| AV | Access Vector or Attack Vector |
| AC | Access Complexity or Attack Complexity |
| AU | Authentication |
| BS | Base Score |
| BYOD | Bring Your Own Device |
| CIA | Confidentiality, Integrity, and Accessibility |
| CIS | Center for Internet Security |
| CVSS | Common Vulnerability Scoring System |
| DDoS | Distributed Denial of Service |
| EMM | Enterprise Mobile Management |
| ES | Environmental Score |
| GRBF | Gaussian Radial Basis Function |
| ICT | Information and Communications Technology |
| ISS | Impact Sub-Score |
| kNN | k-Nearest Neighbours |
| KSVM | Kernel Support Vector Machine |
| MCR | Misclassification Rate |
| MDM | Mobile Device Management |
| ML | Machine Learning |
| NB | Naive Bayes |
| NTP | Natural Language Processing |
| NLTK | Natural Language Toolkit |
| NVD | National Vulnerabilities Database |
| OvO | One-vs.-One |
| PCA | Principal Component Analysis |
| PNN | Probabilistic Neural Network |
| PR | Privileges Required |
| QSRS | Qualitative Severity Rating Scale |
| S | Scope |
| SIMCA | Soft Independent Modelling of Class Analogies |
| SMO | Sequential Minimal Optimisation |
| TD | Target Distribution |
| TS | Time Score |
| UEM | Unified Endpoint Management |
| UI | User Interaction |
| VMC | Vulnerability Management Center |