Glossary

Abbreviation

Term

Definition

CIS

Center for Internet Security

CMMC

Cybersecurity Maturity Model Certification

DFARS

Defense Federal Acquisition Regulation Supplement

FARS

Federal Acquisition Regulation

FISMA

Federal Information Security Management Act

GDPR

General Data Protection Regulation

The official PDF of the Regulation (EU)

HIPAA

Health Insurance Portability and Accountability Act of 1996

IDS

Intrusion Detection System

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any detected activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system

IPS

Intrusion Prevention Systems

Intrusion prevention systems (IPS), also known as intrusion detection and prevention systems (IDPS), are network security appliances that monitor network or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, report it and attempt to block or stop it.

MSP

Managed Service Provider

MSSP

Managed Security Service Provider

NIST

National Institute of Standards and Technology

NIST's compliance standards assist federal agencies and contractors to meet requirements mandated under the Federal Information Security Management Act (FISMA) and other regulations. ... These guidelines represent best practices for security controls to safeguard and protect confidential information and data.

OSHA

Occupational Safety and Health Administration

PCI

Payment Card Industry

PEN test

Penetration test

Sandbox

Sandbox

A Sandbox is a virtual space in which new or untested software can be run securely.

SIEM

Security Information and Event Management

Security information and event management (SIEM) technology supports threat detection and security incident response through the real-time collection, reporting, correlation and historical analysis of security events from a wide variety of event and data sources such as logs and applications.

SMB

Small / Medium-size Business

USM

Unified Threat Management

Unified security management (USM) is a platform of security products. Typical feature sets fall into three main subsets, all within the USM: intrusion detection system (IDS), security incident and event management (SIEM), vulnerability assessment, and behavioral monitoring.

UTM

Unified Threat Management

Unified threat management (UTM) is a platform of security products. Typical feature sets fall into three main subsets, all within the UTM: firewall/intrusion prevention system (IPS)/virtual private network, secure Web gateway security (URL filtering, Web antivirus [AV]) and messaging security (anti-spam, mail AV).

WAF

Web Application Firewall

A Web application firewall (WAF) is a firewall that monitors, filters or blocks the HTTP traffic to and from a Web application.

CIS

Center for Internet Security

CMMC

Cybersecurity Maturity Model Certification

DFARS

Defense Federal Acquisition Regulation Supplement

FARS

Federal Acquisition Regulation

FISMA

Federal Information Security Management Act

GDPR

General Data Protection Regulation

The official PDF of the Regulation (EU)

HIPAA

Health Insurance Portability and Accountability Act of 1996

IDS

Intrusion Detection System

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any detected activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system

IPS

Intrusion Prevention Systems

Intrusion prevention systems (IPS), also known as intrusion detection and prevention systems (IDPS), are network security appliances that monitor network or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, report it and attempt to block or stop it.

MSP

Managed Service Provider

MSSP

Managed Security Service Provider

NIST

National Institute of Standards and Technology

NIST's compliance standards assist federal agencies and contractors to meet requirements mandated under the Federal Information Security Management Act (FISMA) and other regulations. ... These guidelines represent best practices for security controls to safeguard and protect confidential information and data.

OSHA

Occupational Safety and Health Administration

PCI

Payment Card Industry

PEN test

Penetration test

Sandbox

Sandbox

Sandbox

SIEM

Security Information and Event Management

Security information and event management (SIEM) technology supports threat detection and security incident response through the real-time collection, reporting, correlation and historical analysis of security events from a wide variety of event and data sources such as logs and applications.

SMB

Small / Medium-size Business

USM

Unified Threat Management

Unified security management (USM) is a platform of security products. Typical feature sets fall into three main subsets, all within the USM: intrusion detection system (IDS), security incident and event management (SIEM), vulnerability assessment, and behavioral monitoring.

UTM

Unified Threat Management

Unified threat management (UTM) is a platform of security products. Typical feature sets fall into three main subsets, all within the UTM: firewall/intrusion prevention system (IPS)/virtual private network, secure Web gateway security (URL filtering, Web antivirus [AV]) and messaging security (anti-spam, mail AV).

WAF

Web Application Firewall

A Web application firewall (WAF) is a firewall that monitors, filters or blocks the HTTP traffic to and from a Web application.

Source file: Resources > Glossary > Glossary Table 20200825.html