🚀 Sign up for the bi-weekly newsletter

Join over 2000 recruiters and sourcers from around the world.

Cyber Security

Computer Forensics

Determines and reveals technical criminal evidence to provide a conclusive description of cyber crime activities. May also be used in civil proceedings. It refers only to the investigation of computers.

Computer Security

Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. 

Cryptography

A practice of secure communication techniques. Information and communication are protected through the use of codes. Only those who possess a secret key can decipher the message into plain text.

Cybersecurity

Cyber security (computer security) refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.

Cyber Risk Remediation Analysis

A methodology for selecting countermeasures to minimize a cyber-asset's susceptibility to cyber-attack over a range of attack TTPs associated with the Advanced Persistent Threat (APT).

Digital Forensics

A branch of forensic science. Refers to detecting, preserving, analyzing and presenting of evidence found on any digital storage media devices.

DLP

Data loss protection (DLP) is a set of tools and processes. Detects and prevents data breaches, exfiltration, or unwanted destruction of sensitive data. 

DoD 8570

Information Assurance Workforce Improvement Program. Provides procedures and guidelines for the training, certification, and management of all DoD employees who perform IA functions in their official assigned duties.

Dynamic Malware Analysis

Dynamic Malware Analysis actually runs malware to observe its behavior, understand its functionality and identify technical indicators which can be used in detection signatures. Technical indicators revealed with dynamic analysis can include domain names, IP addresses, file path locations, registry keys, additional files located on the system or network.

eMASS

Stands for the Enterprise Mission Assurance Support Service. An automated tool helps the Department of Defense (DoD) to maintain Information Assurance (IA) situational awareness, manage risk, and comply with the Federal Information Security Management Act (FISMA).

Encryption

A process of converting data or information into another form, or code, to make it unreadable for unauthorized users. Only people who know a descryption key can read it.

GCIA

Stands for GIAC Certified Intrusion Analyst. A certification issued by Global Information Assurance Certification. Demonstrates that an individual is able to configure and monitor intrusion detection systems, and to read, interpret, and analyze network traffic and related log files.

GCIH

Stands for GIAC Certified Incident Handler. A certification issued by Global Information Assurance Certification. Demonstrates that an individual is able to understand what a Security Incident is and to deal with an incident after it has occurred.

GRC

Stands for a Governance Risk and Compliance. It facilitates the formulation and sustained management of information security risks.

GSEC

Stands for GIAC Security Essentials Certification. Issued by Global Information Assurance Certification. Demonstrates that an individual understands information security beyond simple terminology and concepts.

HBSS

A Host Based Security System. Commercial-off-the-shelf (COTS) suite of software applications. Monitors, detects, and defends the Department of Defence (DoD) computer networks and systems.  

HIPS

Stands for Host Intrusion Prevention System. Aims to protect endpoint devices. Stops malware by monitoring the behavior of the code.

Identity and Access Management

A framework of policies and technologies that facilitates the management of electronic or digital identities. Controls who is authenticated and authorized to use resources.

Incident detection

Incident detection is also known as attack/threat detection, is the process of finding intruders in your infrastructure, retracing their activity, containing the threat, and removing their foothold.

Incident Response

A method of rapidly responding to security breaches or cyber attacks. Aims to detect an attack, limit the damage, manage it in a way that reduces recovery time and costs.

Information Assurance

A practice of protecting information and managing risks related to the use, processing, storage, and transmission of data and information systems. It ensures availability, integrity, authentication, confidentiality, and non-repudiation.

Information Security

An acronym of Information Security. It is practice of preventing unauthorized access as well as abuse of illegally acquired information. This also includes disclosure, modification, disruption or destruction, inspection or recording of information.

Information security architecture

The information security architecture represents the portion of the enterprise architecture that specifically addresses information system resilience and provides architectural information for the implementation of capabilities to meet security requirements.

Intrusion Detection

Monitors a network or systems for malicious activity, policy violations or port scanners. Raises alerts on recognizing a known threat’s signature.

IPS

Stands for an intrusion prevention system. Identifies malicious activities such as policy violations or security threats. Denies network traffic based on a security profile and reports it.

Development by Synergize.digital

Sign up for updates
straight to your inbox