Glosario de acrónimos de seguridad

Glosario de acrónimos de seguridad

Compartir este contenido

Security acronyms are shorthand terms used to represent complex cybersecurity concepts, technologies, standards, and practices. They are essential for communication in the fast-paced world of information security, where precision and speed are critical. 

These acronyms are widely used by IT professionals, cybersecurity teams, compliance officers, and auditors to discuss risks, policies, tools, and incidents efficiently. 

Whether in technical documentation, risk assessments, or vendor evaluations, security acronyms help teams quickly align on key topics, reducing misunderstanding and promoting a shared language across diverse roles.

Here you can find a list of key Security Acronyms: 

Acronym Phrase Definition
ACLAccess Control ListA set of rules that defines permissions attached to an object, specifying which users or system processes can access or modify it.
APIApplication Programming InterfaceA set of protocols and tools that allows different software applications to communicate with each other.
APTAdvanced Persistent ThreatA prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period to gather sensitive information.
BC/DRBusiness Continuity and Disaster RecoveryStrategies and processes that help an organization recover from disasters and continue operations with minimal disruption.
BECBusiness Email CompromiseA type of cyberattack where attackers impersonate company executives or employees to fraudulently initiate wire transfers or gain access to sensitive information.
CAIQConsensus Assessments Initiative QuestionnaireA survey provided by the Cloud Security Alliance (CSA) to assess the security capabilities of cloud service providers.
CCPACalifornia Consumer Privacy ActA state statute that enhances privacy rights and consumer protection for residents of California, granting them greater control over their personal data.
CISOChief Information Security OfficerA senior-level executive responsible for developing and implementing an information security program to protect enterprise communications and assets.
CMSCredential Management SystemSoftware used for issuing and managing digital credentials as part of a public key infrastructure (PKI).
CSACloud Security AllianceAn organization that promotes best practices for providing security assurance within cloud computing.
CTICyber Threat IntelligenceThe collection and analysis of information about potential or current attacks that threaten an organization.
DDoSDistributed Denial of ServiceAn attack that attempts to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of Internet traffic.
DLPData Loss PreventionTools and strategies used to prevent sensitive data from being lost, misused, or accessed by unauthorized users.
EDREndpoint Detection & ResponseSolutions that monitor end-user devices to detect and respond to cyber threats like malware and ransomware.
HIPAAHealth Insurance Portability and Accountability ActU.S. legislation that provides data privacy and security provisions for safeguarding medical information.
IAMIdentity Access ManagementFrameworks and technologies for ensuring that the right individuals in an enterprise have access to the appropriate resources.
IDS/IPSIntrusion Detection System/Intrusion Prevention SystemSystems that monitor network or system activities for malicious activities or policy violations and can take action to prevent or block them.
ISOInternational Organization for StandardizationAn international standard-setting body that develops and publishes various standards, including those for information security (e.g., ISO 27001).
MDRManaged Detection and ResponseServices that provide organizations with threat detection and response capabilities, often delivered by third-party vendors.
MDMMobile Device ManagementSoftware solutions that allow IT administrators to control, secure, and enforce policies on smartphones, tablets, and other endpoints.
NISTNational Institute of Standards and TechnologyA U.S. federal agency that develops and promotes measurement standards, including cybersecurity frameworks.
OSINTOpen Source IntelligenceThe collection and analysis of information gathered from public sources to produce actionable intelligence.
PCI DSSPayment Card Industry Data Security StandardA set of security standards designed to ensure that all companies processing, storing, or transmitting credit card information maintain a secure environment.
PHIProtected Health InformationAny information in a medical record that can be used to identify an individual and that was created, used, or disclosed in the course of providing healthcare services.
PKIPublic Key InfrastructureA framework that manages digital keys and certificates to enable secure data exchange over networks.
RBACRole-Based Access ControlAn approach to restricting system access to authorized users based on their roles within an organization.
RTO/RPORecovery Time Objective/Recovery Point ObjectiveMetrics that define the acceptable amount of time to restore a system (RTO) and the acceptable amount of data loss measured in time (RPO) after a disaster.
SASESecure Access Service EdgeA network architecture that combines WAN capabilities with comprehensive security functions to support the dynamic secure access needs of organizations.
SIEMSecurity Information and Event ManagementA solution that aggregates and analyzes activity from various resources across an IT infrastructure to detect and respond to security threats.
SOCSecurity Operations CenterA centralized unit within an organization responsible for monitoring, detecting, investigating, and responding to cyber threats.
SSOSingle Sign-OnAn authentication process that allows a user to access multiple applications with one set of login credentials.
VPNVirtual Private NetworkA service that encrypts your internet connection and hides your IP address to provide secure and private online communication.
WAFWeb Application FirewallA security solution that protects web applications by filtering and monitoring HTTP traffic between a web application and the Internet.
XSSCross-Site ScriptingA security vulnerability that allows attackers to inject malicious scripts into content viewed by other users.

10 de abril de 2025