AIMIT
Home
Security Domains
Frameworks
Arch. Diagrams
Interview Q&A📖Glossary🎯Mock Interview📄Resume BuilderSecurity News
📱Download
Mobile App
Home / Glossary

📖 Cybersecurity Glossary

90+ cybersecurity acronyms and terms — searchable, filterable by security domain, with direct links to in-depth AIMIT content.

176 terms
ABCDEFGHIJKLMNOPQRSTUVWXYZ

2

2FA
IAM
Two-Factor Authentication
Authentication requiring two verification factors — typically something you know (password) and something you have (phone/token).
Learn More →

A

ABAC
IAM
Attribute-Based Access Control
Access control model that evaluates attributes (user, resource, environment) to make authorization decisions.
Learn More →
ACL
Network
Access Control List
List of permissions attached to an object, specifying which users or system processes are granted access.
—
AES
Data
Advanced Encryption Standard
Symmetric block cipher (128/192/256-bit keys) used worldwide for encrypting sensitive data at rest and in transit.
Learn More →
AI
AI Security
Artificial Intelligence
Technology enabling machines to simulate human intelligence — increasingly used in both cyber defense and attacks.
Learn More →
APT
SOC
Advanced Persistent Threat
Sophisticated, long-term cyberattack where an intruder gains access and remains undetected for an extended period.
Learn More →
ASM
Vuln Mgmt
Attack Surface Management
Continuous discovery and monitoring of all internet-facing assets for vulnerabilities and exposures.
Learn More →
ATS
Career
Applicant Tracking System
Software that manages recruiting and hiring processes, often scanning resumes for keywords.
Learn More →
AV
SOC
Antivirus
Software that detects, prevents, and removes malware including viruses, worms, trojans, and ransomware.
—

B

BAS
SOC
Breach and Attack Simulation
Automated tools that continuously test security controls by simulating real-world attack techniques.
—
BCP
GRC
Business Continuity Plan
Documented procedures to maintain essential business functions during and after a disaster.
Learn More →
BEC
SOC
Business Email Compromise
Social engineering attack where attackers impersonate executives or vendors via email to trick employees into transferring funds or data.
—
BGP
Network
Border Gateway Protocol
The routing protocol that makes the internet work — exchanges routing information between autonomous systems. BGP hijacking can redirect traffic through attacker-controlled networks.
Learn More →
BYOD
Network
Bring Your Own Device
Policy allowing employees to use personal devices for work. Requires MDM, containerization, and security policies to protect corporate data on unmanaged devices.
Learn More →

C

CASB
Cloud
Cloud Access Security Broker
Security policy enforcement point between cloud service consumers and providers.
Learn More →
CCPA
GRC
California Consumer Privacy Act
State-level privacy regulation giving California residents control over their personal data.
Learn More →
CIA
Core
Confidentiality, Integrity, Availability
The three core pillars of information security that guide security program design.
—
CIRT
SOC
Cyber Incident Response Team
Specialized team responsible for investigating and responding to cybersecurity incidents.
Learn More →
CIS
GRC
Center for Internet Security
Nonprofit organization providing best-practice security benchmarks and controls.
Learn More →
CIEM
Cloud
Cloud Infrastructure Entitlement Management
Manages and monitors cloud identities and their permissions — detects over-provisioned access, enforces least privilege, and reduces identity-based attack surface across multi-cloud environments.
Learn More →
CNAPP
Cloud
Cloud-Native Application Protection Platform
Unified security platform combining CSPM, CWPP, CIEM, and IaC scanning for cloud-native apps.
Learn More →
COBIT
GRC
Control Objectives for Information Technologies
IT governance framework by ISACA for aligning IT with business goals and managing risk.
Learn More →
CrewAI
AI Security
CrewAI Multi-Agent Framework
Python framework for orchestrating role-based multi-agent AI systems — each agent has a role, goal, and backstory. Used for building collaborative AI teams that delegate tasks autonomously.
Learn More →
CSRF
AppSec
Cross-Site Request Forgery
Attack that tricks a user's browser into making unwanted requests to a site where they are authenticated.
Learn More →
CSPM
Cloud
Cloud Security Posture Management
Continuous monitoring of cloud configurations for compliance violations and misconfigurations.
Learn More →
CVSS
Vuln Mgmt
Common Vulnerability Scoring System
Industry-standard severity scoring system (0-10) for specific vulnerabilities, maintained by FIRST.org.
Learn More →
CVE
Vuln Mgmt
Common Vulnerabilities and Exposures
Unique identifier for a specific discovered vulnerability in a specific product. Maintained by MITRE/NVD.
Learn More →
CWE
Vuln Mgmt
Common Weakness Enumeration
Catalog of software/hardware weakness types maintained by MITRE. Used to classify bug categories.
Learn More →
CWPP
Cloud
Cloud Workload Protection Platform
Runtime protection for VMs, containers, and serverless workloads including vulnerability scanning.
Learn More →
CWSS
Vuln Mgmt
Common Weakness Scoring System
Risk scoring system (0-100) for CWE weakness types, maintained by MITRE.
Learn More →

D

DAST
AppSec
Dynamic Application Security Testing
Testing running applications for vulnerabilities by sending malicious inputs and observing responses.
Learn More →
DDoS
Network
Distributed Denial of Service
Attack that overwhelms a target with traffic from multiple sources to make it unavailable.
Learn More →
DevSecOps
DevSecOps
Development, Security, Operations
Practice of integrating security throughout the entire software development lifecycle.
Learn More →
DLP
Data
Data Loss Prevention
Tools and processes that prevent sensitive data from leaving the organization unauthorized.
Learn More →
DKIM
Network
DomainKeys Identified Mail
Email authentication method using cryptographic signatures to verify email integrity and sender domain authenticity. Works with SPF and DMARC for email security.
Learn More →
DMARC
Network
Domain-based Message Authentication, Reporting & Conformance
Email authentication protocol that builds on SPF and DKIM to prevent email spoofing.
—
DMVPN
Network
Dynamic Multipoint VPN
Cisco technology that enables scalable hub-and-spoke and spoke-to-spoke VPN tunnels dynamically — eliminates the need for static point-to-point tunnels.
Learn More →
DMZ
Network
Demilitarized Zone
Network segment that sits between the internal network and the internet, hosting public-facing services while isolating the internal network.
Learn More →
DNS
Network
Domain Name System
System that translates domain names to IP addresses. Often targeted for DNS hijacking and tunneling.
Learn More →
DoS
Network
Denial of Service
Attack that floods a system with traffic or requests to exhaust resources and make it unavailable to legitimate users.
Learn More →
DORA
DevSecOps
DevOps Research and Assessment
Framework measuring software delivery performance through 4 key metrics: Deployment Frequency, Lead Time for Changes, Change Failure Rate, and Mean Time to Recovery. Elite performers deploy on-demand with <1hr lead time. Tracked by IDPs to measure platform impact.
Learn More →
DTLS
Network
Datagram Transport Layer Security
TLS equivalent for UDP-based communication — provides encryption, authentication, and integrity for datagram protocols. Used in VPNs (AnyConnect), WebRTC, and IoT.
Learn More →
DRP
GRC
Disaster Recovery Plan
Documented plan for recovering IT systems and data after a disaster or major outage.
Learn More →

E

EDM
Data
Exact Data Match
DLP technique that detects sensitive data by matching exact values (SSNs, account numbers) from a data source — more accurate than regex patterns with fewer false positives.
Learn More →
EDR
SOC
Endpoint Detection and Response
Continuous monitoring and response to advanced threats on endpoints using behavioral analysis.
Learn More →
EPP
Network
Endpoint Protection Platform
Integrated security solution combining antivirus, anti-malware, firewall, and device control on endpoints. Foundation layer before EDR/XDR capabilities.
Learn More →
EPSS
Vuln Mgmt
Exploit Prediction Scoring System
Probabilistic model predicting the likelihood a vulnerability will be exploited in the wild within 30 days.
Learn More →

F

FIM
SOC
File Integrity Monitoring
Detecting unauthorized changes to critical system files, configurations, and content.
—
FIDO
IAM
Fast Identity Online
Authentication standard enabling passwordless login using biometrics or security keys.
Learn More →

G

GDPR
GRC
General Data Protection Regulation
EU regulation on data protection and privacy, with strict requirements for handling personal data.
Learn More →
GRC
GRC
Governance, Risk, and Compliance
Integrated approach to managing governance, enterprise risk, and regulatory compliance.
Learn More →
GRE
Network
Generic Routing Encapsulation
Tunneling protocol that encapsulates packets inside IP packets — used to create point-to-point tunnels between networks. Often combined with IPSec for encryption.
Learn More →
GNN
AI
Graph Neural Network
Deep learning architecture that operates on graph-structured data — used in cybersecurity for malware detection, network intrusion analysis, threat actor attribution, and fraud detection by modeling relationships between entities.
Learn More →

