- Home
- Resources
- Cheat Sheets
- Cyber Security Acronyms and Terms
Cyber Security Acronyms and Terms
A community-maintained glossary that defines and explains cybersecurity acronyms and terminology to help users understand security concepts beyond buzzwords.

Cyber Security Acronyms and Terms
A community-maintained glossary that defines and explains cybersecurity acronyms and terminology to help users understand security concepts beyond buzzwords.
Cyber Security Acronyms and Terms Description
A curated glossary that provides definitions and explanations for cybersecurity acronyms and terminology used across the industry, open source projects, and non-profit organizations. The resource organizes cybersecurity terms into logical categories to help users understand technical concepts beyond surface-level buzzwords. It covers various domains including encryption algorithms, attack methodologies, vulnerabilities, and threat classifications. The glossary includes explanations for common encryption standards like AES, DES, and RSA, as well as attack vectors such as CSRF, DoS/DDoS, and MITM attacks. It also defines malware categories, vulnerability types, and modern threat concepts like Ransomware as a Service (RaaS). The project accepts community contributions to expand and maintain the accuracy of cybersecurity terminology definitions. This makes it a collaborative resource for security professionals, students, and anyone seeking to understand cybersecurity language and concepts.
Cyber Security Acronyms and Terms FAQ
Common questions about Cyber Security Acronyms and Terms including features, pricing, alternatives, and user reviews.
Cyber Security Acronyms and Terms is A community-maintained glossary that defines and explains cybersecurity acronyms and terminology to help users understand security concepts beyond buzzwords.. It is a Resources solution designed to help security teams with Information Security, Cybersecurity, Training.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox