Elevation
The weird show at Sphere
Through the fire and the flames
Don't stop me now
Battery
100

MOU


Memorandum of Understanding

A formal agreement between two or more parties.


100


OT 



Operational Technology

Hardware and software that detects or causes changes through direct monitoring and control of physical devices, processes, and events.


100


BCP 



Business Continuity Plan

A plan to ensure that business processes can continue during a time of emergency or disaster.


100


CASB



 Cloud Access Security Broker

Security policy enforcement points are placed between cloud service consumers and providers.


100


XDR 



Extended Detection Response

A security solution that integrates multiple security products into a cohesive system.


200


POLP



Principle of Least Privilege

The idea of only giving a user or entity the permissions needed to accomplish their job/task


200


SSRF 



Server-side Request Forgery

An attack that tricks a server into fetching a resource on behalf of the attacker.


200


ICMP 



Internet Control Message Protocol

A network layer protocol used by network devices to diagnose network communication issues.


200


APT 



Advanced Persistent Threat

A prolonged and targeted cyberattack where an intruder gains access to a network and remains undetected


200


TTP 



Tactics, Techniques, and Procedures

The behavior of an actor, including the tools they use and the methods they employ to achieve their objectives


300

PLC


Programmable Logic Controller

An industrial digital computer used for automation of electromechanical processes.


300


NAC 



Network Access Control

A security solution that controls access to a network with policies including pre-admission and post-admission.


300


STIX 



Structured Threat Information Expression

A standardized language for representing cyber threat information.


300

MTTD


Mean Time to Detect

The average time it takes to detect a security incident.


300


SCADA 



Supervisory Control and Data Acquisition

A system of software and hardware elements that allows industrial organizations to control processes locally or at remote locations.


400


SASE 



Secure Access Secure Edge

A network architecture that combines wide-area networking and security functions.


400


PCI DSS 



Payment Card Industry Data Security Standard

A set of security standards designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure environment.


400


NTP 



Network Time Protocol

A protocol used to synchronize the clocks of computers over a network.


400


SLO 



Service-level Objective

A key element of a service level agreement between a service provider and a customer.


400


WAF 



Web Application Firewall

A firewall that monitors, filters, and blocks HTTP traffic to and from a web application.


500


MFA 

(And name three of them)


Multifactor Authentication

A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.


500

SDN


Software-defined Networking

An approach to networking that uses software-based controllers to direct traffic on the network.


500


RSA 



Rivest, Shamir, Adleman

An algorithm used for public-key cryptography.


500


EDR 



Endpoint Detection and Response

Tools and solutions that monitor end-user devices to detect and respond to cyber threats.


500


KPI 



Key Performance Indicator

A measurable value that demonstrates how effectively a company is achieving key business objectives.