H

HIPAA
GRC
Health Insurance Portability and Accountability Act
US regulation for protecting sensitive patient health information from being disclosed without consent.
Learn More →
HIDS
Network
Host-based Intrusion Detection System
Monitors a single host for suspicious activity, unauthorized changes, and policy violations.
Learn More →
HIPS
Network
Host-based Intrusion Prevention System
Monitors system calls, file modifications, and registry changes on individual hosts to detect and block exploitation attempts in real-time.
Learn More →
HITL
AI Security
Human-in-the-Loop
Security control requiring human approval before AI agents execute high-risk actions — prevents autonomous systems from making destructive decisions without oversight.
Learn More →
HSM
Data
Hardware Security Module
Physical device that safeguards and manages digital keys for encryption and decryption.
Learn More →

I

IaC
DevSecOps
Infrastructure as Code
Managing infrastructure through machine-readable definition files rather than manual processes.
Learn More →
IAM
IAM
Identity and Access Management
Framework of policies and technologies for managing digital identities and controlling resource access.
Learn More →
IAST
AppSec
Interactive Application Security Testing
Combines SAST and DAST by analyzing code from within a running application for real-time results.
Learn More →
ICAP
Network
Internet Content Adaptation Protocol
Protocol for offloading HTTP content to external servers for processing — used by proxies and web gateways for antivirus scanning, DLP, and content filtering.
Learn More →
IDM
IAM
Identity Management
Systems and processes for managing the lifecycle of digital identities — creation, modification, deactivation, and deletion of user accounts across enterprise systems.
Learn More →
IDP
DevSecOps
Internal Developer Platform
Self-service layer built by platform engineering teams that abstracts infrastructure complexity — developers provision, deploy, and manage services through golden paths and software catalogs without DevOps tickets. Tools: Backstage, Port.io, Cortex, Humanitec.
Learn More →
IDS
Network
Intrusion Detection System
System that monitors network traffic for suspicious activity and issues alerts.
Learn More →
IGA
IAM
Identity Governance and Administration
Processes for managing digital identity lifecycle including provisioning, access reviews, and SoD.
Learn More →
IOC
SOC
Indicator of Compromise
Forensic evidence such as IP addresses, file hashes, or domains that indicate a potential security breach.
Learn More →
IoT
Network
Internet of Things
Network of interconnected devices (sensors, cameras, smart devices) that collect and exchange data — expanding the attack surface.
—
IPSec
Network
Internet Protocol Security
Suite of protocols for securing IP communications by authenticating and encrypting each packet. Operates in Transport Mode (payload only) or Tunnel Mode (entire packet). Core of site-to-site VPNs.
Learn More →
IPS
Network
Intrusion Prevention System
Network security tool that monitors traffic and takes action to block detected threats.
Learn More →
ISO
GRC
International Organization for Standardization
Global body that publishes security standards including ISO 27001 (ISMS), ISO 42001 (AI), and ISO 22301 (BCM).
Learn More →
IT
Core
Information Technology
The use of computers, networks, and systems to store, process, and manage data and information.
—
IVR
AI Security
Interactive Voice Response
Automated telephony system that interacts with callers using voice and keypad input. An example of Level 1 (Reactive) AI agents — follows pre-programmed rules and responds to direct inputs.
Learn More →

J

JIT
IAM
Just-In-Time (Access)
Security model that provides temporary, time-limited privileged access only when needed.
Learn More →
JFrog
DevSecOps
JFrog Platform (Artifactory + Xray)
Universal artifact management (Artifactory) and binary-level SCA/vulnerability scanning (Xray). Supports Docker, Maven, npm, PyPI, Helm, and 30+ package types. Integrates into IDP golden paths as the artifact store and security gate — blocks vulnerable packages before they reach production.
Learn More →
JWKS
IAM
JSON Web Key Set
JSON data structure representing a set of public keys used to verify JWT signatures. Hosted at a well-known endpoint — critical for OAuth2/OIDC token validation.
Learn More →
JWT
AppSec
JSON Web Token
Compact, URL-safe token format for securely transmitting information between parties as a JSON object.
Learn More →

