Cybersecurity ans Acronyms

[ABAC] – Attribute-Based Access Control
[ABAC] – Attribute-Based Access Control
[AUP] – Acceptable Use Policy[BYOD] – Bring Your Own Device
[CMMC] – Cybersecurity Maturity Model Certification
[CSA] – Cloud Security Alliance
[COBIT] – Control Objectives for Information and Related Technologies
[CIS] – Center for Internet Security
[CISM] – Certified Information Security Manager
[CISSP] – Certified Information Systems Security Professional[CISA] – Certified Information Systems Auditor
[CERT-In] – Indian Computer Emergency Response Team
[CASB] – Cloud Access Security Broker
[CIEM] – Cloud Infrastructure Entitlement Management
[CISO] – Chief Information Security Officer[DLP] – Data Loss Prevention
[DSPM] – Data Security Posture Management[EDR] – Endpoint Detection and Response[FIM] – File Integrity Monitoring[FISMA] – Federal Information Security Management Act
[GDPR] – General Data Protection Regulation[HIDS] – Host-based Intrusion Detection System[HSM] – Hardware Security Module[HRM] – Human Resource Management
[HIPAA] – Health Insurance Portability and Accountability Act[IAM] – Identity and Access Management[IDS] – Intrusion Detection System[IPS] – Intrusion Prevention System
[ISO] – International Organization for Standardization[ITIL] – Information Technology Infrastructure Library[ISO/IEC 27001] – International Standard for Information Security Management Systems (ISMS)
[ISA/IEC 62443] – Standards for Industrial Automation and Control Systems Security
[LDAP] – Lightweight Directory Access Protocol[MFA] – Multi-Factor Authentication[MDR] – Managed Detection and Response[NAC] – Network Access Control
[NERC-CIP] – North American Electric Reliability Corporation Critical Infrastructure Protection
[NERC-CIP] – North American Electric Reliability Corporation Critical Infrastructure Protection[NGFW] – Next-Generation Firewall[OIDC] – OpenID Connect
[PKI] – Public Key Infrastructure[PIM] – Privileged Identity Management
[PAM] – Privileged Access Management
[PCI-DSS] – Payment Card Industry Data Security Standard
[RPA] – Robotic Process Automation[RBAC] – Role-Based Access Control[RADIUS] – Remote Authentication Dial-In User Service[RBI] – Remote Browser Isolation
[SIEM] – Security Information and Event Management[SOC] – Security Operations Center[SOAR] – Security Orchestration, Automation, and Response[SSL] – Secure Sockets Layer
[SSO] – Single Sign-On
[SAML] – Security Assertion Markup Language[SCIM] – System for Cross-domain Identity Management
[SASE] – Secure Access Service Edge
[SWG] – Secure Web Gateway[SD-WAN] – Software-Defined Wide Area Network[SIEM] – Security Information and Event Management[SOC 2] – System and Organization Controls 2
[SOX] – Sarbanes-Oxley Act[SSE] – Security Service Edge[TLS] – Transport Layer Security[TACACS+] – Terminal Access Controller Access-Control System Plus
[UEBA] – User and Entity Behavior Analytics[UAC] – User Account Control
[VPN] – Virtual Private Network[WAF] – Web Application Firewall
[XDR] – Extended Detection and Response
[ZTNA] – Zero Trust Network Access
[ABAC] – Attribute-Based Access Control [ABAC] – Attribute-Based Access Control [AUP] – Acceptable Use Policy [BYOD] – Bring Your Own Device
[CMMC] – Cybersecurity Maturity Model Certification [CSA] – Cloud Security Alliance [COBIT] – Control Objectives for Information and Related Technologies [CIS] – Center for Internet Security
[CISM] – Certified Information Security Manager [CISSP] – Certified Information Systems Security Professional [CISA] – Certified Information Systems Auditor [CERT-In] – Indian Computer Emergency Response Team
[CASB] – Cloud Access Security Broker [CIEM] – Cloud Infrastructure Entitlement Management [CISO] – Chief Information Security Officer [CSCFR] - Cybersecurity and Cyber Resilience Framework
[DLP] – Data Loss Prevention [DPO] - Data Protection Officer [DPIA] - Data Protection Impact Assessments [DSPM] – Data Security Posture Management
[EDR] – Endpoint Detection and Response [FIM] – File Integrity Monitoring [FISMA] – Federal Information Security Management Act [GDPR] – General Data Protection Regulation
[HIDS] – Host-based Intrusion Detection System [HSM] – Hardware Security Module [HRM] – Human Resource Management [HIPAA] – Health Insurance Portability and Accountability Act
[IAM] – Identity and Access Management [IDS] – Intrusion Detection System [IPS] – Intrusion Prevention System [ISO] – International Organization for Standardization
[ITIL] – Information Technology Infrastructure Library [ISO/IEC 27001] – International Standard for Information Security Management Systems (ISMS) [ISA/IEC 62443] – Standards for Industrial Automation and Control Systems Security [LDAP] – Lightweight Directory Access Protocol
[MFA] – Multi-Factor Authentication [MDR] – Managed Detection and Response [MeitY] - The Ministry of Electronics and Information Technology [NAC] – Network Access Control
[NERC-CIP] – North American Electric Reliability Corporation Critical Infrastructure Protection [NGFW] – Next-Generation Firewall [OIDC] – OpenID Connect [PKI] – Public Key Infrastructure
[PIM] – Privileged Identity Management [PAM] – Privileged Access Management [PCI-DSS] – Payment Card Industry Data Security Standard [RPA] – Robotic Process Automation
[RBAC] – Role-Based Access Control [RADIUS] – Remote Authentication Dial-In User Service [RBI] – Remote Browser Isolation [RCA] - Root Cause Analysis
SIEM] – Security Information and Event Management [SOC] – Security Operations Center [SOAR] – Security Orchestration, Automation, and Response [SSL] – Secure Sockets Layer
[SSO] – Single Sign-On [SAML] – Security Assertion Markup Language [SCIM] – System for Cross-domain Identity Management [SASE] – Secure Access Service Edge
[SWG] – Secure Web Gateway [SD-WAN] – Software-Defined Wide Area Network [SD-WAN] – Software-Defined Wide Area Network [SOX] – Sarbanes-Oxley Act
[SSE] – Security Service Edge [TLS] – Transport Layer Security [TACACS+] – Terminal Access Controller Access-Control System Plus [UEBA] – User and Entity Behavior Analytics
[UAC] – User Account Control [VPN] – Virtual Private Network [WAF] – Web Application Firewall [XDR] – Extended Detection and Response
[ZTNA] – Zero Trust Network Access