Cyber Security |
Computer Forensics |
Determines and reveals technical criminal evidence to provide a conclusive description of cyber crime activities. May also be used in civil proceedings. It refers only to the investigation of computers.
|
Computer Security |
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
|
Cryptography |
A practice of secure communication techniques. Information and communication are protected through the use of codes. Only those who possess a secret key can decipher the message into plain text.
|
Cybersecurity |
Cyber security (computer security) refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
|
Cyber Risk Remediation Analysis |
A methodology for selecting countermeasures to minimize a cyber-asset's susceptibility to cyber-attack over a range of attack TTPs associated with the Advanced Persistent Threat (APT).
|
DataGuard |
DataGuard is a security and compliance software company trusted by more than 4,000 organizations across the globe. Customers use the platform to build up scalable risk management while getting certified fast and complying effortlessly with industry regulations and frameworks such as ISO 27001, TISAX®, NIS2, SOC2, GDPR, and the EU Whistleblower Directive. DataGuard’s purpose-built software suite offers AI-powered workflow automation and seamless integration capabilities, reducing the time and money companies spend to build a digital Information Security Management System (ISMS) and Compliance Management System (CMS).
|
Digital Forensics |
A branch of forensic science. Refers to detecting, preserving, analyzing and presenting of evidence found on any digital storage media devices.
|
DLP |
Data loss protection (DLP) is a set of tools and processes. Detects and prevents data breaches, exfiltration, or unwanted destruction of sensitive data.
|
DoD 8570 |
Information Assurance Workforce Improvement Program. Provides procedures and guidelines for the training, certification, and management of all DoD employees who perform IA functions in their official assigned duties.
|
Dynamic Malware Analysis |
Dynamic Malware Analysis actually runs malware to observe its behavior, understand its functionality and identify technical indicators which can be used in detection signatures. Technical indicators revealed with dynamic analysis can include domain names, IP addresses, file path locations, registry keys, additional files located on the system or network.
|
eMASS |
Stands for the Enterprise Mission Assurance Support Service. An automated tool helps the Department of Defense (DoD) to maintain Information Assurance (IA) situational awareness, manage risk, and comply with the Federal Information Security Management Act (FISMA).
|
Encryption |
A process of converting data or information into another form, or code, to make it unreadable for unauthorized users. Only people who know a descryption key can read it.
|
GCIA |
Stands for GIAC Certified Intrusion Analyst. A certification issued by Global Information Assurance Certification. Demonstrates that an individual is able to configure and monitor intrusion detection systems, and to read, interpret, and analyze network traffic and related log files.
|
GCIH |
Stands for GIAC Certified Incident Handler. A certification issued by Global Information Assurance Certification. Demonstrates that an individual is able to understand what a Security Incident is and to deal with an incident after it has occurred.
|
GRC |
Stands for a Governance Risk and Compliance. It facilitates the formulation and sustained management of information security risks.
|
GSEC |
Stands for GIAC Security Essentials Certification. Issued by Global Information Assurance Certification. Demonstrates that an individual understands information security beyond simple terminology and concepts.
|
HBSS |
A Host Based Security System. Commercial-off-the-shelf (COTS) suite of software applications. Monitors, detects, and defends the Department of Defence (DoD) computer networks and systems.
|
HIPS |
Stands for Host Intrusion Prevention System. Aims to protect endpoint devices. Stops malware by monitoring the behavior of the code.
|
Identity and Access Management |
A framework of policies and technologies that facilitates the management of electronic or digital identities. Controls who is authenticated and authorized to use resources.
|
Incident detection |
Incident detection is also known as attack/threat detection, is the process of finding intruders in your infrastructure, retracing their activity, containing the threat, and removing their foothold.
|
Incident Response |
A method of rapidly responding to security breaches or cyber attacks. Aims to detect an attack, limit the damage, manage it in a way that reduces recovery time and costs.
|
Information Assurance |
A practice of protecting information and managing risks related to the use, processing, storage, and transmission of data and information systems. It ensures availability, integrity, authentication, confidentiality, and non-repudiation.
|
Information Security |
An acronym of Information Security. It is practice of preventing unauthorized access as well as abuse of illegally acquired information. This also includes disclosure, modification, disruption or destruction, inspection or recording of information.
|
Information security architecture |
The information security architecture represents the portion of the enterprise architecture that specifically addresses information system resilience and provides architectural information for the implementation of capabilities to meet security requirements.
|
Intrusion Detection |
Monitors a network or systems for malicious activity, policy violations or port scanners. Raises alerts on recognizing a known threat’s signature.
|