K

KEV
Vuln Mgmt
Known Exploited Vulnerabilities
CISA-maintained catalog of vulnerabilities that are actively exploited in the wild.
Learn More →
KMS
Cloud
Key Management Service
Cloud service for creating and managing cryptographic keys used to encrypt data.
Learn More →

L

L2TP
Network
Layer 2 Tunneling Protocol
VPN tunneling protocol that operates at Layer 2 — typically paired with IPSec for encryption (L2TP/IPSec). Less performant than IKEv2 but widely supported.
Learn More →
LangGraph
AI Security
LangGraph Stateful Agent Framework
LangChain framework for building stateful, multi-agent AI workflows using directed graphs — supports cycles, persistence, and human-in-the-loop. Ideal for complex conditional agent logic.
Learn More →
LDAP
IAM
Lightweight Directory Access Protocol
Protocol for accessing and maintaining distributed directory information services.
Learn More →
LLM
AI Security
Large Language Model
AI model trained on vast text data capable of generating and understanding human language.
Learn More →
LoRA
AI Security
Low-Rank Adaptation
Parameter-efficient fine-tuning technique that freezes the base LLM and adds small trainable matrices (adapters) to specific layers — trains only 0.1-1% of parameters while achieving near full fine-tuning accuracy.
Learn More →

M

MDM
Network
Mobile Device Management
Enterprise solution for managing and securing mobile devices — enforce security policies, remote wipe, app management, and compliance checking for BYOD and corporate devices.
Learn More →
MDR
SOC
Managed Detection and Response
Outsourced security service providing 24/7 threat monitoring, detection, and response.
Learn More →
MFA
IAM
Multi-Factor Authentication
Authentication method requiring two or more verification factors (knowledge, possession, inherence).
Learn More →
MITRE ATT&CK
SOC
Adversarial Tactics, Techniques & Common Knowledge
Knowledge base of adversary tactics and techniques used for threat modeling and security assessments.
Learn More →
MitM
Network
Man in the Middle
Attack where an adversary secretly intercepts and potentially alters communication between two parties.
Learn More →
ML
AI Security
Machine Learning
Subset of AI where systems learn from data to improve performance — used in anomaly detection, threat hunting, and UEBA.
Learn More →
MPLS
Network
Multiprotocol Label Switching
High-performance routing technique that directs data using short labels instead of long network addresses. Used in enterprise WANs — being replaced by SD-WAN in many deployments.
Learn More →
MSSP
SOC
Managed Security Service Provider
Third-party company that provides outsourced monitoring and management of security devices and systems.
Learn More →
mTLS
Network
Mutual Transport Layer Security
Two-way TLS authentication where both client and server verify each other's certificates — essential for zero trust, microservices communication, and API security.
Learn More →
MTBF
Core
Mean Time Between Failures
Average time between system failures — a reliability metric used in availability planning and SLA management.
—
MTTA
SOC
Mean Time to Acknowledge
Average time taken for a security team to acknowledge an alert or incident after it is generated.
Learn More →
MTTC
SOC
Mean Time to Contain
Average time taken to contain a security incident after detection, limiting its spread and impact.
Learn More →
MTTD
SOC
Mean Time to Detect
Average time taken to detect a security incident or threat from the moment it occurs.
Learn More →
MTTR
SOC
Mean Time to Respond / Remediate
Average time taken to respond to or remediate a security incident or vulnerability.
Learn More →

N

NACL
Network
Network Access Control List
Optional layer of security that acts as a firewall for controlling traffic in and out of subnets.
Learn More →
NGFW
Network
Next-Generation Firewall
Advanced firewall beyond traditional packet filtering — includes deep packet inspection (DPI), application awareness, IPS, TLS decryption, and threat intelligence integration. Leaders: Palo Alto, Fortinet, Check Point.
Learn More →
NHI
IAM
Non-Human Identity
Digital identities for machines, services, API keys, service accounts, and AI agents — as opposed to human user identities. NHIs now outnumber human identities 45:1 in enterprises and are a top identity attack vector.
Learn More →
NDR
Network
Network Detection and Response
Analyzes network traffic in real-time to detect and respond to threats and anomalous activity.
Learn More →
NHT
Network
Non-Human Traffic
Automated bot traffic on networks and websites — includes scrapers, crawlers, and malicious bots that can skew data or attack systems.
—
NIDS
Network
Network Intrusion Detection System
Monitors network traffic for suspicious patterns using signature-based and anomaly-based detection.
Learn More →
NIST
GRC
National Institute of Standards and Technology
US federal agency that develops cybersecurity frameworks, guidelines, and standards.
Learn More →
NOC
Network
Network Operations Center
Centralized team that monitors and manages network health, uptime, and performance 24/7.
Learn More →
NVD
Vuln Mgmt
National Vulnerability Database
NIST-maintained repository that enriches CVEs with CVSS scores, CWE mapping, and affected product data (CPE).
Learn More →

