• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/343

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

343 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

IT

Information


Technology

NAT

Network


Address


Translation

Infosec

Information


Systems


Security

APT

Advanced


Persistent


Threat


A cyber attack that continuously uses advanced techniques to conduct cyber epionage or crime

AV

Antivirus

CERT (team)

Computer


Emergency


Response


Team

CIRT

Computer


Incident


Response


Team

CIS

Center


For


Internet


Security

Place

CISA

Certified


Information


Systems


Auditor

Certification

CISM

Certified


Information


Systems


Manager

Certification

CISO

Chief


Information


Security


Officer

Job title

CISSP

Certified


Information


Systems


Security


Professional

Certification

COBIT

Control


OBjectives for


Information & related


Technologies



COBIT is a framework created by ISACA for information technology management and IT governance.

Framework

CSA

Cloud


Security


Alliance

Cloud

CSO

Chief


Security


Officer

Job title

DDoS

Distributed


Denial


Of


Service


A DDoS attack floods a targeted server, service or network with malicious traffic or data from multiple sources (often botnets), in order to attempt to disrupt normal traffic and availability of service

DLP

Data


Loss


Prevention

DNS

Domain


Name


System

DoS

Denial


Of


Service



A DoS attack floods a targeted server, service or network with malicious traffic or data from multiple sources, (often botnets), in order to attempt to disrupt normal traffic and availability of service

EDR

Endpoint


Detection


&


Response



Endpoint detection and response, also known as endpoint threat detection and response, is a cyber technology that continually monitors and responds to mitigate cyber threats.

Cybersecurity 101

GRC

Governance,


Risk Management


&


Compliance

Cybersecurity 101

HTTPS

Secure


Hypertext


Transfer


Protocol

IA

Information


Assurance

IAM

Identity


&


Access


Management

IDS/IDP

Intrusion


Detection


Systems


/


Intrusion


Detection


&


Prevention

ISACA

Information


Systems


Audit


and


Control


Association

Organization

(ISC)2

International


Information


Systems


Security


Certification


Consortium

An organization

ISO

International


Organization


for


Standardization

Organization

ISSA

Information


Systems


Security


Association

This is an organization

ISSO

Information


Systems


Security


Officer

Job title

ISSPM

Information


Systems


Security


Program


Manager

Job title

MSSP

Managed


Security


Services


Provider

NCSA

National


Cyber


Security


Alliance

Organization

OPSEC

Operational


Security

OSINT

Open


Source


Intelligence

Cybersecurity 101

SIEM

Security


Information


and


Event


Management

SOC

Security


Operations


Center

TTP

Tactics


Techniques


and


Procedures

VPN

Virtual


Private


Network

AD

Active


Directory

ESI

Electronically


Stored


Information

Legal


Cybersecurity 101

IIS

Internet


Information


System

MDM

Mobile


Device


Management

NSA

National


Security


Agency

PCI

Payment


Card


Industry

PenTest

Penetration


Test(er)

RMF

Risk


Management


Framework

Cybersecurity 101 /


Framework

SOX

Sarbanes


-


Oxley


Act

SSL

Secure


Socket


Layer

SSO

Single


Sign-


On

Security / Authentication

BIOS

Basic


Input


Output


System

PSS

Physical


Security


Systems

Security

AP

Access


Point

WAP

Wireless


Access


Point

ACL

Access


Control


List

AES

Advanced


Encryption


Standard

ASP

Application


Service


Provider



An application service provider is a business providing computer-based services to customers over a network; such as access to a particular software application using a standard protocol.

App

ASCII

American


Standard


Code


for


Information


Interchange

Code

BCM or BCP

Business


Continuity


Management


or


Business


Continuity


Plan

Bluesnarfing

Bluetooth


Snarfing


An attack on a Bluetooth-enabled device that allows download of all contact details, along with other information, without leaving any trace of the attack.

