20 Cybersecurity Acronyms You Need to Know
A vast number of acronyms are used within the world of cybersecurity. Understanding these acronyms can be key to implementing strong cybersecurity measures. From APT to XSS, here are 20 cybersecurity terms that you need to know.
1. APT
(Advanced Persistent Threat)
An APT is a prolonged and targeted cyberattack. It typically occurs when an intruder gains access to a network and is able to remain undetected for an extended period of time. Such cyberattacks are highly orchestrated with the intention of stealing sensitive data.
2. CAPTCHA
(Completely Automated Public Turing test to tell Computers and Humans Apart)
Are you human? Most of us have had to complete a CAPTCHA before while visiting a website - they are security measures that involve identifying distorted letters or selecting certain images in order to determine whether a user is a bot or a human. CAPTCHAs help to prevent automated online abuse.
3. CISA
(Cybersecurity and Infrastructure Security Agency)
CISA is a US government agency dedicated to improving the nation’s cybersecurity. This agency helps enforce cybersecurity laws, while also offering cybersecurity advice and training.
4. DDoS
(Distributed Denial of Service)
A DDos is a type of cyberattack. It involves flooding a server with traffic (usually in the form of bots) so that a website or network becomes unusable. Such cyberattacks can cause significant downtime for businesses and leave them vulnerable to other attacks.
5. DKIM
(DomainKeys Identified Mail)
DKIM is a method of authenticating emails that can help to prevent email spoofing. Emails are authenticated using a digital signature. This guide offers some tips on how to improve DKIM security.
6. DMARC
(Domain-based Message Authentication, Reporting & Conformance)
DMARC is another email authentication protocol that helps email domain owners protect their domain from unauthorized use. It builds upon email authentication protocols like DKIM and SPF (explained later), allowing senders to receive reports on anyone who is sending emails on their behalf.
7. EDR
(Endpoint Detection and Response)
This cybersecurity solution focuses on detecting and responding to threats on endpoint devices (laptops, desktops and smartphones). It typically involves monitoring and analysing endpoint activity to identify suspicious behavior.
8. GDPR
(General Data Protection Regulation)
Introduced by the European Union, GDPR is a regulation that governs how organizations store and process personal information. All organizations that interact with EU users must abide by this regulation. It involves things like asking for cookie consent and making sure personal information is adequately protected.
9. HTTPS
(Hypertext Transfer Protocol Secure)
All website addresses begin with either ‘HTTP’ or ‘HTTPS’. The extra ‘S’ in ‘HTTPS’ signifies that a website has an extra layer of security - HTTPS websites are encrypted using an SSL/TLS certificate (SSL and TLS are explained in greater detail later in this post).
10. IAM
(Identity and Access Management)
IAM is a framework used by organizations that helps control access rights of users, as well as managing digital identities. It includes elements like creating passwords, managing user accounts and deciding which accounts have access to certain types of information.
11. IDS
(Intrusion Detection System)
An IDS is a form of security technology that monitors network traffic in order to detect suspicious activity and help prevent data breaches. When a threat is detected, an IDS will create an alert to notify administrators so that action can be taken.
12. MFA
(Multi-Factor Authentication)
Instead of just using a password, MFA involves using two or more verification methods to gain access to an account or device. This may include a password, a code sent to their phone and perhaps even biometrics (like a fingerprint or facial recognition). This makes it much harder for hackers to break through. This CISA guide explains more about MFA.
13. MitM
(Man in the Middle)
A MitM attack is a type of cyberattack. It occurs when a communication between two parties is intercepted by a hacker. Such cyberattacks are commonly carried out on public Wi-Fi - often with the intention of stealing sensitive information or injecting malicious content.
14. SPF
(Sender Policy Framework)
This is another email authentication protocol alongside DKIM and DMARC. SPF specifies which IP addresses are allowed to send emails from a certain domain. This can help to prevent fraud such as email spoofing.
15. SQLi
(Structured Query Language Injection)
An SQL injection is a type of cyberattack in which attackers execute malicious SQL statements in order to control a database. This is done with the intention of gaining unauthorized access to sensitive information. This guide offers tips on how to prevent SQL injections.
16. SSL
(Secure Sockets Layer)
An SSL certificate is a digital certificate that encrypts a connection between a browser and a web server. Websites that use an SSL certificate offer more security for visitors and can improve trust - browsers like Chrome display a padlock symbol to showcase that a site is secure and the URL will start with ‘HTTPS’ instead of ‘HTTP’.
17. TLS
(Transport Layer Security)
TLS is the successor to SSL and is the more commonly used security certificate nowadays, similarly encrypting data between a client and server. TLS certificates are sometimes still referred to as SSL certificates, despite them actually both being different types of technology.
18. VPN
(Virtual Private Network)
When using public Wi-Fi, it is recommended that all individuals use a VPN. This helps encrypt the internet connection, helping to prevent MitM attacks. This post delves more into the benefits of a VPN.
19. WAF
(Web Application Firewall)
A WAF is a form of security technology that filters incoming traffic to web applications. WAFs can help protect against cyberattacks like SQL injections and XSS attacks by analyzing HTTP requests. They are an essential part of website security.
10. XSS
(Cross-Site Scripting)
An XSS attack occurs when malicious scripts are injected into web pages. This allows cyber criminals to steal data from users or hi-jack sessions. WAFs may help to protect against XSS attacks.
Conclusion
This glossary provides a definition of some of the most common acronyms used in cybersecurity. By understanding these acronyms, you can more easily navigate the world of cybersecurity and make sure that you are implementing necessary measures to keep your organization secure.
For more tips and tricks, check out these articles: