flash cards messer
PCI DSS
Payment Card Industry Data Security Standard
NIST CSF
National institute of standard Technology Cyber Security Framework
ISO 22301
Security & Resilience business continuity management
It provides a practical framework for setting up and managing an effective business continuity management system
ISO 27701
Information security rules and requirements (compliance/regulation)
privacy information management
ISO 31000
Risk management best practices
suggestions for management risk response within a organization
ISO 27001
information security management systems
rules and requirements used by many governing bodies to create compliance/regulations
ISO 27002
is an international standard that provides guidance for organizations looking to establish, implement, and improve an Information Security Management System (ISMS) focused on cybersecurity.
compensation
Think of compensation as a safety net - in this case, it’s like having insurance to cover the risk of using outdated encryption on a critical server that can’t be upgraded.
shadow IT
employees set up their own tech systems (shadow IT) without permission, like sneaking in a new service without IT approval.
dark web
Imagine a secret underground market
ISAC
To stay proactive in understanding threats, a security manager should review industry information-sharing and collaboration groups like ISACs, which provide specific threat information for their sector, akin to a neighborhood watch program for businesses.
TAXII
is a protocol for transferring Cyber Threat Intelligence from a server to client(C) STIX - Structured method of describing cyber security threats in a consistent matter. While it helps logically organize information it isn’t a source of sharing information.
Vulnerability feeds
only show software/hardware vulnerabilities. Nothing about their human targets.
STIX -
Structured method of describing cyber security threats in a consistent matter. While it helps logically organize information it isn’t a source of sharing information.
persistent threat
Think of an advanced persistent threat like a sophisticated spy who is highly skilled, patient, and persistent in infiltrating a system over a long period without being detected.
CVSS
a severity score for vulnerabilities, like a grade for how serious a security issue is, while SIEM is like a security guard monitoring logs in real-time.
Autopsy
is a tool for performing data forensics.
Nmap
short for network mapper, is capable of port scanning the network and determining what services are running on any hosts that are detected.
watering -hole attack
imagine the fantasy football website as a watering hole in the wild where predators wait to attack unsuspecting animals; in this scenario, the highest concern is a watering-hole attack.
Smishing
spim
vishing
spear
Smishing is text/instant message (SMS) phishing.
- SPIM is text/instant message spam.
- Vishing is VOIP (voice) phishing. It requires someone to call you.
- Spear phishing is a phishing attack that targets a specific individual or group.
RAT Remote access trojans
are malware designed to allow an attacker to remotely control an infected computer.