A2/AD | antiaccess/area-denial |
APT | advanced persistent threat |
CIA | Central Intelligence Agency |
CIS | Center for Internet Security |
CNSSP | Committee on National Security Systems Policy |
DDoS | distributed denial of service |
DHS | Department of Homeland Security |
DLL | dynamic link library |
DNC | Democratic National Committee |
DCCC | Democratic Congressional Campaign Committee |
DOD | Department of Defense |
EDR | endpoint detection and response |
EU | European Union |
FBI | Federal Bureau of Investigation |
FSB | Federal Security Service |
GDP | gross domestic product |
GGE | Government Group of Experts on Information Security |
GRU | Main Intelligence Directorate |
G7 | Group of Seven |
G20 | Group of Twenty |
HTTP | Hypertext Transfer Protocol |
ICS | industrial control system |
ICS-CERT | Industrial Control System–Computer Emergency Response Team |
ICT | information and communication technology |
IHL | international humanitarian law |
IO | information operations |
IoT | Internet of Things |
IP | internet protocol |
IRA | Internet Research Agency |
IT | information technology |
IW | information warfare |
MMS | multimedia messaging service |
NATO | North Atlantic Treaty Organization |
NIST | National Institute of Standards and Technology |
NSA | National Security Agency |
PDF | Portable Document Format |
PPD | presidential policy directive |
RMF | Risk Management Framework |
RT | Russia Today |
SAP | State Armament Program |
SCADA | supervisory control and data acquisition |
SIEM | security information and event management |
SMB | Server Message Block |
SMS | short message service |
SOAR | security orchestration, automation, and response |
SOC | security operations center |
SSH | Secure Shell |
UK | United Kingdom |
UN | United Nations |
URL | Uniform Resource Locator |
US-CERT | United States Computer Emergency Response Team |
VPN | virtual private network |
WMI | Windows Management Instrumentation |