Common MIS Abbreviations

Last Update 4/29/2022

2FA
Two-factor Authentication
3DES
Triple DES

A

ABAC
Attribute-Based Access Control
ACL
Access Control Lists
AD CS
Certificate Services
AD DS
Domain Services
AD FS
Federation Services
AD LDS
Lightweight Directory Services
AD RMS
Rights Management Services
AD
Active Directory
AD
Administrative Distance
AD
Microsoft Active Directory
ADSL
Asymmetrical Digital Subscriber Line
AES
Advanced Encryption Standard
AES-CCMP
AES-Counter Mode CBC-MAC Protocol
AI
Artificial Intelligence
AICPA
American Institute of Certified Public Accountants
AIT
Advanced Imaging Technology
ALE
Annualized Loss Expectancy
ALE
Application Level Events
ALM
Application life Cycle Management
ALU
Arithmetic / Logic Unit
AMD-V
AMD Virtualization
AMI
Amazon Machine Images
A-MPDU
Aggregated Mac Protocol Data Unit
A-MSDU
Aggregated Mac Service Data Unit
AP
Wireless Access Point
API
Application Programming Interface
APT
Advanced Persistent Threat
AR
Assisted Reality
ARN
Amazon Resource Number
ARO
Annualized Rate of Occurrence
ARP
Address Resolution Protocol
ARPA
Advanced Research Projects Agency
AS
Authentication Service
ASD
Adaptive Software Development
ASG
Application Security Group
ASN
Autonomous System Number
ASP
Application Service Provider
ATM
Asynchronous Transfer Mode
AUP
Acceptable Use Policy
AWS
Amazon Web Services
AZ
Availability Zones

B

B2B
Business-to-Business E-Commerce
B2C
Business-to-Consumer E-Commerce
BC
Business Continuity
BCI
Brain Computer Interface
BCP
Business Continuity Plan
Bd
Baud Rate
BGP
Border Gateway Protocol
BIA
Business Impact Analysis
BIND
Berkeley Internet Name Domain
Blob
Binary Large Object
BPA
Business Partnership Agreement
BPDU
Bridge Protocol Data Unit
BSS
Basic Service Set
BSSID
Basic Service Set Identifier
BTRFS
B-Tree File System
BYOA
Bring Your Own Application
BYOC
Bring Your Own Cloud
BYOD
Bring Your Own Device

C

CA
Call Agent
CA
Certificate Authority
CAC
Common Access Card
CALEA
Communications Assistance for Law Enforcement Act
CAM
Computer-Assisted Manufacturing
CAM
Content Addressable Memory
CAPWAP
Control and Provisioning of Wireless Access Points
CASB
Cloud Access Security Broker
CASB
Cloud Application Security Broker
CASE
Computer-Aided Software Engineering
CBIS
Computer Based Information System
CBT
Computer-Based Training
CCN
Content-Centric Networking
CCTV
Closed Circuit TV
CD
Carrier Detect Light
CDMA
Code Division Multiple Access
CER
Crossover Error Rate
CET
Carrier Ethernet Transport
CFT
Capture the Flag
CGW
Customer Gateway
CHAP
Challenge Handshake Authentication Protocol
CIA
Confidentiality, Integrity, Availability
CIDR
Classless Interdomain Routing Notation
CIFS
Common Internet File System
CIM
Computer-Integrated Manufacturing
CIO
Chief Information Officer
CIR
Committed Information Rate
CIS
Center for Internet Security
CISO
Chief Information Security Officer
CKO
Chief Knowledge Officer
CLI
Command Line Interface
CM
Configuration Management
CMDB
Configuration Management Database.
CMP
Cloud Management Platform
CO
Central Office
CoAP
Constrained Application Protocol Working Group
Coax
Coaxial Cable
Colo
Colocation
COOP
Continuity of Operations Plan
COPE
Corporate Owned Personally Enabled
CoRe
Constrained RESTful Environment Working Group
CoS
Class of Service
CoT
Cloud of Things
CPU
Central Processing Unit
CRM
Customer Relationship Management
CRM
Customer Resource Management
CRT
Cathode Ray Tube
CSF
Critical Success Factor
CSF
Cybersecurity Framework
CSMA/CA
Carrier Sense Multiple Access with Collision Avoidance
CSP
Cloud Service Provider
CSP
Content Security Policy
CSRF
Cross-site Request Forgery aka Client-side Forgery
CSS
Cascading Style Sheets
CSU
Channel Service Unit
CTF
Capture the Flag
CTO
Chief Technology Officer
CVSS
Common Vulnerability Scoring System
CWDM
Course Wavelength Division Multiplexing
CYOD
Choose Your Own Device

