Glossary
| Abbreviation | Term | Definition | 
| CIS | Center for
  Internet Security | |
| CMMC | Cybersecurity
  Maturity Model Certification | |
| DFARS | Defense Federal
  Acquisition Regulation Supplement | |
| FARS | Federal
  Acquisition Regulation | |
| FISMA | Federal
  Information Security Management Act | |
| GDPR | General Data
  Protection Regulation | The official PDF
  of the Regulation (EU) | 
| HIPAA | Health Insurance
  Portability and Accountability Act of 1996 | |
| IDS | Intrusion
  Detection System | An intrusion
  detection system (IDS) is a device or software application that monitors a
  network or systems for malicious activity or policy violations. Any detected
  activity or violation is typically reported either to an administrator or
  collected centrally using a security information and event management (SIEM)
  system | 
| IPS | Intrusion
  Prevention Systems | Intrusion
  prevention systems (IPS), also known as intrusion detection and prevention
  systems (IDPS), are network security appliances that monitor network or
  system activities for malicious activity. The main functions of intrusion
  prevention systems are to identify malicious activity, log information about
  this activity, report it and attempt to block or stop it. | 
| MSP | Managed Service
  Provider | |
| MSSP | Managed Security
  Service Provider | |
| NIST | National
  Institute of Standards and Technology | NIST's compliance
  standards assist federal agencies and contractors to meet requirements
  mandated under the Federal Information Security Management Act (FISMA) and
  other regulations. ... These guidelines represent best practices for security
  controls to safeguard and protect confidential information and data. | 
| OSHA | Occupational
  Safety and Health Administration | |
| PCI | Payment Card
  Industry | |
| PEN test | Penetration test | |
| Sandbox | Sandbox | A Sandbox is a virtual space in which new or untested software can be run securely. | 
| SIEM | Security Information
  and Event Management | Security
  information and event management (SIEM) technology supports threat detection
  and security incident response through the real-time collection, reporting,
  correlation and historical analysis of security events from a wide variety of
  event and data sources such as logs and applications. | 
| SMB | Small /
  Medium-size Business | |
| USM | Unified Threat
  Management | Unified security
  management (USM) is a platform of security products. Typical feature sets
  fall into three main subsets, all within the USM: intrusion detection system
  (IDS), security incident and event management (SIEM), vulnerability
  assessment, and behavioral monitoring. | 
| UTM | Unified Threat
  Management | Unified threat
  management (UTM) is a platform of security products. Typical feature sets
  fall into three main subsets, all within the UTM: firewall/intrusion
  prevention system (IPS)/virtual private network, secure Web gateway security
  (URL filtering, Web antivirus [AV]) and messaging security (anti-spam, mail
  AV). | 
| WAF | Web Application
  Firewall | A Web application
  firewall (WAF) is a firewall that monitors, filters or blocks the HTTP
  traffic to and from a Web application. | 
| CIS | Center for
  Internet Security | |
| CMMC | Cybersecurity
  Maturity Model Certification | |
| DFARS | Defense Federal
  Acquisition Regulation Supplement | |
| FARS | Federal
  Acquisition Regulation | |
| FISMA | Federal
  Information Security Management Act | |
| GDPR | General Data
  Protection Regulation | The official PDF
  of the Regulation (EU) | 
| HIPAA | Health Insurance
  Portability and Accountability Act of 1996 | |
| IDS | Intrusion
  Detection System | An intrusion
  detection system (IDS) is a device or software application that monitors a
  network or systems for malicious activity or policy violations. Any detected
  activity or violation is typically reported either to an administrator or
  collected centrally using a security information and event management (SIEM)
  system | 
| IPS | Intrusion
  Prevention Systems | Intrusion
  prevention systems (IPS), also known as intrusion detection and prevention
  systems (IDPS), are network security appliances that monitor network or
  system activities for malicious activity. The main functions of intrusion
  prevention systems are to identify malicious activity, log information about
  this activity, report it and attempt to block or stop it. | 
| MSP | Managed Service
  Provider | |
| MSSP | Managed Security
  Service Provider | |
| NIST | National
  Institute of Standards and Technology | NIST's compliance
  standards assist federal agencies and contractors to meet requirements
  mandated under the Federal Information Security Management Act (FISMA) and
  other regulations. ... These guidelines represent best practices for security
  controls to safeguard and protect confidential information and data. | 
| OSHA | Occupational
  Safety and Health Administration | |
| PCI | Payment Card
  Industry | |
| PEN test | Penetration test | |
| Sandbox | Sandbox | Sandbox | 
| SIEM | Security Information
  and Event Management | Security
  information and event management (SIEM) technology supports threat detection
  and security incident response through the real-time collection, reporting,
  correlation and historical analysis of security events from a wide variety of
  event and data sources such as logs and applications. | 
| SMB | Small /
  Medium-size Business | |
| USM | Unified Threat
  Management | Unified security
  management (USM) is a platform of security products. Typical feature sets
  fall into three main subsets, all within the USM: intrusion detection system
  (IDS), security incident and event management (SIEM), vulnerability
  assessment, and behavioral monitoring. | 
| UTM | Unified Threat
  Management | Unified threat
  management (UTM) is a platform of security products. Typical feature sets
  fall into three main subsets, all within the UTM: firewall/intrusion
  prevention system (IPS)/virtual private network, secure Web gateway security
  (URL filtering, Web antivirus [AV]) and messaging security (anti-spam, mail
  AV). | 
| WAF | Web Application
  Firewall | A Web application
  firewall (WAF) is a firewall that monitors, filters or blocks the HTTP
  traffic to and from a Web application. | 
Source file: Resources > Glossary > Glossary Table 20200825.html

