Page 16 - The Bureau - Cyber Security Awareness e-book.indd
P. 16

EDR          Endpoint Detection Response
        FTP          File Transfer Protocol
        GDPR         General Data Protection Regulation
        HTTPS        Hyper Text Transfer Protocol Secure
        IAAS         Infrastructure as a Service
        IAM          Identity Access Management
        IDS          Intrusion Detection System
        IP           Internet Protocol
        IRP          Incident Response Plan
        ITDMs        I T Decision Makers
        MDR          Managed Detection Response
        MFA          Multi-factor Authentication
        MSSP         Managed Security Service Provider
        NAC          Network Access Control
        NAS          Network Attached Storage
        NCSC         National Cyber Security Centre
        NDMP         Network Data Management Protocol
        NGFW         Next Generation Firewall
        OMI          Open Management Infrastructure
        OSDP         Open Supervised Device Protocol
        PAM          Privileged Account Management
        PAP          Password Authentication Protocol
        PCI DSS      Payment Card Industry Data Security Standard
        PII          Personally Identifi able Information
        PIM          Privileged Identity Management
        POLP         Principle of Least Privilege
        POPS         Points of Presence
        RAAS         Ransomware as a Service
        RAT          Remote Access Trojan
        RCE          Remote Code Execution
        RDP          Remote Desktop Protocol
   11   12   13   14   15   16   17   18