All Collections
Security Acronym Glossary Part 2
Security Acronym Glossary Part 2
We want all of our users to be security experts! Learn the key security acronyms in alphabetical order from F to R below.
Written by Natalie Novick
Updated over a week ago





Health Insurance Portability and Accountability Act

A federal law that required the creation of national standards to protect sensitive patient health information from being disclosed without the patient's consent or knowledge.


Intrusion Detection System/Intrusion Prevention System

IDS and IPS tools are used either at the network or host level and are designed to identify anomalies in a network. An IDS generates alerts for users to review, and an IPS actively blocks malicious activity.


International Organization for Standardization

An international standard-setting body that maintains various technical, industrial, and commercial standards. ISO 27001, which focuses on Information Security Management, is one of these standards and is one of the most popular standards that organizations outside of North America become certified for.


Mobile Device Management

Mobile Device Management solutions are used to centrally manage and secure end user devices such as laptops and smartphones by deploying standardized configuration profiles that enforce basic controls such as password complexity, disk encryption, and updates.


Payment Card Industry Data Security Standard

A set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card information maintain a secure environment.


Protected/Personal Health Information

The demographic information, medical histories, test and laboratory results, mental health conditions, insurance information and other data that a healthcare professional collects to identify an individual and determine appropriate care.


Public Key Infrastructure

Governs the issuance of digital certificates to protect sensitive data, provide unique digital identities for users, devices and applications and secure end-to-end communications.


Role-Based Access Control

A mechanism that restricts system access. It involves setting permissions and privileges to enable access to authorized users.

Did this answer your question?