Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Cybersecurity Acronyms

20

Flashcards

0/20

Still learning
StarStarStarStar

IAM

StarStarStarStar

Identity and Access Management - a framework for business processes that facilitates the management of electronic or digital identities.

StarStarStarStar

SIEM

StarStarStarStar

Security Information and Event Management - a solution that aggregates and analyzes activity from many different resources across your IT infrastructure.

StarStarStarStar

PCI DSS

StarStarStarStar

Payment Card Industry Data Security Standard - a set of security standards designed to ensure that ALL companies that accept, process, store, or transmit credit card information maintain a secure environment.

StarStarStarStar

WAF

StarStarStarStar

Web Application Firewall - a security system that monitors and controls network traffic to and from a web application.

StarStarStarStar

CSP

StarStarStarStar

Cloud Service Provider - a company that offers some component of cloud computing — typically Infrastructure as a Service (IaaS), Software as a Service (SaaS) or Platform as a Service (PaaS) — to other businesses or individuals.

StarStarStarStar

IDS

StarStarStarStar

Intrusion Detection System - a device or software application that monitors a network or systems for malicious activity or policy violations.

StarStarStarStar

APT

StarStarStarStar

Advanced Persistent Threat - a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.

StarStarStarStar

SASE

StarStarStarStar

Secure Access Service Edge - a cloud-based security model that integrates different security services together to support the dynamic secure access needs of organizations.

StarStarStarStar

IPS

StarStarStarStar

Intrusion Prevention System - a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.

StarStarStarStar

SDN

StarStarStarStar

Software-Defined Networking - an approach to networking that uses software-based controllers or application programming interfaces (APIs) to direct traffic on the network and communicate with the underlying hardware infrastructure.

StarStarStarStar

AES

StarStarStarStar

Advanced Encryption Standard - a symmetric encryption algorithm widely used across the globe to secure data.

StarStarStarStar

SOC

StarStarStarStar

Security Operations Center - a centralized unit that deals with security issues on an organizational and technical level.

StarStarStarStar

NIST

StarStarStarStar

National Institute of Standards and Technology - a non-regulatory agency of the United States Department of Commerce that promotes and maintains measurement standards.

StarStarStarStar

PaaS

StarStarStarStar

Platform as a Service - a category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.

StarStarStarStar

TLS

StarStarStarStar

Transport Layer Security - a cryptographic protocol designed to provide communications security over a computer network.

StarStarStarStar

GDPR

StarStarStarStar

General Data Protection Regulation - a regulation in EU law on data protection and privacy for all individual citizens of the European Union and the European Economic Area.

StarStarStarStar

VPN

StarStarStarStar

Virtual Private Network - a service that encrypts your internet traffic and protects your online identity.

StarStarStarStar

ISO

StarStarStarStar

International Organization for Standardization - an independent, non-governmental international organization that develops voluntary, consensus-based, market relevant International Standards.

StarStarStarStar

DDoS

StarStarStarStar

Distributed Denial of Service - an attack that aims to overwhelm a website or service with traffic from multiple sources, rendering it unavailable.

StarStarStarStar

PKI

StarStarStarStar

Public Key Infrastructure - a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.