to enable compact and efficient devices.
SPF Sender Policy Framework An email authentication protocol that ensures that only authorized servers can send emails on behalf of a domain to prevent spoofing and phishing attacks.
SQLi SQL injection An attack technique in which malicious SQL code is injected into input fields in order to gain unauthorized access to a database or manipulate its contents.
SRE Site Reliability Engineering An approach to IT operations that combines software development and IT operations to ensure highly scalable and reliable systems through automation, monitoring, and continuous improvement.
SSD Solid State Drive A non-volatile storage media that stores data using flash memory chips and is faster, more robust, and more energy-efficient than traditional hard disk drives (HDDs).
SSL Secure Sockets Layer An outdated encryption protocol that enables secure communication over the Internet and has been replaced by its successor protocol, Transport Layer Security (TLS).
SSO Single Sign-On An authentication method in which users log in once and can then access multiple applications or systems without having to authenticate again.
T
TCP Transmission Control Protocol A reliable network protocol that controls data transmission in networks by ensuring that data packets arrive complete and in the correct order.
TISAX Trusted Information Security Assessment Exchange A verification and exchange mechanism developed specifically for the automotive industry to assess and demonstrate compliance with information security requirements based on ISO 27001 and the VDA-ISA catalog.
TLS Transort Layer Security A cryptographic protocol that ensures the secure transmission of data over the Internet through encryption, authentication, and integrity protection.
TOM Technical & Organizational Measures Technical and organizational measures are safeguards defined in data protection laws, such as the GDPR, that companies must implement to ensure the security and protection of personal data against unauthorized access, loss, or manipulation.
U
UDP User Datagram Protocol A lightweight network protocol that transmits data without establishing a connection or performing error checking, making it suitable for applications that prioritize speed over reliability, such as streaming or online gaming.
W
WAF Web Application Firewall A security solution that monitors, filters, and protects HTTP traffic to protect web applications from attacks such as SQL injections, cross-site scripting (XSS), and other vulnerabilities.
X
XSS Cross-site Scripting A security vulnerability that allows an attacker to inject malicious code, usually in the form of JavaScript, into a trusted website in order to steal user data, hijack sessions, or perform unwanted actions on behalf of the user.