D

DAC
Discretionary Access Control
DAI
Dynamic ARP Inspection
DAP
Directory Access Protocol
DAS
Direct Attached Storage
DASD
Direct Access Storage Device
DBA
Database Administrator
DBMS
Database Management System
DCE
Data Communications Equipment
DCS
Distributed Control System
DDL
Data Definition Language
DDNS
Dynamic DNS
DDoS
Distributed Denial of Service Attack
Demux
Demultiplexer
DES
Data Encryption Standard
DevOps
Development and Operations
DFD
Data Flow Diagram
DHCP
Dynamic Host Configuration Protocol
DHCPv6
Dynamic Host Configuration Protocol version 6
DiD
Defense-in-Depth strategies
DIX
Ethernet II
DLCI
Data-Link Connection Identifier
DLL
Dynamic-Link Library
DLP
Data Loss Prevention
DMZ
Demilitarized Zone
DNAT
Dynamic Network Address Translation
DNS
Domain Name System
DNSSEC
Domain Name System Security Extensions
DOCSIS
Data Over Cable Service Interface Specification
DoS
Denial of Service Attack
DR
Disaster Recovery
DRM
Digital Rights Management
DRP
Disaster Recovery Plan
DSL
Digital Subscriber Line
DSLAM
DSL Access Multiplexer
DSS
Decision Support Systems
DSU
Data Service Unit
DTE
Data Terminal Equipment
DVD
Digital Video Disk
DWDM
Dense Wavelenth Division Multiplexing

E

EAP
Extensible Authentication Protocol
EBS
Elastic Block Storage
E-Commerce
Electronic Commerce
EDGE
Enhanced Data Rates for GSM Evolution (same as EGPRS)
EDI
Electronic Data Interchange
eDiscovery
electronic discovery
EDR
Endpoint Detection and Response
EFS
Elastic File System
EFT
Electronic Funds Transfer
EGP
Exterior Gateway Protocols
EGPRS
Enhanced GPRS
EIGRP
Enhanced Interior Gateway Routing Protocol
EIS
Executive Information Systems
EMI
Electromagnetic Interference
EmSec
Emission Security
EOL
End of Life
EOQ
Economic Order Quantity
EOS
End of Service
EPC
Electronic Product Code
EPCIS
EPC Information Service
ER-D
Entity-Relationship Diagram
ERP
Enterprise Resource Planning
ES
Expert Systems
ESD
Electrostatic Discharge
ESI
Electronically Stored Information or Active Data
ESS
Executive Support Systems
ESS
Extended Service Set
ESSID
Extended Service Set Identifier
ETSI
European Telecommunication Standards Institute
EUI-64
64-bit Extended Unique Identifier
Ext4
Fourth Extended File System

F

FAR
False Acceptance Rate
FAT32
File Allocation Table
FC
Fibre Channel
FCS
Frame Check Sequence
FDM
Frequency Division Multiplexing
FIM
Federated Identity Management or just Federation
FIM
File Integrity Monitoring
FIT
Failure in Time
FMS
Flexible Manufacturing System
FP
Fat Provisioning (aka thick provisioning)
FP7
Seventh Framework Program of the European Union
FPGA
Field-Programmable Gate Array
FQDN
Fully Qualified Domain Name
FRR
False Rejection Rate
FSx
Third Party File System
FTP
File Transfer Protocol
FTP
File Transfer Protocol
FTPS
File Transfer Protocol Secure
FTTH
Fiber to the Home
FTTP
Fiber to the Premises

