Acronym | Phrase | Definition |
HIPAA | Health Insurance Portability and Accountability Act | A federal law that required the creation of national standards to protect sensitive patient health information from being disclosed without the patient's consent or knowledge. |
IDS/IPS | Intrusion Detection System/Intrusion Prevention System | IDS and IPS tools are used either at the network or host level and are designed to identify anomalies in a network. An IDS generates alerts for users to review, and an IPS actively blocks malicious activity. |
ISO | International Organization for Standardization
| An international standard-setting body that maintains various technical, industrial, and commercial standards. ISO 27001, which focuses on Information Security Management, is one of these standards and is one of the most popular standards that organizations outside of North America become certified for. |
MDM | Mobile Device Management | Mobile Device Management solutions are used to centrally manage and secure end user devices such as laptops and smartphones by deploying standardized configuration profiles that enforce basic controls such as password complexity, disk encryption, and updates. |
PCI DSS | Payment Card Industry Data Security Standard | A set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card information maintain a secure environment. |
PHI | Protected/Personal Health Information | The demographic information, medical histories, test and laboratory results, mental health conditions, insurance information and other data that a healthcare professional collects to identify an individual and determine appropriate care. |
PKI | Public Key Infrastructure | Governs the issuance of digital certificates to protect sensitive data, provide unique digital identities for users, devices and applications and secure end-to-end communications. |
RBAC | Role-Based Access Control | A mechanism that restricts system access. It involves setting permissions and privileges to enable access to authorized users. |