O

OAuth
IAM
Open Authorization
Authorization framework that enables third-party applications to obtain limited access to user accounts.
Learn More →
OCR
Data
Optical Character Recognition
Technology that extracts text from images, scanned documents, and PDFs. Used in DLP for detecting sensitive data in image-based files and in document analysis AI agents.
Learn More →
OIDC
IAM
OpenID Connect
Identity layer on top of OAuth 2.0 for verifying user identity and obtaining basic profile information.
Learn More →
OPA
Cloud
Open Policy Agent
General-purpose policy engine for unified policy enforcement across the cloud-native stack.
Learn More →
OT
Network
Operational Technology
Hardware and software that monitors and controls physical processes in industrial environments (SCADA, ICS, PLCs).
—
OWASP
AppSec
Open Web Application Security Project
Nonprofit foundation producing tools, documentation, and standards for application security.
Learn More →

P

PAM
IAM
Privileged Access Management
Securing, controlling, and monitoring privileged accounts and access to critical systems.
Learn More →
PCI-DSS
GRC
Payment Card Industry Data Security Standard
Security standard for organizations handling credit card data to prevent fraud and breaches.
Learn More →
PEFT
AI Security
Parameter-Efficient Fine-Tuning
Family of techniques (LoRA, QLoRA, prefix tuning, prompt tuning) for adapting LLMs to specific tasks without updating all model parameters — drastically reduces compute cost and prevents catastrophic forgetting.
Learn More →
PII
Data
Personally Identifiable Information
Any data that could identify a specific individual, such as SSN, email, or biometric data.
Learn More →
PKI
Data
Public Key Infrastructure
Framework for managing digital certificates and public-key encryption to enable secure communication.
Learn More →
PUP
SOC
Potentially Unwanted Program
Software that may be installed without clear user consent — includes adware, toolbars, and bundled software that can pose security risks.
—

Q

QC
Data
Quantum Computing
Next-generation computing using quantum bits — poses a future threat to current encryption algorithms (RSA, ECC) and drives post-quantum cryptography research.
Learn More →
QLoRA
AI Security
Quantized Low-Rank Adaptation
Extension of LoRA that adds 4-bit quantization — enables fine-tuning large LLMs (65B+ parameters) on a single GPU by reducing memory requirements while maintaining quality.
Learn More →

R

RaaS
SOC
Ransomware as a Service
Cybercrime business model where ransomware operators lease their malware to affiliates.
—
RAG
AI Security
Retrieval-Augmented Generation
AI architecture that enhances LLM responses by retrieving relevant data from external knowledge bases.
Learn More →
RAT
SOC
Remote Administration Tool
Software that allows remote control of a computer — legitimate for IT support but often used maliciously as a backdoor.
—
RBAC
IAM
Role-Based Access Control
Access control model that assigns permissions based on organizational roles rather than individual users.
Learn More →
RPO
GRC
Recovery Point Objective
Maximum acceptable amount of data loss measured in time — how far back you can restore.
Learn More →
RPA
AI Security
Robotic Process Automation
Software technology that automates repetitive, rule-based business tasks. An example of Level 5 (Autonomous) AI agents — executes decisions independently with minimal human oversight.
Learn More →
RRP
SOC
Ransomware Readiness Program
Organizational preparedness framework for ransomware attacks — includes backup validation, incident response playbooks, communication plans, and recovery procedures.
Learn More →
RTO
GRC
Recovery Time Objective
Maximum acceptable downtime — how quickly systems must be restored after a disaster.
Learn More →

