Cyber Security


Stands for Assured Compliance Assessment Solution. An integrated software solution that provides automated network vulnerability scanning, configuration assessment, and network discovery. Consists of a suite of COTS applications. It is mandated for the Department of Defense (DoD) use by various U.S. Cyber Command task orders.

Access Control List

A set of rules that specify precise standards for destinations and protocols allowed or forbidden. It is used to filter traffic in networks as required by the security policy.

Active Directory

A directory service that is used to manage permissions and access to networked resources. Developed for the Windows domain networks.

Advanced Persistent Threat

A type of cyber attack in which the attacker gains ongoing access to the system to mine highly sensitive data. The attacker remains undetected for an extended period of time.

Anti Spam Firewall

A software or hardware appliance-based firewall. It is used to keep spam and malware from entering a system.


Stands for Cisco Certified Network Associate. An associate-level Cisco career certification.


Stands for Cisco Certified Network Professional. A professional-level Cisco Career Certification.


Stands for Certified Ethical Hacker. A certification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system. It is issued by the organization EC-Council.


Stands for Certified Information Systems Auditor. Issued by ISACA for the people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected. It demonstrates that an individual is is able to assess vulnerabilities, report on compliance and institute controls within the enterprise.

Cisco Certifications

A list of the Certifications offered by Cisco Systems. They offer five levels of network certification: Entry, Associate, Professional, Expert, and Architect.


Stands for Certified Information Security Manager. Issued by ISACA. Demonstrates that an individual is able to manage, design, and oversee and assess an enterprise’s information security.


Stands for Certified Information Systems Security Professional. Independent information security certification issued by the International Information System Security Certification Consortium, also known as (ISC)². Demonstrates that an individual is able to effectively design, implement and manage a best-in-class cybersecurity program.

Computer Forensics

Determines and reveals technical criminal evidence to provide a conclusive description of cyber crime activities. May also be used in civil proceedings. It refers only to the investigation of computers.


A practice of secure communication techniques. Information and communication are protected through the use of codes. Only those who possess a secret key can decipher the message into plain text.

Cyber Risk Remediation Analysis

A methodology for selecting countermeasures to minimize a cyber-asset's susceptibility to cyber-attack over a range of attack TTPs associated with the Advanced Persistent Threat (APT).

Data Loss Prevention

A set of tools and processes. Detects and prevents data breaches, exfiltration, or unwanted destruction of sensitive data. 

Digital Forensics

A branch of forensic science. Refers to detecting, preserving, analyzing and presenting of evidence found on any digital storage media devices.

DoD 8570

Information Assurance Workforce Improvement Program. Provides procedures and guidelines for the training, certification, and management of all DoD employees who perform IA functions in their official assigned duties.


Stands for the Enterprise Mission Assurance Support Service. An automated tool helps the Department of Defense (DoD) to maintain Information Assurance (IA) situational awareness, manage risk, and comply with the Federal Information Security Management Act (FISMA).


A process of converting data or information into another form, or code, to make it unreadable for unauthorized users. Only people who know a descryption key can read it.


Stands for GIAC Certified Intrusion Analyst. A certification issued by Global Information Assurance Certification. Demonstrates that an individual is able to configure and monitor intrusion detection systems, and to read, interpret, and analyze network traffic and related log files.


Stands for GIAC Certified Incident Handler. A certification issued by Global Information Assurance Certification. Demonstrates that an individual is able to understand what a Security Incident is and to deal with an incident after it has occurred.


Stands for GIAC Security Essentials Certification. Issued by Global Information Assurance Certification. Demonstrates that an individual understands information security beyond simple terminology and concepts.


A Host Based Security System. Commercial-off-the-shelf (COTS) suite of software applications. Monitors, detects, and defends the Department of Defence (DoD) computer networks and systems.  


Stands for Host Intrusion Prevention System. Aims to protect endpoint devices. Stops malware by monitoring the behavior of the code.

Development by

Sign up for updates
straight to your inbox