{"id":475,"date":"2025-01-01T15:11:48","date_gmt":"2025-01-01T14:11:48","guid":{"rendered":"https:\/\/infosecbleep.net\/die-ultimative-informationssicherheits-akronym-liste\/"},"modified":"2025-01-01T19:18:07","modified_gmt":"2025-01-01T18:18:07","slug":"informationssicherheits-akronyme","status":"publish","type":"page","link":"https:\/\/infosecbleep.net\/de\/informationssicherheits-akronyme\/","title":{"rendered":"Die ultimative Informationssicherheits-Akronym-Liste"},"content":{"rendered":"<p>\u00dcberblick \u00fcber Akronyme im Bereich der Informationssicherheit. Diese Seite erhebt nicht den Anspruch, eine vollst\u00e4ndige Liste zu liefern, sondern stellt nur die wichtigsten Begriffe zur Verf\u00fcgung. Auch einige allgemeinel <a href=\"\/?page_id=479\">IT-<\/a>, <a href=\"\/?page_id=494\">OT-<\/a> und <a href=\"\/?page_id=499\">Datenschutz-<\/a>Akronyme sind f\u00fcr die Informationssicherheit relevant, aber diese Liste enth\u00e4lt nur die spezifischen Akronyme f\u00fcr die Informationssicherheit. Die Bedeutung dieser Akronyme zu kennen ist eine wichtige Grundlage um Informationssicherheits-Texte besser zu verstehen.<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>2FA <\/strong>= Two-Factor Authentication<\/li>\n<li><strong>ACL<\/strong> = Access Control List<\/li>\n<li><strong>AES <\/strong>= Advanced Encryption Standard<\/li>\n<li><strong>APT <\/strong>= Advanced Persistent Threat<\/li>\n<li><strong>ATT&amp;CK<\/strong> = Adversarial Tactics, Techniques and Common Knowledge<\/li>\n<li><strong>AUP<\/strong> = Acceptable Use Policy<\/li>\n<li><strong>AV<\/strong> = Anti-Virus<\/li>\n<li><strong>C2 <\/strong>= Command and Control<\/li>\n<li><strong>CA <\/strong>= Certification Authority<\/li>\n<li><strong>CAPTCHA <\/strong>= Completely Automated Public Turing Test to Tell Computers and Humans Apart<\/li>\n<li><strong>CASB <\/strong>= Cloud Access Security Broker<\/li>\n<li><strong>CBC <\/strong>= Cipher Block Chaining<\/li>\n<li><strong>CBC-MAC<\/strong> = Cipher Block Chaining Message Authentication Code<\/li>\n<li><strong>CC<\/strong> = Common Criteria<\/li>\n<li><strong>CEH <\/strong>= Certified Ethical Hacker<\/li>\n<li><strong>CERT <\/strong>= Computer Emergency Response Team<\/li>\n<li><strong>CIAC <\/strong>= Computer Incident Advisory Capability<\/li>\n<li><strong>CSIRT <\/strong>= Computer Security Incident Response Team<\/li>\n<li><strong>CISO<\/strong> = Chief Information Security Officer<\/li>\n<li><strong>CRL<\/strong> = Certificate Revocation List<\/li>\n<li><strong>CTI <\/strong>= Cyber Threat Intelligence<\/li>\n<li><strong>CVE <\/strong>= Common Vulnerabilities and Exposure<\/li>\n<li><strong>CVSS <\/strong>= Common Vulnerability Scoring System<\/li>\n<li><strong>CWE <\/strong>= Common Weakness Enumeration<\/li>\n<li><strong>DAST <\/strong>= Dynamic Application Security Testing<\/li>\n<li><strong>DDoS <\/strong>= Distributed Denial of Service<\/li>\n<li><strong>DES <\/strong>= Digital Encryption Standard<\/li>\n<li><strong>DLP <\/strong>= Data Loss Prevention<\/li>\n<li><strong>DMZ <\/strong>= Demilitarized Zone<\/li>\n<li><strong>DoS <\/strong>= Denial of Service<\/li>\n<li><strong>DRP <\/strong>= Disaster Recovery Plan<\/li>\n<li><strong>E2EE <\/strong>= End-to-End Encryption<\/li>\n<li><strong>EAL <\/strong>= Evaluation Assurance Level<\/li>\n<li><strong>EDR <\/strong>= Endpoint Detection and Response<\/li>\n<li><strong>ERM <\/strong>= Enterprise Risk Management<\/li>\n<li><strong>FDE <\/strong>= Full Disk Encryption<\/li>\n<li><strong>HMAC<\/strong> = <span class=\"BxUVEf ILfuVd\" lang=\"de\"><span class=\"hgKElc\">Hash-Based Message Authentication Code<\/span><\/span><\/li>\n<li><strong>IAM <\/strong>= Identity and Access Management<\/li>\n<li><strong>IBE <\/strong>= Identity-Based Encryption<\/li>\n<li><strong>IDPS <\/strong>= Intrusion Detection and Prevention System<\/li>\n<li><strong>IDS <\/strong>= Intrusion Detection System<\/li>\n<li><strong>IOC <\/strong>= Indicator of Compromise<\/li>\n<li><strong>IPS <\/strong>= Intrusion Prevention System<\/li>\n<li><strong>IPSec <\/strong>= Internet Protocol Security<\/li>\n<li><strong>IR <\/strong>= Incident Response<\/li>\n<li><strong>IRP <\/strong>= Incident Response Plan<\/li>\n<li><strong>IRT <\/strong>= Incident Response Team<\/li>\n<li><strong>ISMS <\/strong>= Information Security Management System<\/li>\n<li><strong>MAC<\/strong> = Message Authentication Code<\/li>\n<li><strong>MDR <\/strong>= Managed Detection and Response<\/li>\n<li><strong>MFA <\/strong>= Multi-Factor Authentication<\/li>\n<li><strong>MSSP <\/strong>= Managed Security Service Provider<\/li>\n<li><strong>NAC <\/strong>= Network Access Control<\/li>\n<li><strong>NDR <\/strong>= Network Detection and Response<\/li>\n<li><strong>NVD <\/strong>= National Vulnerability Database<\/li>\n<li><strong>OSINT <\/strong>= Open Source intelligence<\/li>\n<li><strong>PAM <\/strong>= Privileged Access Management<\/li>\n<li><strong>PAP<\/strong> = Policy Administration Point<\/li>\n<li><strong>PDP<\/strong> = Policy Decision Point<\/li>\n<li><strong>PEP<\/strong> = Policy Enforcement Point<\/li>\n<li><strong>PGP <\/strong>= Pretty Good Privacy<\/li>\n<li><strong>PIP<\/strong> = Policy Information Point<\/li>\n<li><strong>PKI <\/strong>= Public Key Infrastructure<\/li>\n<li><strong>PQC <\/strong>= Post-Quantum Cryptography<\/li>\n<li><strong>PRP<\/strong> = Policy Retrieval Point<\/li>\n<li><strong>PSK <\/strong>= Pre-Shared Key<\/li>\n<li><strong>RBAC<\/strong> = Role-Based Access Control<\/li>\n<li><strong>RPO <\/strong>= Recovery Point Objective<\/li>\n<li><strong>RTO <\/strong>= Recovery Time Objective<\/li>\n<li><strong>SAML<\/strong> = Security Assertion Markup Language<\/li>\n<li><strong>SASE <\/strong>= Secure Access Service Edge<\/li>\n<li><strong>SAST <\/strong>= Static Application Security Testing<\/li>\n<li><strong>SCA <\/strong>= Security Control Assessor<\/li>\n<li><strong>SHA <\/strong>= Secure Hash Algorithm<\/li>\n<li><strong>SIEM <\/strong>= Security Information and Event Management<\/li>\n<li><strong>SOAR <\/strong>= Security Orchestration, Automation, and Response<\/li>\n<li><strong>SOC <\/strong>= Security Operations Center<\/li>\n<li><strong>SSDLC <\/strong>= Secure Software Development Life Cycle<\/li>\n<li><strong>SSH<\/strong> = Secure Shell<\/li>\n<li><strong>SSL <\/strong>= Secure Socket Layer<\/li>\n<li><strong>SSO <\/strong>= Single Sign-On<\/li>\n<li><strong>TLS <\/strong>= Transport Layer Security<\/li>\n<li><strong>TPM <\/strong>= Trusted Platform Module<\/li>\n<li><strong>VPN <\/strong>= Virtual Private Network<\/li>\n<li><strong>WAF <\/strong>= Web Application Firewall<\/li>\n<li><strong>XDR <\/strong>= Extended Detection and Response<\/li>\n<li><strong>ZTNA <\/strong>= Zero Trust Network Access<\/li>\n<\/ul>\n<p>Fehlt in dieser Liste ein wichtiges Informationssicherheits-Acronym? Dann f\u00fcge einen Kommentar hinzu oder <a title=\"\" href=\"\/?page_id=325\">schreib mir eine Nachricht<\/a>.<\/p>\n<p>Schau dir auch die folgenden weiteren Akronym-Listen an:<\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"\/?page_id=479\">IT-Akronyme<\/a><\/li>\n<li><a href=\"\/?page_id=494\">OT-Akronyme<\/a><\/li>\n<li><a title=\"Datenschutz-Akronyme\" href=\"\/?page_id=499\">Datenschutz-Akronyme<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u00dcberblick \u00fcber Akronyme im Bereich der Informationssicherheit. Diese Seite erhebt nicht den Anspruch, eine vollst\u00e4ndige Liste zu liefern, sondern stellt nur die wichtigsten Begriffe zur Verf\u00fcgung. Auch einige allgemeinel IT-, OT- und Datenschutz-Akronyme sind f\u00fcr die Informationssicherheit relevant, aber diese Liste enth\u00e4lt nur die spezifischen Akronyme f\u00fcr die Informationssicherheit. Die Bedeutung dieser Akronyme zu kennen [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"footnotes":""},"categories":[52],"tags":[],"class_list":["post-475","page","type-page","status-publish","hentry","category-akronym-listen","content-columns-1"],"_links":{"self":[{"href":"https:\/\/infosecbleep.net\/de\/wp-json\/wp\/v2\/pages\/475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosecbleep.net\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosecbleep.net\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosecbleep.net\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosecbleep.net\/de\/wp-json\/wp\/v2\/comments?post=475"}],"version-history":[{"count":14,"href":"https:\/\/infosecbleep.net\/de\/wp-json\/wp\/v2\/pages\/475\/revisions"}],"predecessor-version":[{"id":524,"href":"https:\/\/infosecbleep.net\/de\/wp-json\/wp\/v2\/pages\/475\/revisions\/524"}],"wp:attachment":[{"href":"https:\/\/infosecbleep.net\/de\/wp-json\/wp\/v2\/media?parent=475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosecbleep.net\/de\/wp-json\/wp\/v2\/categories?post=475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosecbleep.net\/de\/wp-json\/wp\/v2\/tags?post=475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}