flash cards messer
PCI DSS
Payment Card Industry Data Security Standard
NIST CSF
National institute of standard Technology Cyber Security Framework
ISO 22301
Security & Resilience business continuity management
It provides a practical framework for setting up and managing an effective business continuity management system
ISO 27701
Information security rules and requirements (compliance/regulation)
privacy information management
ISO 31000
Risk management best practices
suggestions for management risk response within a organization
ISO 27001
information security management systems
rules and requirements used by many governing bodies to create compliance/regulations
ISO 27002
is an international standard that provides guidance for organizations looking to establish, implement, and improve an Information Security Management System (ISMS) focused on cybersecurity.
compensation
Think of compensation as a safety net - in this case, it’s like having insurance to cover the risk of using outdated encryption on a critical server that can’t be upgraded.
shadow IT
employees set up their own tech systems (shadow IT) without permission, like sneaking in a new service without IT approval.
dark web
Imagine a secret underground market
ISAC
To stay proactive in understanding threats, a security manager should review industry information-sharing and collaboration groups like ISACs, which provide specific threat information for their sector, akin to a neighborhood watch program for businesses.
TAXII
is a protocol for transferring Cyber Threat Intelligence from a server to client(C) STIX - Structured method of describing cyber security threats in a consistent matter. While it helps logically organize information it isn’t a source of sharing information.
Vulnerability feeds
only show software/hardware vulnerabilities. Nothing about their human targets.
STIX -
Structured method of describing cyber security threats in a consistent matter. While it helps logically organize information it isn’t a source of sharing information.
persistent threat
Think of an advanced persistent threat like a sophisticated spy who is highly skilled, patient, and persistent in infiltrating a system over a long period without being detected.