B2B

Business


2


Business

P2P

Peer


2


Peer

CEH

Certified


Ethical


Hacker

CHAP

Challenge


Handshake


Authentication


Protocol

Protocol

CIS

Center


for


Internet


Security

Place

CISMP

Certificate


in


Information


Systems


Management


Principles

CISSP

Certificate


for


Information


System


Security


Professional

Certification

CC

Common


Criteria

Cybersecurity 101

CPU

Central


Processing


Unit

CVE

Common


Vulnerabilities


and


Exposures

Vulnerabilities and exploits

DES

Data


Encryption


Standard

Encryption

DPO

Data


Protection


Officer

Job title

DRM

Digital


Rights


Management

Legal

FTP

File


Transfer


Protocol

GUI

Graphical


User


Interface

CLI

Command


Line


Interface

HTML

Hypertext


Markup


Language

HTTP

Hypertext


Transfer


Protocol

IM

Instant


Message

DM

Direct


Message

IPSec

Internet


Protocol


Security

ISP

Internet


Service


Provider

ISO

International


Organization


for


Standardization

Organization

ISSAP

Information


Systems


Security


Architecture


Professional

Certification

ISSEP

InformationSystemsSecurity


Engineering


Professional

ISSMP

Information


Systems


Security


Management


Professional

Certification

LAN

Local


Area


Network

WAN

Wide


Area


Network

LFM

Log


File


Monitor

Monitoring


Blue team

L2TP

Layer-2


Tunnelling


Protocol

MAC

Media


Access


Control

Mbps

Megabits


Per


Second

MitM

Man


In


The


Middle

MIME

Multipurpose


Internet


Mail


Extensions

Protocol /


Email

MSO

Multiple


Sign-


On

Authentication

NDA

Non-Disclosure


Agreement

Legal / Business (administration)

OS

Operating


System

RAM

Random


Access


Memory

OWASP

Open


Web


Application


Security


Project

PAP

Password


Authentication


Protocol

Protocol /


Authentication

PDA

Personal


Digital


Assistant

PDF

Portable


Document


Format

PIN

Personal


Identification


Number

PKI

Public


Key


Infrastructure

RADIUS

Remote


Authentication


Dial-


In


User


Service

RAID

Redundant


Array


of


Inexpensive


Disks

RDC

Remote


Desktop


Connection

SANS

SysAdmin


Audit


Network


Security

SEO

Search


Engine


Optimization

SET

Secure


Electronic


Transaction



Secure electronic transaction (SET) was an early communications protocol used by e-commerce websites to secure electronic debit and credit card payments. Secure electronic transaction was used to facilitate the secure transmission of consumer card information via electronic portals on the Internet

Protocol (e-commerce)

SLA

Service


Level


Agreement

SPIM

Spam sent through


Instant


Messenger

SOHO

Small


Office,


Home


Office

SSCP

Systems


Security


Certified


Practitioner

Certification

SSID

Service


Set


IDentifier

TCP/IP

Transmission


Control


Protocol


/


Internet


Protocol

TFA

Two-


Factor


Authentication

Cybersecurity 101

UPS

Uninterruptible


Power


Supply

URL

Uniform


Resource


Locator

USB

Universal


Serial


Bus

VoIP/VOB

Voice


Over


Internet


Protocol


/


Voice


Over


Broadband

WEP

Wired


Equivalent


Privacy


IEEE's original 802.11 standard for wireless networking that was designed to tackle the vulnerabilities that come from data sharing radio waves. It had many flaws and shoukd NOT be relied on to provide adequate security

WPA

WiFi


Protected


Access


A more secure version of 802.11 that uses TKIP (Temporal Key Integrity Protocol)

WiFi

Wireless


Fidelity



802.11 : the family of standards for wireless LANs


802.11a : wireless standard operating at 5Ghz and running at up to 54 Mbps.


802.11b : operates at 2.4Ghz and up to 11 Mbps


802.11g : operating at 2.4Ghz but up to 54 Mbps


802.11i : wireless standard that uses AES, a more secure method of handling authentication. (New)


802.11n : 300 Mbps bandwidth; faster & greater range but costly.


802.11ac : improved bandwidth and backwards compatible but costly.



