Acronyms
Acronyms, are used all the time and the author /presentor is usually convinced that everyone in the audience understands what they mean, but every once in a while you hear or read something that you are not sure of the meaning. We are all professionals, that do not want to look like we are the only one in the room who does not know. So after hearing a talk or reading an article we often find ourselves looking it up; this can become confusing because acronyms mean different things when we search outside our field.
For example CE what does it mean?
The letters "CE" are the abbreviation of French phrase "Conformité Européene" which literally means "European Conformity". In the dictionary you will probably find CE meaning Common Era or Christian Era. When looking for a more modern meaning, we will find it may mean Consumer Electronics.
But here in our community, when someone writes CE, they mean Customer Edge.
Here, you have, at your fingertips a list of acronyms, unconfused with other fields.
Please let me know if I missed any acronyms so I can add them to our list.
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
A
ACL - Access Control List
ADC - Application Delivery Controller
ADN - Application delivery network
ADO - Application Delivery Optimization
ALG - Application Layer Gateway
AI - Artificial Intelligence
AJAX - Asynchronous JavaScript and XML
API - Application Programming Interface
APM - Access Policy Manager
ASM - Application Security Manager (F5’s Application Security Manager™ ASM is also known as BD)
AWAF - Advanced Web Application Firewall
AWS - Amazon Web Services
B
BaDos - Behaviour AniDDoS (Behaviour AniDDoS, an F5 product that is used against DDoS)
BDM -- Business Decision Maker
BGP - Border Gateway Protocol
BOO - Build Once Only
C
CDN - Content Delivery Network
CE - Customer Edge
CGNAT - Carrier Grade NAT
CIA triad - Confidentiality, Integrity,Availability (triad Security model)
CIFS - Common Internet file system
CRS - Core RuleSet
CRUD - Create , Read, Update, Delete
CSRF - Cross-Site Request Forgery, also known as XSRF
CUPS - Control Plane and User Plane Separation
CVE - Common Vulnerabilities and exposures
CVSS - Common Vulnerability Scoring System
D
DAP - Digital Adoption Plateform
DAST - Dynamic testing. (Examples of such tools Qualys and Nessus)
DB - Database
DC - Direct Communication / Direct Connect
DDoS - Distributed Denial-of-Service
DGW - Default Gateway Weight Settings Protocol (DGW)
DHCP - Dynamic Host Configuration Protocol
DIO - Distribution Initiated Opportunity
DLP - Data Loss Protection
DMZ - Demilitarized Zone [Demilitarized Zone
DNS - Domain Name System
DoH - DNS over HTTP
DoT - DNS over TLS
DPIAs - Data Protection Impact Assessment
DRP - Disaster Recovery Plan
DSR - Data Subject Rights
E
ELA - Enterprise License Agreement
EDPB - European Data Protection Board
EDR - Endpoint Detection and Response
EPP - Endpoint Protection Platforms
EUSA - End User Software Agreement
F
FIPS - Federal Information Processing Standards
FPGA - field-programmable gate array
FQDN - Fully Qualified Domain Name
FRR - FRRouting
G
GDPR - General Data Protection Regulations
GKE - Google Kubernetes Engine
GPU - Graphic Processing Unit
GSLB - Volterra’s Global Load Balancing
gRPC - Google Remote Procedure Call
H
HIPAA - Health Insurance Portability & Accountability Act
HMAC -Hash-based message authentication
HSL - High-Speed Logging
HTTP - Hypertext Transfer
HTTPS - Hypertext Transfer Protocol
I
IANA - Internet Assigned Numbers Authority
IBD - Integrated Bot Defense
ICO - Information Commission Office
IDS - Intrusion Detection System
IIoT - Industrial Internet of Things
ILM - Information Lifecycle Management
IoT - Internet of Things
IPAM - IP Address Management
IPSec - Internet Protocol Security
IR - Incidence Response
ISO - Standardization Organization
ISP - Internet Service Provider
J
JS - Javascript
K
KMS - Key Management Service / Key Management System
KPI - Key Performance Indicator
KV - Key Value
k8s - Kubernetics
L
L7 - Layer 7 - The application layer
LB - Load Balancer
LBaaS - Load Balancing as a Service
LDAP -Lightweight Directory Access Protocol
LFI - Local File Exclusion attack
LTM - Local Traffic Manager
M
MAM - Mobile Application Management
MDM - Mobile Device Management
MFA - Multi-Factor Authentication
MitM - Man in the Middle
ML - Machine Learning
MSA - Master Service Agreement
MSP - Managed Service Provider
MT - Managed Tenant
mTLS - Mutual Transport Layer Security
MUD - Malicious User Detection
MUM - Malicious User Mitigation
N
NAP - Network access point
NAS - Network-Attached Storage
NAT - Network Address Translation
NIC - NetworkInterface Cards
NFV - Network functions
NFVI - Network functions virtualization
NPU - Network Processing Units
O
OAS - OpenAPI Specification (Swagger)
OPA - Open Policy Agent
OT - Original Tenant
OWASP - Open Web Application Security Project
P
PAAS - Platform as a service (PaaS
PBD - Proactive Bot Defence.
