Difference between revisions of "Cyber Security Glossary"
(44 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
− | [[Image:BCM Institute.jpg|left|thumb|100px| '''[http://www.bcm-institute.org/courses | + | [[Image:BCM Institute.jpg|left|thumb|100px| '''[http://www.bcm-institute.org/courses Click: Visit BCM Institute's Courses]''']] |
+ | |||
+ | {{Header:Glossary}} {{BCMPedia Banner}} {{Languages|Cyber Security Glossary}} {{Header:Cyber Security}} {{Header:About BCMpedia}} | ||
+ | |||
+ | [[File:BCMPedia CyberSecurity.png|thumb|left|200px]] | ||
+ | |||
+ | | ||
+ | |||
+ | | ||
+ | |||
+ | | ||
+ | |||
+ | | ||
+ | |||
− | |||
− | |||
− | |||
− | |||
− | |||
== Cyber Security (Incident Response) Glossary == | == Cyber Security (Incident Response) Glossary == | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | '''B''' | + | {| border="0" cellpadding="2" style="width:100%" |
− | * [[Backup]] | + | |- valign="top" |
+ | | '''A''' | ||
+ | *[[Access_Control|Access Control]] | ||
+ | *[[Asset|Asset]] | ||
+ | *[[Audit|Audit]] | ||
+ | *[[Availability|Availability]] of Data | ||
+ | *[[Awareness|Awareness]] | ||
+ | |||
+ | '''B''' | ||
+ | |||
+ | *[[Backup|Backup]] | ||
+ | |||
+ | '''C''' | ||
− | + | *[[Chief_Information_Officer|Chief Information Officer]] (CIO) | |
− | * [[Chief Information Security Officer]] (CISO) | + | *[[Chief_Information_Security_Officer|Chief Information Security Officer]] (CISO) |
− | * [[Chief Security Officer]] (CSO) | + | *[[Chief_Security_Officer|Chief Security Officer]] (CSO) |
− | * [[Cloud-based Vendor]] | + | *[[Chief_Technology_Officer|Chief Technology Officer]] (CTO) |
− | * [[Compliance]] | + | *[[Cloud-based_Vendor|Cloud-based Vendor]] |
− | * [[Confidentiality of Data | + | *[[Compliance|Compliance]] |
− | * [[Configuration]] | + | *[[Confidentiality|Confidentiality]] of Data |
− | * [[Containment]] | + | *[[Configuration|Configuration]] |
− | * [[Content Management System]] | + | *[[Containment|Containment]] |
− | * [[Continuous Improvement]] | + | *[[Content_Management_System|Content Management System]] |
− | * [[Corrective]] | + | *[[Continuous_Improvement|Continuous Improvement]] |
− | * [[Credibility]] | + | *[[Corrective_Action|Corrective Action]] |
− | * [[Cyber Resiliency]] | + | *[[Credibility|Credibility]] |
− | * [[Cyber | + | *[[Cyber_Criminal|Cyber Criminal]] |
− | * [[Cyber Security]] | + | *[[Cyber_Resiliency|Cyber Resiliency]] |
− | * [[Cyber Security Incident Response]] (CIR) | + | *[[Cyber_Risk|Cyber Risk]] |
− | * [[Cyber Security Insurance]] | + | *[[Cyber_Security|Cyber Security]] |
+ | *[[Cyber_Security_Attacks|Cyber Security Attacks]] | ||
+ | *[[Cyber_Security_Framework|Cyber Security Framework]] | ||
+ | *[[Cyber_Security_Incident|Cyber Security Incident]] | ||
+ | *[[Cyber_Security_Incident_Response|Cyber Security Incident Response]] (CIR) | ||
+ | *[[Cyber_Security_Insurance|Cyber Security Insurance]] | ||
+ | *[[Cyber_Security_Kill_Chain|Cyber Security Kill Chain]] | ||
+ | *[[Cyber_Security_Risk|Cyber Security Risk]] | ||
− | ''' | + | | '''C''' |
− | * [[Data | + | *[[Cyber_Security_Threats|Cyber Security Threats]] |
− | * [[ | + | **[[The_Human_Element|The Human Element]] |
− | * [[ | + | ***[[Social_Engineering|Social Engineering]] |
− | * [[ | + | ***[[Financial_Pretexting|Financial Pretexting]] |
− | * [[ | + | ***[[Digital_Extortion|Digital Extortion]] |
− | * [[ | + | ***[[Insider_Threat|Insider Threat]] |
