This article provides a comprehensive glossary of essential terms related to log monitoring, categorized alphabetically from A to Z. Log monitoring is a critical component of cybersecurity, IT operations, and system management, and understanding these terms is vital for professionals in the field.
The list includes acronyms and terminologies widely used in network security, data analysis, threat detection, and compliance management. From foundational concepts like AAA (Authentication, Authorization, and Accounting) and SIEM (Security Information and Event Management) to advanced frameworks like ZTA (Zero Trust Architecture), the article covers the breadth of the domain.
Each term is accompanied by its abbreviation, ensuring clarity and ease of reference for beginners and experts alike. This glossary serves as a valuable resource for IT administrators, security analysts, and anyone involved in system monitoring and cybersecurity.
1 | A | AD (Active Directory) AI (Artificial Intelligence) API (Application Programming Interface) ACL (Access Control List) AAA (Authentication, Authorization and Accounting) AES (Advanced Encryption Standard) ASR (Attack Surface Reduction) APT (Advanced Persistent Threat) |
2 | B | BCP (Business Continuity Planning) BYOD (Bring Your Own Device) BGP (Border Gateway Protocol) BEC (Business Email Compromise) |
3 | C | CTI (Cyber Threat Intelligence) CDN (Content Delivery Network) CVE (Common Vulnerabilities and Exposure) CSPM (Cloud Security Posture Management) CASB (Cloud Access Security Broker) |
4 | D | DLP (Data Loss Prevention) DoS (Denial of Service) DDoS (Distributed Denial of Service) DKIM (DomainKeys Identified Mail) DMARC (Domain-based Message Authentication, Reporting, and Conformance) |
5 | E | EDR (Endpoint Detection and Response) EQL (Elastic Query Language) ESM (Enterprise Security Manager) EWS (Early Warning System) EPP (Endpoint Protection Platform) ETL (Extract, Transform, Load) |
6 | F | FIM (File Integrity Monitoring) FUD (Fully Undetectable) FTP (File Transfer Protocol) |
7 | G | GRC (Governance, Risk and Compliance) GPO (Group Policy Object) GDPR (General Data Protection Regulation) |
8 | H | HIDS (Host-based Intrusion Detection System) HA (High Availability) HTTP (Hyper Text Transfer Protocol) HSM (Hardware Security Module) |
9 | I | IOC (Indicator of Compromise) IDS (Intrusion Detection System) IPS (Intrusion Prevention System) IAM (Identity and Access Management) IR (Incident Response) IPSec (Internet Protocol Security) ISO (International Organization for Standardization) |
10 | J | JSON (JavaScript Object Notation) JWT (JSON Web Token) |
11 | K | KPI (Key Performance Indicator) KQL (Kibana Query Language) KMS (Key Management Service) Kubernetes (Container Orchestration) |
12 | L | LDAP (Lightweight Directory Access Protocol) LFI (Local File Inclusion) |
13 | M | ML (Machine Learning) MDR (Managed Detection and Response) MFA (Multi-Factor Authentication) MTTR (Mean Time to Resolution) MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) |
14 | N | NIST (National Institute of Standards and Technology) NDR (Network Detection and Response) NAC (Network Access Control) NVD (National Vulnerability Database) NGFW (Next-Generation Firewall) NACL (Network Access Control List) |
15 | O | OSINT (Open-source Intelligence) OWASP (Open Web Application Security Project) OIDC (OpenID Connect) OTP (One-Time Password) |
16 | P | PAM (Privileged Access Management) PKI (Public Key Infrastructure) PII (Personally Identifiable Information) |
17 | Q | QoS (Quality of Service) QoE (Quality of Experience) QoI (Quality of Information) |
18 | R | RBA (Risk-Based Alerting) RDP (Remote Desktop Protocol) RCE (Remote Code Execution) RBAC (Role-Based Access Control) |
19 | S | SIEM (Security Information and Event Management) SOAR (Security Orchestration Automation and Response) SOC (Security Operations Center) SSL (Secure Socket Layer) SMTP (Simple Mail Transfer Protocol) SASE (Secure Access Service Edge) SPAN (Switched Port Analyzer) |
20 | T | TIP (Threat Intelligence Platform) TTP (Tactic, Technique and Procedure) TLS (Transport Layer Security) TACACS+ (Terminal Access Controller Access Control System Plus) TLP (Traffic Light Protocol) |
21 | U | UEBA (User and Entity Behavior Analytics) UUID (Universally Unique Identifier) UAC (User Access Control) UTM (Unified Threat Management) URL (Uniform Resource Locator) |
22 | V | VPN (Virtual Private Network) VPC (Virtual Private Cloud) VAPT (Vulnerability Assessment and Penetration Testing) VLAN (Virtual Local Area Network) VDI (Virtual Desktop Infrastructure) |
23 | W | WAF (Web Application Firewall) WPA3 (Wi-Fi Protected Access 3) WHOIS (Domain Lookup Service) |
24 | X | XDR (Extended Detection and Response) XSS (Cross Site Scripting) XaaS (Everything as a Service) XML (Extensible Markup Language) |
25 | Y | YAML (Yet Another Markup Language) YARA (Yet Another Recursive Acronym) |
26 | Z | ZTA (Zero Trust Architecture) ZTLS (Zero Trust Transport Layer Security) ZDI (Zero Day Initiative) ZFS (Zettabyte File System) ZSC (Zero Standing Cloud) |
- How to View SSH Logs on Linux
- How to Choose the Best Penetration Testing Tool for Your Business
- Top 8 Cybersecurity Testing Tools for 2024
- How To Parse FortiGate Firewall Logs with Logstash
- Categorizing IPs with Logstash – Private, Public, and GeoIP Enrichment
- 9 Rules of Engagement for Penetration Testing
- Google vs. Oracle – The Epic Copyright Battle That Shaped the Tech World
- Introducing ChatGPT Search – Your New Gateway to Instant, Up-to-date Information
- Python Has Surpassed JavaScript as the No. 1 Language on GitHub
- [Solution] Missing logstash-plain.log File in Logstash