Glossary

Technology is an ever changing environment of focus and consideration, with acronyms evolving at a rapid pace. Below is a summary of the terms used across cyber security and physical security, with other useful terms thrown in that are relevant to understanding.

Email us at [email protected] with any further suggestions. In general, we will refer to Forrester, Gartner, IDC, InfoTech Research and Wikipedia to confirm the validity of any suggestions before publishing.

AcronymFull FormDescription
APTAdvanced Persistent ThreatProlonged and targeted cyberattack in which an intruder gains access to a network
APIApplication Programming InterfaceSet of rules for building and interacting with software applications
AIArtificial IntelligenceSimulation of human intelligence in machines
BaaSBackend as a ServiceCloud service model for backend development
BIBusiness IntelligenceTools and systems for analyzing business data
BCPBusiness Continuity PlanStrategy for maintaining operations during disruptions
BYODBring Your Own DevicePolicy allowing employees to use personal devices for work
CAPEXCapital ExpenditureFunds used by a company to acquire or upgrade physical assets
CDOChief Digital OfficerExecutive responsible for an organisations digital strategy, usually with a view to monetise services and products
CIOChief Information OfficerExecutive responsible for an organisations information strategy, usually with a view to maximise investment
CISOChief Information Security OfficerExecutive responsible for an organization’s information security strategy
CI/CDContinuous Integration/Continuous DeploymentPractices for automating software development and deployment
CDNContent Delivery NetworkDistributed servers for faster delivery of web content
CRMCustomer Relationship ManagementTools for managing customer interactions and relationships
CTOChief Technology OfficerExecutive responsible for an organizations techonology roadmap, with an emphasis on infrastructure and services
CVECommon Vulnerabilities and ExposuresList of publicly disclosed cybersecurity vulnerabilities
CVSSCommon Vulnerability Scoring SystemFramework for rating the severity of security vulnerabilities
DaaSDevice as a ServiceSupply of physical equipment – servers, laptops, switches, firewalls on a managed basis
DDoSDistributed Denial of ServiceCyberattack that overwhelms a system with traffic
DLPData Loss PreventionTools and strategies to prevent unauthorized data access or transfer
DRaaSDisaster Recovery as a ServiceCloud-based disaster recovery solutions
DRPDisaster Recovery PlanPlan for recovering IT systems after a disaster
EAIEnterprise Application IntegrationFramework for integrating enterprise applications
EDREndpoint Detection and ResponseTools for detecting and responding to threats on endpoints
ERPEnterprise Resource PlanningIntegrated software for managing business processes
ESGEnvironmental, Social, and GovernanceFramework for measuring sustainability and societal impact
ETLExtract, Transform, LoadProcess of extracting, transforming, and loading data for analysis
FaaSFunction as a ServiceServerless computing model for running code in response to events
GDPRGeneral Data Protection RegulationEU regulation for data privacy and protection
IAMIdentity and Access ManagementFramework for managing digital identities and access permissions
IoTInternet of ThingsNetwork of interconnected devices that communicate and exchange data
IPSIntrusion Prevention SystemNetwork security technology that monitors network traffic for malicious activit
ITILInformation Technology Infrastructure LibraryFramework for IT service management
IaaSInfrastructure as a ServiceCloud-based virtualized computing resources
KPIKey Performance IndicatorMetrics used to measure performance and success
MDRManaged Detection and Response
MLMachine LearningAI subset focused on algorithms that learn from data
MFAMulti-Factor AuthenticationSecurity system requiring multiple forms of verification
MITMMan-in-the-MiddleAttack where the attacker secretly relays and possibly alters communication betw
NOCNetwork Operations CenterCentralized location for monitoring and managing IT infrastructure
PaaSPlatform as a ServiceCloud platform for developing, running, and managing applications
PKIPublic Key InfrastructureFramework for managing encryption and digital certificates
RDPRemote Desktop ProtocolProtocol for remote access to computers over a network
RPARobotic Process AutomationTechnology for automating repetitive tasks using software robots
ROIReturn on InvestmentMeasure of profitability for an investment
SaaSSoftware as a ServiceSoftware delivered over the internet on a subscription basis
SCMSupply Chain ManagementManagement of the flow of goods and services
SIEMSecurity Information and Event ManagementTools for real-time analysis of security alerts
SLAService Level AgreementContract defining service expectations between provider and customer
SASESecure Access Service EdgeCloud-based network security model
SSOSingle Sign-OnAuthentication process allowing access to multiple systems with one login
TCOTotal Cost of OwnershipFinancial estimate of the total cost of a product or system
UIUser InterfaceVisual and interactive elements of a software application
UXUser ExperienceDesign and interaction experience of a user with a product or service
VDIVirtual Desktop InfrastructureTechnology for hosting desktop environments on a centralized server
VPNVirtual Private NetworkSecure connection over the internet to protect data
WAFWeb Application FirewallSecurity system that monitors and filters HTTP traffic to and from a web application
XDReXtended Detection and ResponseSecurity solution that integrates multiple security products into a cohesive system
ZTAZero Trust ArchitectureSecurity model that assumes no implicit trust in any network

Email us at [email protected] with any further suggestions. In general, we will refer to Forrester, Gartner, IDC, InfoTech Research and Wikipedia to confirm the validity of any suggestions before publishing.