From semiconductorstore.com:



802.11In 1997, the Institute of Electrical and Electronics Engineers (IEEE) created the first WLAN standard. They called it 802.11 after the name of the group formed to oversee its development. Unfortunately, 802.11 only supported a maximum network bandwidth 2 Mbps, too slow for most applications.802.11bIEEE expanded on the original 802.11 standard in July 1999, creating the 802.11b specification. 802.11b supports bandwidth up to 11 Mbps, comparable to traditional Ethernet.802.11b uses the same unregulated radio signaling frequency (2.4 GHz) as the original 802.11 standard. Vendors often prefer using these frequencies to lower their production costs. Being unregulated, 802.11b devices can have interference from microwave ovens, cordless phones, and other appliances using the same 2.4 GHz range. However, by installing 802.11b devices an adequate distance from other appliances, interference can easily be avoided.Pros of 802.11b - lowest cost; signal range is good and not easily obstructedCons of 802.11b - slowest maximum speed; home appliances may interfere on the unregulated frequency band802.11aWhile 802.11b was in development, IEEE created a second extension to the original 802.11 standard called 802.11a. Because 802.11b gained in popularity much faster than did 802.11a, some folks believe that 802.11a was created after 802.11b. In fact, 802.11a was created at the same time. Due to its higher cost, 802.11a is usually found on business networks whereas 802.11b better serves the home market.802.11a supports bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz. This higher frequency compared to 802.11b shortens the range of 802.11a networks. An 802.11a access point transmitter may cover less than one-fourth the area of a comparable 802.11b/g unit. The higher frequency also means 802.11a signals have more difficulty penetrating walls and other obstructions.Because 802.11a and 802.11b utilize different frequencies, the two technologies are incompatible with each other. Some vendors offer hybrid 802.11a/b network gear, but these products merely implement the two standards side by side, as the connected devices must use either one or the other.Pros of 802.11a - fast maximum speed; regulated frequencies prevent signal interference from other devicesCons of 802.11a - highest cost; shorter range signal that is more easily obstructed802.11gIn 2002 and 2003, WLAN products supporting a newer standard called 802.11g emerged on the market. 802.11g attempts to combine the best of both 802.11a and 802.11b. 802.11g supports bandwidth up to 54 Mbps, and it uses the 2.4 GHz frequency for greater range. 802.11g is backwards compatible with 802.11b, meaning that 802.11g access points will work with 802.11b wireless network adapters and vice versa.Pros of 802.11g - fast maximum speed; signal range is good and not easily obstructedCons of 802.11g - costs more than 802.11b; appliances may interfere on the unregulated signal frequency802.11n802.11n (also sometimes known as "Wireless N") was designed to improve on 802.11g in the amount of bandwidth supported by utilizing multiple wireless signals and antennas (called MIMO technology) instead of one. Industry standards groups ratified 802.11n in 2009 with specifications providing for up to 300 Mbps of network bandwidth. 802.11n also offers somewhat better range over earlier Wi-Fi standards due to its increased signal intensity, and it is backward-compatible with 802.11b/g gear.Pros of 802.11n - fastest maximum speed and best signal range; more resistant to signal interference from outside sourcesCons of 802.11n - standard is not yet finalized; costs more than 802.11g; the use of multiple signals may greatly interfere with nearby 802.11b/g based networks802.11acThe newest generation of Wi-Fi signaling in popular use, 802.11ac utilizes dual band wireless technology, supporting simultaneous connections on both the 2.4 GHz and 5 GHz Wi-Fi bands. 802.11ac offers backward compatibility to 802.11b/g/n and bandwidth rated up to 1300 Mbps on the 5 GHz band plus up to 450 Mbps on 2.4 GHz.Pros of 802.11ac – offers improved bandwidth and more flexibility through simultaneous connection support; backwards compatibility allows use of existing technologiesCons of 802.11ac –dual bands mean increased cost; still prone to interference on the 2.4GHz frequency

WLAN

Wireless


Local


Area


Network

WiMax

Wi-Fi Max - The next generation of wireless technology, with wireless ranges of up to 10 miles and broadband speeds.