S

SAML
IAM
Security Assertion Markup Language
XML-based standard for exchanging authentication and authorization data between identity providers and SPs.
Learn More →
SASE
Network
Secure Access Service Edge
Cloud-delivered architecture combining SD-WAN with security functions (SWG, CASB, ZTNA, FWaaS) into a single service. Gartner-coined term — leaders: Zscaler, Palo Alto Prisma, Netskope.
Learn More →
SAST
AppSec
Static Application Security Testing
Analyzing source code for vulnerabilities without executing the program. Shift-left security.
Learn More →
SBOM
DevSecOps
Software Bill of Materials
Inventory of all components in software — critical for identifying affected systems when new CVEs drop.
Learn More →
SCA
AppSec
Software Composition Analysis
Identifying open-source components and their known vulnerabilities in a codebase.
Learn More →
SPF
Network
Sender Policy Framework
Email authentication protocol that specifies authorized mail servers for a domain via DNS TXT records. Prevents email spoofing when combined with DKIM and DMARC.
Learn More →
SCIM
IAM
System for Cross-domain Identity Management
Standard for automating user provisioning and deprovisioning across multiple systems.
Learn More →
SCP
Cloud
Service Control Policy
AWS Organizations policy that sets permission guardrails across all accounts in an organization.
Learn More →
SD-WAN
Network
Software-Defined Wide Area Network
Virtualized WAN architecture that uses software to manage connectivity and traffic — replaces traditional MPLS with centralized control, multi-path routing, and application-aware policies.
Learn More →
SDLC
AppSec
Software Development Lifecycle
Process for planning, creating, testing, and deploying software systems.
Learn More →
SIEM
SOC
Security Information and Event Management
Platform that aggregates and analyzes security log data from across the enterprise for threat detection.
Learn More →
SLSA
DevSecOps
Supply-chain Levels for Software Artifacts
Framework for ensuring the integrity of software artifacts throughout the supply chain.
Learn More →
SOAR
SOC
Security Orchestration, Automation & Response
Platform that automates security operations through playbooks, reducing response time.
Learn More →
SOC
SOC
Security Operations Center
Centralized team that monitors, detects, analyzes, and responds to security incidents 24/7.
Learn More →
SOC 2
GRC
Service Organization Control 2
Audit framework for evaluating service providers' controls for security, availability, and privacy.
Learn More →
SoD
GRC
Segregation of Duties
Principle that no single individual should control all aspects of a critical transaction.
Learn More →
SOX
GRC
Sarbanes-Oxley Act
US federal law requiring financial reporting transparency and internal control audits.
Learn More →
SPIFFE
Cloud
Secure Production Identity Framework for Everyone
Standard for establishing trust between workloads in dynamic, heterogeneous environments.
Learn More →
SQLi
AppSec
Structured Query Language Injection
Injection attack that inserts malicious SQL code into application queries to access or manipulate database data.
Learn More →
SSE
Network
Security Service Edge
Cloud-delivered security stack — the security half of SASE without SD-WAN. Includes SWG, CASB, ZTNA, and DLP. Key for securing remote users accessing cloud apps.
Learn More →
SSID
Network
Service Set Identifier
The name of a wireless network — attackers can create rogue SSIDs (evil twin attacks) to intercept traffic.
Learn More →
SSL
Data
Secure Sockets Layer
Predecessor to TLS — cryptographic protocol for encrypting data in transit. Now deprecated in favor of TLS.
Learn More →
SSO
IAM
Single Sign-On
Authentication scheme allowing users to log in once and access multiple systems without re-authenticating.
Learn More →
SSPM
Cloud
SaaS Security Posture Management
Monitors and remediates misconfigurations in SaaS applications (M365, Salesforce, Slack) — enforces security policies across SaaS sprawl.
Learn More →
SWG
Network
Secure Web Gateway
Inspects and filters web traffic to enforce acceptable use policies, block malware downloads, and provide SSL inspection. Key component of SASE architecture alongside CASB and ZTNA.
Learn More →

T

TI
SOC
Threat Intelligence
Evidence-based knowledge about existing or emerging threats, used to inform security decisions and prioritize defenses.
Learn More →
TLP
SOC
Traffic Light Protocol
Standard for labeling sensitivity of shared threat intelligence (White, Green, Amber, Red).
Learn More →
TLS
Data
Transport Layer Security
Cryptographic protocol providing end-to-end encryption for data in transit over networks.
Learn More →
TOTP
IAM
Time-based One-Time Password
Algorithm that generates temporary passcodes based on a shared secret and current time.
Learn More →
TTP
SOC
Tactics, Techniques & Procedures
The behavior patterns and methods used by threat actors, as categorized by MITRE ATT&CK.
Learn More →