+ | ***[[Partner_Misuse|Partner Misuse]] | ||
+ | ***[[Hacktivist_Attack|Hacktivist Attack]] | ||
+ | ***[[Disgruntled_Employees|Disgruntled Employees]] | ||
+ | **[[Conduit_Devices|Conduit Devices]] | ||
+ | ***[[USB_Infection|USB Infection]] | ||
+ | ***[[Peripheral_Tampering|Peripheral Tampering]] | ||
+ | ***[[Rogue_Connection|Rogue Connection]] | ||
+ | ***[[Logic_Switch|Logic Switch]] | ||
+ | ***[[C2_Takeover|C2 Takeover]] | ||
+ | ***[[Mobile_Assault|Mobile Assault]] | ||
+ | ***[[IoT_Calamity|IoT Calamity]] | ||
+ | **[[Configuration_Exploitation|Configuration Exploitation]] | ||
+ | ***[[SQL_Injection|SQL Injection]] | ||
+ | ***[[CMS_Compromise|CMS Compromise]] | ||
+ | ***[[Backdoor_Access|Backdoor Access]] | ||
+ | ***[[DNS_Tunneling|DNS Tunneling]] | ||
+ | ***[[Website_Defacement|Website Defacement]] | ||
+ | ***[[DDoS_Attack|DDoS Attack]] | ||
+ | ***[[ICS_Onslaught|ICS Onslaught]] | ||
+ | ***[[Cloud_Storming|Cloud Storming]] | ||
+ | **[[Malicious_Software|Malicious Software]] | ||
+ | ***[[Data_Ransomware/Crypto_Malware|Data Ransomware/Crypto Malware]] | ||
+ | ***[[Sophisticated_Malware|Sophisticated Malware]] | ||
+ | ***[[RAM_Scraping|RAM Scraping]] | ||
+ | ***[[Credential_Theft|Credential Theft]] | ||
+ | ***[[Unknown_Unknowns|Unknown Unknowns]] | ||
+ | *[[Cyber_Security_Team|Cyber Security Team]] | ||
− | + | '''D''' | |
− | |||
− | |||
− | |||
− | |||
− | + | *[[Data_Breach|Data Breach]] | |
− | * [[ | + | *[[Data_Management|Data Management]] |
− | * [[ | + | *[[Data_Recovery|Data Recovery]] |
+ | *[[Denial_of_Service|Denial of Service]] | ||
+ | *[[Domain_Name_System|Domain Name System]] (DNS) | ||
+ | *[[Drivers|Drivers]] | ||
− | ''' | + | | '''E''' |
− | * [[ | + | *[[Email|Email]] |
+ | *[[Encryption|Encryption]] | ||
+ | *[[Escalation|Escalation]] | ||
+ | *[[Extortion|Extortion]] | ||
− | ''' | + | '''F''' |
− | |||
− | |||
− | + | *[[Firewall|Firewall]] | |
− | + | *[[Forensics|Forensics]] | |
− | |||
− | * [[ | ||
− | * [[ | ||
− | ''' | + | '''G''' |
− | |||
− | |||
− | + | *[[Governance|Governance]] | |
− | * [[ | ||
− | |||
− | |||
− | |||
− | ''' | + | '''H''' |
− | |||
− | |||
− | + | *[[Hacktivists|Hacktivists]] | |
+ | *[[Human_Error|Human Error]] | ||
− | + | '''I''' | |
− | | | + | *[[Incident_Response|Incident Response]] |
+ | *[[Information_Asset|Information Asset]] | ||
+ | *[[Information_Security|Information Security]] | ||
+ | *[[Information_Security_Team|Information Security Team]] | ||
+ | *[[Information_Technology|Information Technology]] | ||
+ | *[[Information_Technology_Security_Team|Information Technology Security Team]] | ||
+ | *[[Integrity|Integrity]] of Data | ||
− | * [[Patch]] | + | '''L''' |
− | * [[Personally Identifiable Information]] (PII) | + | |
− | * [[Phishing]] | + | *[[Leadership|Leadership]] |
− | * [[Physical/Virtual Server]] | + | *[[Legislation|Legislation]] |
− | * [[Prevention]] | + | |
− | * [[Privilege]] | + | '''M''' |
+ | |||
+ | *[[Malware|Malware]] | ||
+ | *[[Management_Commitment|Management Commitment]] | ||
+ | *[[Mitigation|Mitigation]] | ||
+ | *[[Monitoring|Monitoring]] | ||
+ | |||
+ | '''N''' | ||
+ | |||
+ | *[[NIST_Framework|NIST Framework]] | ||
+ | *[[Notification|Notification]] | ||
+ | |||
+ | | '''O''' | ||
+ | *[[Off-site|Off-site]] | ||
+ | |||
+ | '''P''' | ||
+ | |||
+ | *[[Patch|Patch]] | ||
+ | *[[Personally_Identifiable_Information|Personally Identifiable Information]] (PII) | ||
+ | *[[Phishing|Phishing]] | ||