PCI DSS - Payment Card Industry Data Security Standard.
PBD - Privacy by Design
PE - Portable executable
PFS - Perfect Forward Secrecy
PIA - Privacy Impact Assessments
PII - Personally identifiable information
POP - Point of Presence
Q
QoS - Quality of Service
R
RBAC - Role based Access control
RCE - Remote Code Execution
RDP - Remote Desktop Protocol
RE - Routing Engine, Regional Edges
REST - Representational State Transfer *[[Rest API -Representational State Transfer]]*
RFI - Request For Information OR Remote File Inclusion vulnerability attack
RFP - Request for Proposal
RPC - Remote Procedure Call
RSA – (Rivest–Shamir–Adleman) is a public-key cryptosystem
RTT - Round Trip Time
S
SAM - Security Accounts Manager
SAML - Security Assertion Markup Language
SCIM - System for Cross-domain Identity Management
SCP - Secure Copy Protocol
SCP - Server Communication Proxy
SDC - F5 Security and Distributed Cloud
SDK - Software Development Kit
SDN - Software Defined Network
SE - Solutions Engineer
SIEM - Security Information & Event Management
SLA - Service Level Availability
SLED -State,Local Government and Education
SLI - Service Level Indicator
SNAT - Source Network Address Translation
SOC - Security Operations Center
SP - Service Provider
SPK - Service Proxy for Kubernetes
SRE - Site reliability engineering
SRT - Security Research Team at F5
SSD - Solid State Drive
SSL - Secure Sockets Layer
SSO - Single Sign On
SSRF - Server-side request forgery
STRIDE - Spoofing, Tampering,Repudiation,Information Leakage, Denial of Service, Elevation of Privilege (a TMA Model)
T
TCL - Tool Command Language
TCP - [Transmission Control Protocol
TDM - Technical Decision Maker
TLS - Transport layer Security
TMA - Threat Model Assessment
TO - Tenant Owner
TOCTOU - Time of Check vs Time of Use
TOI - Transfer of Information
TTFB - Time to First Bit
TTL - Time to Live
U
UAM - User Access Management
UI - User Interface
URI - Uniform Resource
URL - Uniform Resource Locator
UX - User Experience
V
VER - Volterra Edge Router
VES - Volterra Edge Services
VIF - virtual interface
VIP - Virtual IP address
VM - Virtual Machine
Vnet - Virtual network
VPC - Virtual Private Cloud
VPN - Virtual Private Network
VRS - Volterra Rules Set
W
WAAP - Web Application& API Protection
WAF - Web application firewall
WPA3 - Wi-Fi Alliance Access 3
X
XML - Extensible Markup Language [XML - Wikipedia](https://en.wikipedia.org/wiki/XML)
XSS - Cross Site Scripting
XSRF - Cross-Site Request Forgery, also known as CSRF
Y
Z
ZTNA -Zero Trust Network Access
ZTP - Zero-Touch Provisioning
ZTS - Zero Trust Security
- AndyKEmployee
Very useful!
Just FYI, (grammar nerd alert) these are abbreviations. Only a few are acronyms. Only abbreviations that are pronounced as a word are acronyms. For example AWOL is an acroynm but FBI is an abbreviation.
- DinaSEmployee
Thanks Aubree_Andersen added your acronyms to list
- Aubree_AndersenEmployee
Love this acronym list - helpful to the customer!
A few acronyms for the list from my acronym library:
Access Control List (ACL)
Application Delivery Optimization (ADO)
Application Layer Gateway (ALG)
[BIG-IP] Advanced Firewall Manager (AFM)
Amazon Virtual Private Cloud (Amazon VPC)
FRRouting (FRR)
High-Speed Logging (HSL)
Information Lifecycle Management (ILM)
Mobile Device Management (MDM)
Mobile Application Management (MAM)
Load Balancing as a Service (LBaaS)
Perfect Forward Secrecy (PFS)
Global Points of Presence (PoPs)
Solid State Drive (SSD)
Network-Attached Storage (NAS)
Virtual Private Network (VPN)
Zero-Touch Provisioning (ZTP)
Cheers! -Aubree Andersen
- DinaSEmployee
monteenbysk thanks Monte, I updated the list
- monteenbyskRet. Employee
Dina, here are 10 more you can add:
BDM -- Business Decision Maker
IANA -- Internet Assigned Numbers Authority
IoT -- Internet of Things
IIoT -- Industrial Internet of Things
IPAM -- IP Address Management
ISP -- Internet Service Provider
NAT -- Network Address Translation
QoS -- Quality of Service
SNAT -- Source Network Address Translation
TDM -- Technical Decision MakerCheers,
Monte