G

G.Lite
a version of ADSL
GBIC
Gigabit Interface Converter
GCP
Google Cloud Platform
GDSS
Group Decision Support Systems
GEO
Geosynchronous Earth Orbit
GIS
Geographic Information System
GPRS
General Packet Radio Services
GPS
Global Positioning System
GRE
Generic Routing Encapsulation
GSLB
Global Server Load Balancing or Multi-Site Load Balancing
GSM
Global System for Mobile Communications
GSS
Group Support Systems
GUI
Graphical User Interface

H

HA
High Availability
HAV
Hardware-Assisted Virtualization
HDSL
High Bit-Rate DSL
HFC
Hybrid Fiber-Coax
HIDS
Host Intrusion Detection System
HIPPA
Health Insurance Portability and Accountability Act
HIPS
Host Intrusion Prevention System
HMD
Head-Mounted Display
HSM
Hardware Security Module
HSPA+
High Speed Packet Access Plus
HSRP
Hot Standby Routing Protocol
HSTS
HTTP Strict Transport Security
HT
Hyperthreading
HTML
Hypertext Markup Language
HTTP
Hypertext Transfer Protocol
HTTPS
HTTP secure
HVAC
Heating, Ventilation, and Air Conditioning
HVD
Holographic Versatile Disk

I

IaaS
Infrastructure as a Service
IAB
Internet Architecture Board
IaC
Infrastructure as Code
IAM
Identity and Access Management
ICANN
Internet Corporation for Assigned Numbers and Names
ICMP
Internet Control Message Protocol
ICN
Information Centric Networking
ICS
Industrial Control System
ICT
Information and Communications Technology
IDF
Intermediate Distribution Frame
IDS
Intrusion Detection System
IETF
Internet Engineering Task Force
IG or IGW
Internet Gateway
IGMP
Internet Group Management Protocol
IGP
Interior Gateway Protocol
IGRP
Interior Gateway Routing Protocol
IMAP
Internet Message Access Protocol
IMAP4
Internet Message Access Protocol v4
Integrated IS-IS
Intermediate System to Intermediate System
IOC
Indicator of Compromise
IoE
Internet of Everything
IOPS
Input/Output Operations Per Second
IoT
Internet of Things
IoT-A
IoT-Architecture
IP
Internet Protocol
IPAM
IP Address Management
IP-PBX
Digital PBX
IPS
Intrusion Prevention System
IPsec
Internet Protocol Security
IPv4
Internet Protocol version 4
IPv6
Internet Protocol Version 6
iSCSI
Internet SSCI
ISDN
Integrated Services Digital Network
IS-IS
Intermediate System to Intermediate System
ISMS
Information Security Management System
ISO
International Organization for Standardization
ISP
Internet Service Provider
IV
Initialization Vector
IX or IP
Internet Exchange Point

J

JBOD
Just a Bunch of Disks
JIT
Just-In-Time Inventory

K

KDC
Key Distribution Center
KMS
Key Management System
KMS
Knowledge Management System
KPI
Key Performance Indicators
KRI
Key Risk Indicators

L

L2TP
Layer 2 Tunneling Protocol
LAN
Local Area Network
LCD
Liquid Crystal Display
LDAP
Lightweight Directory Access Protocol
LEAP
Lightweight EAP
LLRP
Low Level Reader Protocol
LR-WPAN
Low Rate Wireless Personal Area Networks
LTE
Long Term Evolution
LUN
Logical Unit Number
LWAPP
Lightweight Access Point Protocol

