All Collections
FAQ
Security Acronym Glossary Part 1
Security Acronym Glossary Part 1
We want all of our users to be security experts! Learn the key security acronyms in alphabetical order from A to E below.
N
Written by Natalie Novick
Updated over a week ago

Acronym

Phrase

Definition

ACL

Access Control List

A list of rules that dictates which users or systems have access to a resource.

API

Application Programming Interface

A software interface that allows 2 applications to talk to each other. An API sits between an application and a web server, acting as an intermediary layer that processes data transfer between systems.

BC/DR

Business Continuity and Disaster Recovery

Represents a set of approaches or processes that helps an organization recover from a disaster and resume its routine business operations.

CAIQ (pronounced cake)

Consensus Assessments Initiative Questionnaire

A survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud service provider.

CCPA

California Consumer Privacy Act

California State Statute passed in 2020 that allows for consumers to have more control over data shared with websites, such as the ability to request for their personal data such as names and website history to be exported or deleted.

CSA

Cloud Security Alliance

An organization of thousands of cloud service providers that provides thought leadership and maintains the popular CAIQ.

CMS

Credential Management System

An established form of software that is used for issuing and managing credentials as part of public key infrastructure (PKI).

DDoS

Distributed Denial of Service

An attack designed to disrupt a website or network by bombarding it with traffic. Hackers and others use these attacks for a variety of reasons including revenge, extortion, and financial and political gain.

DLP

Data Loss Prevention

DLP tools are used by organizations to block attempts to exfiltrate sensitive information outside of the organization’s network. For example, many organizations employ DLP to ensure that emails with personal information such as social security numbers or credit card numbers are blocked.

EDR

Endpoint Detection & Response

EDR solutions are used to secure end users devices such as laptops by detecting potential malware or other attempts to exploit the device. They are typically considered to be the successor to traditional signature-based antivirus software and use a combination of signatures and machine learning to detect advanced threats.

Did this answer your question?