MFA

Multi


Factor


Authentication

PII

Personally


Identifiable


Information

OS

Operating


System

RAT

Remote


Access


Trojan

IoT

Internet


of


Things

C&C or C2

Command


&


Control

CEO

Chief


Executive


Officer

COO

Chief


Operations


Officer

Job title

CISO or CSO

Chief


(Information)


Security


Officer


/


Chief


Security


Officer

CIO

Chief


Information


Officer

CTO

Chief


Technology


Officer

Job title

SCF

Security


Culture


Framework

AC

Access


Control

AD

Active


Directory

VPN

Virtual


Private


Network

BCP/DR

Business


Continuity


Planning


/


Disaster


Recovery

Business (administration)

API

Application


Programming


Interface

OSI Model

Open


System


Interconnection


Model

OSI Model & Layers

Open


Systems


Interconnection


Model



All = Application Layer (7)


People = Presentation Layer (6)


Seem = Session Layer (5)


To = Transport Layer (4)


Need = Network Layer (3)


Data = Data Link Layer (2)


Processing = Physical (1)

PAP

Password


Authentication


Protocol

Protocol

Cryptography PAIN model

Privacy


Authentication


Integrity


Non-repudiation


IDS

Intrusion


Detection


Systems

NSM

Network


Security


Monitoring

ESM

Enterprise


Security


Management



Enterprise Security Management is the process of controlling configuration, deployment, and monitoring of security policy across multiple platforms and security point products.

NIST

National Institute of Standards and Technology

Network TAP

Test


Access


Port

SPAN (port mirroring)

Switched


Port


Analyzer

IDS

Intrusion


Detection


System

IPS

Intrusion


Prevention


System

ACL

Access


Control


List

ANSI

American


National


Standards


Institute

ASCII

American


Standard


Code


For


Information


Interchange

ATM

Asynchronous


Transfer


Mode

DHCP

Dynamic


Host


Configuration


Protocol

DNS

Domain


Name


System

FSB

Front


Side


Bus

FTP

File


Transfer


Protocol

GPU

Graphics


Processing


Unit

GUI

Graphical


User


Interface

CLI

Command


Line


Interface

GUID

Globally


Unique


IDentifier

HTTP

Hyper Text Transfer Protocol

HTTPS

HyperText


Transfer


Protocol


over


SSL


-


OR


-


HyperTextTransferProtocol


Secure

I/O

Input


/


Output

ICANN

Internet


Corporation


For


Assigned


Names


And


Numbers

Organization

ICF

Internet


Connection


Firewall

Network security

ICMP

Internet


Control


Message


Protocol

Protocol

ICS

Internet


Connection


Sharing

IEEE

Institute


Of


Electrical


And


Electronics


Engineers

Institute / Organization

IMAP

Internet


Message


Access


Protocol

IP

Internet


Protocol

IPX

Internetwork


Packet


eXchange

IRC

Internet


Relay


Chat

ISA

Industry


Standard


Architecture

Used in industrial PCs

ISO

International


Organization


For


Standardization

IT

Information


Technology

LAN

Local


Area


Network

WAN

Wide


Area


Network

LDAP

Lightweight


Directory


Access


Protocol

MAC (ADDRESS)

Media


Access


Control


Address

MANET

Mobile


Ad


Hoc


Network

Networking

MBPS

Megabits


Per


Second

KBPS

KiloBits


Per


Second

MCA

Micro


Channel


Architecture

Standards


Cybersecurity 101


Architecture

MIPS

Million


Instructions


Per


Second

Cybersecurity 101


(Speed)

NAT

Network


Address


Translation

NETBIOS

Network


Basic


Input


/


Output


System

NIC

Network


Interface


Card

NNTP

Network


News


Transfer


Protocol

NOC

Network


Operations


Center

NTFS

New


Technology


File


System

P2P

Peer


To


Peer

POP3

Post


Office


Protocol


3

PPP

Point


To


Point


Protocol

Protocol

PPTP

Point


To


Point


Tunneling


Protocol

Protocol

RAID

Redundant


Array


Of


Independent


Disks

RAM

Random


Access


Memory

ROM

Read


-


Only


Memory

RDC

Remote


Desktop


Connection (or Client)


/


Remote


Data


Collection

RPC

Remote


Procedure


Call

SAN

Storage


Area


Network

SCSI

Small


Computer


System


Interface

SMB

Server


Message


Block

SMTP

Simple


Mail


Transfer


Protocol

SNMP

Simple


Network


Management


Protocol

Protocol

SOA

Service


-


Oriented


Architecture

SOL

****


Out


Of


Luck


(Joke card)