M

M2M
Machine-to-Machine
MAC
Mandatory Access Control
MAC
Media Access Control
MAM
Mobile Application Management
MAN
Metro Ethernet or Ethernet MAN Connections
MAN
Metropolitan Area Network
MCM
Mobile Content Management
M-Commerce
Mobile E-Commerce
MCU
Multipoint Control Unit
MD5
Message Digest algorithm 5
MDF
Main Distribution Frame
MDM
Mobile Device Management
MEF
Metro Ethernet Forum
MFA
Multifactor Authentication
MGC
Media Gateway Controller
MGCP
Media Gateway Control Protocol
MIB
Management Information Base
MIC
Mandatory Integrity Control
MICR
Magnetic Ink Character Recognition
MIME
Multipurpose Internet Mail Extensions
MIMO
Multiple Input-Multiple Output
MIS
Management Information Systems
MITB
Man-in-the-browser
MitM
Man in the Middle attack
ML
Machine Learning
MLA
Master License Agreement
MMF
Multimode Fiber
MMS
Multimedia Messaging Service
MOU
Memorandum of Understanding
MPLS
Multiprotocol Label Switching
MRP
Manufacturing Resource Planning
MSA
Master Service Agreement
MSA
Measurement System Analysis
MSC
Mobile Switching Center
MS-CHAP
Microsoft Challenge Handshake Authentication Protocol
MSDS
Materials Safety Data Sheet
MSP
Managed Service Provider
MSSP
Managed Security Service Provider
MSTP
Multiple Spanning Tree Protocol
MTBF
Mean Time Between Failure
MTSO
Mobile Telecommunications Switching Office
MTTR
Mean Time to Recovery
MTTR
Mean Time To Restore
MTU
Master Terminal Unit
MTU
Maximum Transmission Unit
MU-MIMO
Multiuser MIMO

N

NAC
Network Access Control
NACL
Network Access Control List
NAS
Network Attached Storage
NAT mode
Network Address Translation Mode
NAT
Network Address Translation
NDA
Nondisclosure Agreement
NDN
Named Data Networking
NEXT
Near End Cross Talk
NFC
Near Field Communication
NFV
Network Functions Virtualization
NGFW
Next Generation Firewalls
NGW
NAT Gateways
NICs
Network Interface Card
NID
Network Interface Device
NIDS
Network Intrusion Detection System
NIPS
Network Intrusion Prevention System
NIU
Network Interface Unit
NMS
Network Management System
NOS
Network Operating System
NSG
Network Security Group
nslookup
Name space lookup
NSP
Network Service Provider
NTFS
New Technology File System
NTLM
NT LAN Manager Authentication Protocol
NTP
Network Time Protocol
NUI
Natural User Interface
NVA
Network Virtual Appliance
NVMe
Nonvolatile Memory Express

O

OAuth
Open Authentication
OC
Optical Carrier Level
OCR
Optical Character Recognition
OLA
Operational Level Agreement
OLAP
Online Analytical Processing
OLED
Organic Light-Emitting Diode
OLT
Optical Line Terminal
OLTP
Online Transaction Processing
OMR
Optical Mark Recognition
ONS
Object Naming Service
ONU
Optical Network Unit
OODBS
Object-Oriented Database Management System
OOSD
Object-Oriented Systems Development
OPM
Optical Power Meter
ORDBMS
Object-Relational Database Management System
OS
Operating System
OSI
Open Systems Interconnection
OSINT
Open Source Intelligence
OSPF
Open Shortest Path First
OTP
One-Time Password
OUI
Organizationally Unique Identifier, or block ID or company ID
OVA
Open Virtual Appliance
OVF
Open Virtualization Format

P

P2P
Peer-to-Peer
P2P
Physical to Physical
P2V
Physical to Virtual
PaaS
Platform as a Service
PAC
Proxy Automatic Configuration
PAM
Pluggable Authentication Modules
PAN
Personal Area Network
PAP
Password Authentication Protocol
PAT
Port Address Translation
PBX
Private Branch Exchange
PCI DSS
Payment Card Industry Data Security Standard
PCI DSS
Payment Card Industry Data Security Standards
PCI
Peripheral Component Interconnect
PCIe
PCI Express
PDU
Power Distribution Unit
PDU
Protocol Data Unit
PEAP
Protected EAP
PERT
Program Evaluation and Review Technique
PHI
Protected Health Information
PII
Personally Identifiable Information
Ping
Packet Internet Groper
PIV
Personal Identity Verification
PKI
Public Key Infrastructure
PLC
Programmable Logic Controller
PLM
Product Lifecycle Management
PoE
Power over Ethernet
PON
Passive Optical Network
POP
Point of Presence
POP
Post Office Protocol)
POP3
Post Office Protocol v3
POS
Point of Sale
POTS
Plain Old Telephone Service
PPP
Point-to-Point Protocol
PPPoE
PPP over Ethernet
PPTP
Point-to-Point Tunneling Protocol
PSI
Publish-Subscribe Internet
PSK
Preshared Key
PSTN
Public Switched Telephone Network
PUP
Potentially Unwanted Program
PVC
Permanent Virtual Circuit