+ | *[[Physical/Virtual_Server|Physical/Virtual Server]] | ||
+ | *[[Prevention|Prevention]] | ||
+ | *[[Preventive_Action|Preventive Action]] | ||
+ | *[[Privilege|Privilege]] | ||
'''R''' | '''R''' | ||
− | * [[Ransomware]] | + | *[[Ransomware|Ransomware]] |
− | * [[Redundancy]] | + | *[[Redundancy|Redundancy]] |
− | * [[Replication]] | + | *[[Replication|Replication]] |
− | * [[Resiliency]] | + | *[[Resiliency|Resiliency]] |
− | * [[Risk Assessment]] | + | *[[Responsive_Action|Responsive Action]] |
− | * [[Risk Management]] | + | *[[Risk_Assessment|Risk Assessment]] |
− | * [[Risk Mitigation]] | + | *[[Risk_Management|Risk Management]] |
+ | *[[Risk_Mitigation|Risk Mitigation]] | ||
'''S''' | '''S''' | ||
− | * [[Social Engineering]] | + | *[[Social_Engineering|Social Engineering]] |
− | * [[Social Media]] | + | *[[Social_Media|Social Media]] |
− | * [[Storage]] | + | *[[Storage|Storage]] |
'''T''' | '''T''' | ||
− | * [[Testing and Exercising]] | + | *[[Testing_and_Exercising|Testing and Exercising]] |
− | * [[Training]] | + | *[[Training|Training]] |
'''U''' | '''U''' | ||
− | * [[User Account]] | + | *[[User_Account|User Account]] |
− | |||
− | |||
− | |||
|} | |} | ||
+ | |||
+ | {{References}} | ||
[[Category:BCM Institute Cyber Security Glossary]] | [[Category:BCM Institute Cyber Security Glossary]] | ||
− | |||
− | |||
− |
Revision as of 16:02, 24 January 2018
BCM Institute and Standards Glossary
Business Continuity Management | Crisis Management | Crisis Communication | Disaster Recovery | Operational Resilience | Guide | BCM Audit | Cyber Security | Pandemic Flu | Supply Chain BCM | ISO22301 | ISO22320 | ISO22390 | ISO22399 | ISO31000 | ANZ5050 | ASIS | BS25999 | MS1970 | NFPA1600 | SS540 | ENISA | ITIL | NCEMA
Template:Header:Cyber Security == About BCMpedia ==
Business Continuity Management Institute (BCM Institute) Glossary in Wiki (Version 1.0) or BCMpedia provides Business Continuity (BC), Crisis Management (CM), Crisis Communication (CC), Operational Resilience, BCM Audit, Disaster Recovery (DR) and Operational Resilience (OR), Professional with definitions that help to reduce confusion, thus promoting a common understanding and interpretation when implementing the BCM planning process. While a defined word or phrase can have several other meanings or connotations, especially on its usage and interpretation, this BCM Institute's Wiki site or BCMpedia will provide you with one of the closest definitions.
It is also the most comprehensive set of business continuity and disaster recovery definitions as it includes most of the key definitions from the other sources. The definition includes similar terms used by ISO ISO22301, and older (centralised into ISO22301) standards such as the British Standard BS25999, Singapore Standard SS540, Australian Standard ANZ5050, and ASIS. Business Continuity Management: Preparedness,Crisis Communication, Crisis Management, Disaster Recovery and Operational Resilience, etc. The site map for http://www.bcmpedia.org.
Cyber Security (Incident Response) Glossary
Certification Menu | BCCP | CMCP | CCCP | DRCP | ORCP | BCCS | CCCS | CMCS | DRCS | ORCS | BCCE | CMCE | CCCE | DRCE | ORCE | BCCA | BCCLA
Competency Level Menu
| CL 1B | CL 2B | CL 3B | CL 1C | CL 2C | CL 3C | CL 1CC | CL 2CC | CL 3CC | CL 1D | CL 2D | CL 3D | CL 1OR | CL 2OR | CL 3OR | CL 2A | CL 3A
Body of Knowledge Menu| BoK 1 | BoK 2 | BoK 3 | BoK 4 | BoK 5 | BoK 6 | BoK 7
Level of Expertise Menu | KNOW | DO | MANAGE