SOAP

Simple


Object


Access


Protocol

Protocol

SSH

Secure


SHell

SSID

Service


Set


IDentifier

SSL

Secure


Sockets


Layer

TCP/IP

Transmission


Control


Protocol


/


Internet


Protocol

TTL (DNS)

Time


To


Live

UDP

User


Datagram


Protocol

UNC

Universal


Naming


Convention



In a network, the Universal Naming Convention (UNC) is a way to identify a shared file in a computer without having to specify (or know) the storage device it is on

Cybersecurity 101

UPNP

Universal


Plug


And


Play

UPS

Uninterruptible


Power


Supply

URI

Uniform


Resource


Identifier

URL

Uniform


Resource


Locator

VLE

Virtual


Learning


Environment

VOIP

Voice


Over


Internet


Protocol

VPI

Virtual


Path


Identifier

VPN

Virtual


Private


Network

VPS

Virtual


Private


Server

A server

WAIS

Wide


Area


Information


Server

Servers

WAN

Wide


Area


Network

WEP

Wired


Equivalent


Privacy



A security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN.

WI-FI

WIreless


FIdelity

WPA

Wi-Fi


Protected


Access

WWW

World


Wide


Web

XHMTL

Extensible


HyperText


Markup


Language

XML

Extensible


Markup


Language

SIEM

Security


Information


And


Event


Management

IaaS

Infrastructure


as


a


Service

PaaS

Platform


as


a


Service

SaaS

Software


as


a


Service

XaaS

Anything


asaService

DBaaS

Database


as


a


Service

CaaS

Communication


as


a


Service

DaaS

Desktop


as


a


Service



A DaaS platform allows you to use a fully functioning hosted desktop for any applications that you would normally be able to run on a typical desktop. They are easy to use and purchase and require no maintenance, IT, or dedicated cybersecurity to run.

CI

Continuous


Integration

Cybersecurity 101

CD

Continuous


Delivery

ESM

Enterprise


Security


Monitoring



Enterprise Security Management is the process of controlling configuration, deployment, and monitoring of security policy across multiple platforms and security point products.


RCE

Remote


Code


Execution


(vulnerability)

Vulnerabilities and exploits

CVE

Common


Vulnerabilities


And


Exposures

SIEM

Security


Information


and


Event


Management

ISCM

Information


Security


Continuous


Monitoring

Watching

PCI Compliance

Payment


Card


Industry


Compliance



An information security standard for organizations that handle branded credit cards from the major card schemes mandated by (but not administered by) the Payment Industry Security Standards Council.

E-commerce legal standards

SACL

System


Access


Control


Lists

RTO & RPO

Recovery Time Objective


&


Recovery Point Objective

BIA

Business Impact Analysis

Business administration

MTBF

Mean Time Between Failures

BCP

Business Continuity Plan

CYOD

Choose Your Own Device

BYOD

Bring Your Own Device

USB OTG

USB On The Go?


The use of portable devices, such as a smartphone, as USB

TKIP

Temporal Key Integrity Protocol


(Used with WPA)

Security

RAID

Redundant Array of Inexpensive Disks

MTTR

Mean Time To Recover

ACL

Access Control List

SRTP

Secure Real-time Transport Protocol

Protocol

TLS

Transport Layer Security

Protocol

SFTP

Secure File Transfer Protocol

SMTP

Simple Mail Transfer Protocol

NFC

Near Field Communication

XSRF

Cross-site Request Forgery

NAS

Network Attached Storage

NFS

Network File System

WEP

Wired Equivalent Privacy

RFI

Radio Frequency Interference

EMI

Electromagnetic Interference

API

Application Programming Interface

Software dev

NTLM and LanMan

New Technology LAN Manager

DLP

Data Loss Prevention

HSM

Hardware Security Module

COPE

Company- Owned, Personally Enabled

SED

Self-Encrypting Drive

WPS

Wi-Fi Protected Setup

Wireless

OWASP

Open Web Application Security Project

EFS

Encrypting File System

UTM

Unified Threat Management

SDK

Software Development Kit

Software dev

API

Application Programming Interface

SSH

Secure SHell

UAC

(Windows) User Account Control

Windows

NIDS

Network(-based) Intrusion Detection System

NIPS

Network Intrusion Prevention System

DLP

Data Loss Prevention

SCADA

Supervisory Control And Data Acquisition

Servers

TPM

Trusted Platform Module



Trusted Platform Module is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys.