Q

QBE
Query By Example
QoS
Quality of Service
QR
Quick Response Codes

R

RAD
Rapid Application Development
RADIUS
Remote Authentication Dial-In User Service
RAID
Redundant Array of Independent Drives
RAM
Random Access Memory
RAS
Remote Access Server
RAT
Remote Access Trojan
RBAC
Role-Based Access Control
RB-RBAC
Rule-Based Role-Based Access
RC5
Rivest Cipher 5
RCS
Rich Communication Services
RCSA
Risk Control Self-Assessment
RDP
Remote Desktop Protocol
ReFS
Resilient File System
REST
REpresentational State Transfer
RESTful
that follows REST principles
RFC
Request for Comments
RFI
Radio Frequency Interference
RFID
Radio Frequency Identification
RFP
Request For Proposal
RIP
Routing Information Protocol
RIPv2
Routing Information Protocol v2
RMF
Risk Management Framework
ROM
Read-Only Memory
ROP
Reorder Point
RPO
Recovery Point Objective
RSTP
Rapid Spanning Tree Protocol
RTCP
Real-Time Transport Control Protocol
RTO
Recovery Time Objective
RTP
Real-Time Transport Protocol
RTS/CTS
Request to Send / Clear to Send Protocol
RTT
Round-Trip Time
RTU
Remote Terminal Units

S

S3
Simple Storage Service
SAaas
Sensing and Actuation as a Service
SaaS
Software as a Service
SAE
Simultaneous Authentication of Equals
SAML
Security Assertation Markup Language 2.0
SAN
Storage Area Network
SAS
Serial Attached SCSI
SASD
Sequential Access Storage Device
SATA
Serial Advanced Technology Attachment
SCADA
Supervisory Control and Data Acquisition
SCM
Supply Chain Management
SCP
Secure Copy Protocol
SCSI
Small Computer Systems Interface
SDH
Synchronous Digital Hierarchy
SDLC
Systems Development Life Cycle
SDLS
Symmetric DSL
SDN
Software Defined Networking
SDV
Software-Defined Visibility
SECaaS
Security as a Service
SEND
Secure Neighbor Discovery protocol
SFP
Small Form-Factor Pluggable Transceivers
SFTP
Secure File Transfer Protocol
SHA
Secure Hash Algorithm
SHA-2
Secure Hash Algorithm Version 2
SHDSL
Single Line High Bit Rate DSL
SID
Security Identifier
SIEM
Security Information and Event Management
SIM
Subscriber Identity Module
SIP
Session Initiation Protocol
SLA
Service Level Agreement
SLIP
Serial Line Internet Protocol
SMB
Server Message Block
SMF
Single Mode Fiber
SMS
Short Message Service
SMT
Simultaneous Multithreading
SMTP
Simple Mail Transfer Protocol
SNAT
Static Network Address Translation
SNMP
Simple Network Management Protocol
SNMPv1
Simple Network Management Protocol V1
SNMPv2
Simple Network Management Protocol V2
SNMPv3
Simple Network Management Protocol V3
SNR or S/N
Signal-to-Noise Ratio
SNS
Social Networks Service
SOA
Service Oriented Architecture
SOAR
Security Orchestration, Automation, and Response
SoC
System on a Chip
SONET
Synchronous Optical Network
SOW
Statement of Work
SPB
Shortest Path Bridging
SQL
Structured Query Language
SR
Super Router
SSAE
Statements On Standards for Attestation Engagements
SSH
Secure Shell
SSID
Service Set Identifier
SSL
Secure Sockets Layer
SSN
Semantic Sensor Network
SSO
Single Sign-On
SSOT
Single Source of Truth
SSRF
Server-Site Request Forgery
STA
IEEE 802.1d spanning-tree algorithm
STIX
Structured Threat Information Expression
STP
Shielded Twisted Pair
STP
Spanning Tree Protocol
SVC
Switched Virtual Circuit
SWG
Next Generation Secure Web Gateway

