AAA - Authentication, Authorization, and Accounting
Access control framework
ABAC
Attribute-Based Access Control — evaluates attributes for access
ACL
Access Control List — permissions tied to resources
AES
Advanced Encryption Standard — symmetric encryption
APT
Advanced Persistent Threat — long-term targeted attack
BCP
Business Continuity Plan — ensures operations after disruption
BIA
Business Impact Analysis — identifies critical functions
BYOD
Bring Your Own Device — policy for personal devices at work
CA
Certificate Authority — issues digital certificates
CIA
Confidentiality
CRL
Certificate Revocation List — list of revoked certs
CSRF
Cross-Site Request Forgery — web attack exploiting trust
DAC
Discretionary Access Control — owner-based access
DDoS
Distributed Denial of Service — flood of traffic attack
DLP
Data Loss Prevention — prevents data exfiltration
DNS
Domain Name System — resolves domain to IP
DRP
Disaster Recovery Plan — restores systems after failure
EDR
Endpoint Detection and Response — detects endpoint threats
HIPS
Host-based Intrusion Prevention System — blocks host attacks
IAM
Identity and Access Management — manages digital identities
IPS
Intrusion Prevention System — detects and blocks attacks
MFA
Multi-Factor Authentication — requires multiple factors
NAC
Network Access Control — controls device access to network
NAT
Network Address Translation — hides internal IPs