MOU
A formal agreement between two or more parties.
Hardware and software that detects or causes changes through direct monitoring and control of physical devices, processes, and events.
A plan to ensure that business processes can continue during a time of emergency or disaster.
Security policy enforcement points are placed between cloud service consumers and providers.
A security solution that integrates multiple security products into a cohesive system.
The idea of only giving a user or entity the permissions needed to accomplish their job/task
An attack that tricks a server into fetching a resource on behalf of the attacker.
A network layer protocol used by network devices to diagnose network communication issues.
A prolonged and targeted cyberattack where an intruder gains access to a network and remains undetected
The behavior of an actor, including the tools they use and the methods they employ to achieve their objectives
PLC
An industrial digital computer used for automation of electromechanical processes.
A security solution that controls access to a network with policies including pre-admission and post-admission.
A standardized language for representing cyber threat information.
MTTD
The average time it takes to detect a security incident.
A system of software and hardware elements that allows industrial organizations to control processes locally or at remote locations.
A network architecture that combines wide-area networking and security functions.
A set of security standards designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure environment.
A protocol used to synchronize the clocks of computers over a network.
A key element of a service level agreement between a service provider and a customer.
A firewall that monitors, filters, and blocks HTTP traffic to and from a web application.
(And name three of them)
A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.
SDN
An approach to networking that uses software-based controllers to direct traffic on the network.
An algorithm used for public-key cryptography.
Tools and solutions that monitor end-user devices to detect and respond to cyber threats.
A measurable value that demonstrates how effectively a company is achieving key business objectives.