T

T-1
Terrestrial Carrier Level 1
TaaS
Thing as a Service
TACACS
Terminal Access Control Access Control System
TACACS+
Terminal Access Controller Access Control System Plus
TAXII
Trusted Automated Exchange of Intelligence Information
TCP/IP
Transmission Control Protocol / Internet Protocol
TCP
Transmission Control Protocol
T-CXR
T-carrier standards
TDM
Time Division Multiplexing
TEDS
Transducer Electronic Data Sheets
TFTP
Trivial File Transfer Protocol
TKIP
Temporal Key Integrity Protocol
TLS
Transport Layer Security
TOTP
Time-Based One-Time Password
TP
Thin Provisioning
TPM
Trusted Platform Module
TPS
Transaction Processing Systems
TRILL
Transparent Interconnection of Lots of Links
Trusted OS
Trusted Operating System
TTLS
Tunneled Transport Layer Security
TTP
Adversary Tactics, Techniques, and Procedures
TTRFB
Time to First Byte
TVC
Video Teleconference

U

UDP
User Datagram Protocol
UDR
User-Defined Routing
UEFI
Unified Extensible Firmware Interface
UEM
Unified Endpoint Management
UPS
Uninterruptible Power Supply
URI
Universal Resource Identifier
URL
Uniform Resource Locator
USB OTG
USB On-The-Go
UTC
Coordinated Universal Time
UTM
Unified Threat Management
UTP
Unshielded Twisted Pair

V

V2P
Virtual to Physical
V2V
Virtual to Virtual
VDI
Virtual Desktop Infrastructure
VDI
Virtual Disk Image
VDI
Virtualized Desktop Infrastructure
VDSL
Very High Bit-Rate DSL
VE
Virtual Entity
VGW
Virtual Gateway Service
VHD
Virtual Hard Disk
VIP
Virtual IP address
VLAN
Virtual Local Area Network
VM
Virtual Machine
VMDK
Virtual Machine Disk
VNI or VNID
VXLAN Network ID
vNIC
Virtual Network Adaptor
VoD
Video on Demand
VoIP
Voice Over IP
VPC
Virtual Private Cloud
VPN
Virtual Private Network
VR
Virtual Reality
vRAM
Virtual RAM
VRRP
Virtual Router Redundancy Protocol
Vswitch
Virtual Switch
VT
Virtualization Technology
VTEP
VXLAN Tunnel Endpoint
VXLAN
Virtual Extensible LAN

W

W3C
World Wide Web Consortium
WAF
Web Application Firewall
WAN
Wide Area Network
WAP
Wireless Access Point
WDM
Wavelength Division Multiplexing
WEP
Wired Equivalent Privacy
Wi-Fi Analyzer
Wireless Analyzer
WiMAX
Worldwide Interoperability for Microwave Access
WISP
Wireless Identification and Sensing Platforms
WMN
Mesh WLAN or Wireless Mesh Network
WoT
Web of Things
WPA/WPA2
Wi-Fi Protected Access
WPA
Wi-Fi Protected Access
WPS
Wi-Fi Protected Setup
WSAN
Wireless Sensor and Actuator Networks
WSN
Wireless Sensor Networks

X

XaaS
Anything as a Service
XaaS
Anything as a Service / Everything as a Service
XHTML
Extensible Hyptertext Markup Language
XML
eXtensible Markup Language
XML
Extensible Markup Language
XP
eXtreme Programming
XSS
Cross-Site Scripting
X-XSS
Cross Site Scripting Protection

Y

Z

ZFS
Z File System