Implementing Security Flashcards
HIDS/HIPS
Host Based Intrusion Detection/Protection System
MDM
Mobile Device Management
EMM
Enterprise Mobility Management
MAM
Mobile Access Management
UEM
Unified Endpoint Management
Of MDM, EMM, MAM
MicroSD HSM
Micro SD card form Hardware Security Module
secures mobile devices
MSSP
Managed Security Service Provider
NIST
National Institute for Standards and Technology
CSA
Cloud Security Alliance
Prompting best practices in the cloud
CCM
Cloud Controls Matrix
Developed by the CSA to help organisations understand appropriate use of cloud security controls and map then to regularity stds
CASB
Cloud Access Security Broker
Software tools serving as intermediaries between service providers and users
EDR
Endpoint Detection and Response
Tools combining network response and log analysis.
Look for anomalies and IoC (indicator of compromise) using automated rules and detection
IPFIX
IP Flow Information Exchange
Serves as a means for transmitting traffic flow over the network (open net flow standard)
SIPS
Session Initiation Protocol Secure
For communications traffic like voice and video over HTTPS
SRTP
Real-Time Transport Protocol Secure
For voice and video communications