U

UDP
Network
User Datagram Protocol
Connectionless transport protocol — fast, no handshake, no guaranteed delivery. Used for DNS, VoIP, video streaming, and gaming. DTLS adds security for UDP traffic.
Learn More →
UEBA
SOC
User and Entity Behavior Analytics
Analyzes user and device behavior patterns to detect insider threats and compromised accounts.
Learn More →
UTM
Network
Unified Threat Management
All-in-one security appliance combining firewall, IDS/IPS, antivirus, content filtering, VPN, and anti-spam in a single device. Suited for SMBs — enterprises prefer NGFW + best-of-breed.
Learn More →

V

VLAN
Network
Virtual Local Area Network
Logical network segmentation at Layer 2 — isolates broadcast domains without physical separation. Critical for microsegmentation and reducing lateral movement in network security.
Learn More →
VPC
Cloud
Virtual Private Cloud
Logically isolated section of a cloud provider's network where you can launch resources securely.
Learn More →
VPD
Vuln Mgmt
Vulnerabilities Per Device
Metric tracking the average number of vulnerabilities per device — used to measure security posture and remediation progress.
Learn More →
VPN
Network
Virtual Private Network
Encrypted tunnel between a device and a network, providing secure remote access.
Learn More →

W

WAF
AppSec
Web Application Firewall
Layer 7 firewall that filters HTTP/HTTPS traffic to protect web applications from attacks.
Learn More →

X

XAI
AI Security
Explainable Artificial Intelligence
Set of techniques that make AI model decisions interpretable and transparent — critical for regulated industries (healthcare, finance) where AI decisions must be auditable and justifiable.
Learn More →
XDR
SOC
Extended Detection and Response
Unified security platform that collects and correlates data across endpoints, networks, and cloud.
Learn More →
XSS
AppSec
Cross-Site Scripting
Injection attack where malicious scripts are injected into trusted websites to execute in users' browsers.
Learn More →

Y

YAML
DevSecOps
YAML Ain't Markup Language
Human-readable data serialization format widely used in DevSecOps for configuration files (Kubernetes, Ansible, CI/CD pipelines).
Learn More →
YARA
SOC
Yet Another Recursive Acronym
Pattern-matching tool used by malware researchers and SOC analysts to identify and classify malware samples based on rules.
Learn More →

Z

ZPA
ZTA
Zscaler Private Access
Zscaler's ZTNA solution — provides zero trust access to private applications without exposing the network. Connects users to apps, not the network.
Learn More →
ZTA
ZTA
Zero Trust Architecture
Security model based on "never trust, always verify" — no implicit trust for any user or device.
Learn More →
ZTE
ZTA
Zero Trust Edge
Gartner concept converging networking and security at the edge — combines ZTNA, SD-WAN, SWG, and CASB into cloud-delivered edge services. Aligns with SASE architecture.
Learn More →
ZTNA
ZTA
Zero Trust Network Access
Replaces traditional VPN with identity-aware, application-level access based on continuous verification.
Learn More →

Enterprise-grade cybersecurity knowledge platform for training, interview preparation, and continuous learning. Master frameworks, architectures, and best practices.

Built by Security Professionals, for Security Enthusiasts.

Security Domains

  • AI Sec
  • AI/ML SecOps
  • API Sec
  • AppSec
  • Cloud
  • Data Sec

More Domains

  • DevSecOps
  • Crypto
  • GRC
  • IAM / IGA
  • MITRE ATT&CK
  • Network
  • OWASP Top 10
  • SAST/DAST
  • SIEM/Logs
  • SOC
  • VulnMgmt
  • ZTA

Frameworks

  • OWASP
  • NIST CSF
  • NIST SP 800
  • MITRE ATT&CK
  • ISO 27001/27002
  • CISA
  • CIS Controls
  • CVSS / CVE / KEV
  • CWE / SANS Top 25
  • SOX
  • PCI-DSS
  • GLBA
  • FFIEC / Federal Banking
  • GDPR
  • Architecture Diagrams
  • 📖 Glossary
© 2026 AIMIT — Cybersecurity Solutions PlatformA GenAgeAI Product
AIMIT
AIMIT 🛡️
On Duty AvatarVani