Cryptography

ICS

Industrial Control System

Cybersecurity 101

RAT

Remote Access Trojan or Remote Administration Tool

APT

Advanced Persistent Threat

PKI

Public Key Infrastructure

Cryptography

NoSQL

Nonrelational SQL



A NoSQL database provides a mechanism for storage and retrieval of data that is modeled in means other than the tabular relations used in relational databases.

NPS

Network Policy Server

Server

NAT

Network Address Translation

PBX

Private Branch Exchange

Phone system

NAS

Network Attached Storage

TKIP

Temporal Key Integrity Protocol

RFC

Request For Change

Administration

NIST Cybersecurity Framework

National Institute of Standards and Technology

SDLC

Software Development Life Cycle

TPM

Trusted Platform Module

AC, DAC, MAC, RBAC, ABAC

Access Control:


Discretionary Access Control (old)


Mandatory Access Control (old)


Role-Based Access Control (currently prevalent)


Attribute-Based Access Control (recent model)

TPM

Trusted Platform Module



Trusted Platform Module is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys.

Security


Cryptography

WPA2 with CCMP

Wi-Fi Protected Access 2 with Counter Mode CBC-MAC Protocol (Counter Mode Cipher-block Chaining Message Authentication Code Protocol)

Protocol

QoS

Quality of Service

SED

Self-Encrypting Drive

Hardware /


Security /


Encryption

HIDS

Host Intrusion Detection System

NIDS

Network Intrusion Detection System

MFD

Multifunctioning Device

VDE

Virtual Desktop Environment

EAP

Extensible Authentication Protocol

WPA-PSK

Wi-Fi Protected Access - Pre-Shared Key

WORM protection

Write Once, Read Many protection



A data storage device in which information, once written, cannot be modified. This write protection affords the assurance that the data cannot be tampered with once it is written to the device.

Forensics - Chain of Evidence

PDS

Protected Distribution System

APs

Access Points

TPM

Trusted


Platform


Module



Trusted Platform Module is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys

Cryptography

URL

Uniform


Resource


Locator

IRL

Internet


Resource


Locator

MTTR

Mean


Time


To


Recover

MTBF

Mean


Time


Between


Failures

RTO

Recovery


Time


Object

RPO

Recovery


Point


Objective

BCP

Business


Continuity


Plan

Business administration

DLP

Data


Leakage


Prevention



Used to prevent sensitive corporate data from leaving the organization.

EAP

Extensible


Authentication


Protocol



A connecting device network authentication framework supporting methods such as PKI certificates, smartcards, and passwords.

CCMP

Counter Mode with


CBC-


MAC (Message Authentication Code)


Protocol



A WPA2 standard that uses an AES (Advanced Encryption Standard) block cipher with counter mode. Counter Mode makes pattern detection difficult, thus making this a strong protocol.

Protocol (wireless)

RADIUS

Remote


Authentication


Dial


In


User


Service

EFS

Encrypting


File


System



Software that encrypts files

HSM

Hardware


Security


Module



A device that is designed to handle cryptographic duties, thus allowing servers to focus on other tasks.

Security device

TPM

Trusted


Platform


Module



Used to encrypt/decrypt disk contents.


Stores keys, certificates, and passwords used for disk encryption (in a chip).

Security device

PaaS

Platform as a Service



Provides IT services over a network such as virtual servers, databases, and programming APIs.

SaaS

Software as a Service



Enables productivity software to be rapidly provisioned over a network.

IaaS

Infrastructure as a Service



Refers to network, storage, and backup services offered in the cloud.

SecaaS (sometimes ka SaaS)

Security as a Service



Provides hosted and managed security solutions, such as malware screening, through a third party.