Glossary
Abbreviation |
Term |
Definition |
CIS |
Center for
Internet Security |
|
CMMC |
Cybersecurity
Maturity Model Certification |
|
DFARS |
Defense Federal
Acquisition Regulation Supplement |
|
FARS |
Federal
Acquisition Regulation |
|
FISMA |
Federal
Information Security Management Act |
|
GDPR |
General Data
Protection Regulation |
The official PDF
of the Regulation (EU) |
HIPAA |
Health Insurance
Portability and Accountability Act of 1996 |
|
IDS |
Intrusion
Detection System |
An intrusion
detection system (IDS) is a device or software application that monitors a
network or systems for malicious activity or policy violations. Any detected
activity or violation is typically reported either to an administrator or
collected centrally using a security information and event management (SIEM)
system |
IPS |
Intrusion
Prevention Systems |
Intrusion
prevention systems (IPS), also known as intrusion detection and prevention
systems (IDPS), are network security appliances that monitor network or
system activities for malicious activity. The main functions of intrusion
prevention systems are to identify malicious activity, log information about
this activity, report it and attempt to block or stop it. |
MSP |
Managed Service
Provider |
|
MSSP |
Managed Security
Service Provider |
|
NIST |
National
Institute of Standards and Technology |
NIST's compliance
standards assist federal agencies and contractors to meet requirements
mandated under the Federal Information Security Management Act (FISMA) and
other regulations. ... These guidelines represent best practices for security
controls to safeguard and protect confidential information and data. |
OSHA |
Occupational
Safety and Health Administration |
|
PCI |
Payment Card
Industry |
|
PEN test |
Penetration test |
|
Sandbox |
Sandbox |
A Sandbox is a virtual space in which new or untested software can be run securely. |
SIEM |
Security Information
and Event Management |
Security
information and event management (SIEM) technology supports threat detection
and security incident response through the real-time collection, reporting,
correlation and historical analysis of security events from a wide variety of
event and data sources such as logs and applications. |
SMB |
Small /
Medium-size Business |
|
USM |
Unified Threat
Management |
Unified security
management (USM) is a platform of security products. Typical feature sets
fall into three main subsets, all within the USM: intrusion detection system
(IDS), security incident and event management (SIEM), vulnerability
assessment, and behavioral monitoring. |
UTM |
Unified Threat
Management |
Unified threat
management (UTM) is a platform of security products. Typical feature sets
fall into three main subsets, all within the UTM: firewall/intrusion
prevention system (IPS)/virtual private network, secure Web gateway security
(URL filtering, Web antivirus [AV]) and messaging security (anti-spam, mail
AV). |
WAF |
Web Application
Firewall |
A Web application
firewall (WAF) is a firewall that monitors, filters or blocks the HTTP
traffic to and from a Web application. |
CIS |
Center for
Internet Security |
|
CMMC |
Cybersecurity
Maturity Model Certification |
|
DFARS |
Defense Federal
Acquisition Regulation Supplement |
|
FARS |
Federal
Acquisition Regulation |
|
FISMA |
Federal
Information Security Management Act |
|
GDPR |
General Data
Protection Regulation |
The official PDF
of the Regulation (EU) |
HIPAA |
Health Insurance
Portability and Accountability Act of 1996 |
|
IDS |
Intrusion
Detection System |
An intrusion
detection system (IDS) is a device or software application that monitors a
network or systems for malicious activity or policy violations. Any detected
activity or violation is typically reported either to an administrator or
collected centrally using a security information and event management (SIEM)
system |
IPS |
Intrusion
Prevention Systems |
Intrusion
prevention systems (IPS), also known as intrusion detection and prevention
systems (IDPS), are network security appliances that monitor network or
system activities for malicious activity. The main functions of intrusion
prevention systems are to identify malicious activity, log information about
this activity, report it and attempt to block or stop it. |
MSP |
Managed Service
Provider |
|
MSSP |
Managed Security
Service Provider |
|
NIST |
National
Institute of Standards and Technology |
NIST's compliance
standards assist federal agencies and contractors to meet requirements
mandated under the Federal Information Security Management Act (FISMA) and
other regulations. ... These guidelines represent best practices for security
controls to safeguard and protect confidential information and data. |
OSHA |
Occupational
Safety and Health Administration |
|
PCI |
Payment Card
Industry |
|
PEN test |
Penetration test |
|
Sandbox |
Sandbox |
Sandbox |
SIEM |
Security Information
and Event Management |
Security
information and event management (SIEM) technology supports threat detection
and security incident response through the real-time collection, reporting,
correlation and historical analysis of security events from a wide variety of
event and data sources such as logs and applications. |
SMB |
Small /
Medium-size Business |
|
USM |
Unified Threat
Management |
Unified security
management (USM) is a platform of security products. Typical feature sets
fall into three main subsets, all within the USM: intrusion detection system
(IDS), security incident and event management (SIEM), vulnerability
assessment, and behavioral monitoring. |
UTM |
Unified Threat
Management |
Unified threat
management (UTM) is a platform of security products. Typical feature sets
fall into three main subsets, all within the UTM: firewall/intrusion
prevention system (IPS)/virtual private network, secure Web gateway security
(URL filtering, Web antivirus [AV]) and messaging security (anti-spam, mail
AV). |
WAF |
Web Application
Firewall |
A Web application
firewall (WAF) is a firewall that monitors, filters or blocks the HTTP
traffic to and from a Web application. |
Source file: Resources > Glossary > Glossary Table 20200825.html