CVE
Common Vulnerability Enumeration
CVSS
Common Vulnerability Scoring System
DDoS
Distributed Denial of Service
DLP
Data Loss Prevention
OSINT
Open-source Intelligence
PII
Personally Identifiable Information
RBAC
Role-based Access Control
IAM
Identity and Access Management
MFA
Multi-Factor Authentication
RPO
Recovery Point Objective
RTO
Recovery Time Objective
SOC
Security Operations Center
IOC
Indicator of Compromise
XDR
Extended Detection and Response
SASE
Secure Access Service Edge
SD-WAN
Software-Defined Wide Area Network
BYOD
Bring Your Own Device