| SCADA | Supervisory Control and Data Acquisition |
| DoS | Denial of Service |
| CIA | Confidentiality, Integrity, and Authenticity |
| DNP3 | Distributed Network Protocol 3 |
| CI | Critical Infrastructure |
| IT | Information Technology |
| OT | Operational Technology |
| RAAC | Ransomware-as-a-Corporation |
| CSIS | Center for Strategic and International Studies |
| VPN | Virtual Private Network |
| MITM | Man-in-the-Middle |
| DNS | Domain Name System |
| TCP | Transmission Control Protocol |
| SSL | Secure Socket Layer |
| FDIA | False Data Injection Attack |
| ICMP | Internet Control Message Protocol |
| CWE | Common Weakness Enumeration |
| ARP | Access Resolution Protocol |
| SOC | Security Operating Center |
| APT | Advanced Persistent Threat |