This website uses cookies
We use cookies to continuously improve your experience on our site. More info.
Cyber Security |
|
Stands for an intrusion prevention system. Identifies malicious activities such as policy violations or security threats. Denies network traffic based on a security profile and reports it. |
|
ISO framework developed by the International Organization for Standardization. Helps organizations manage the security of assets such as financial information, intellectual property, employee details or information entrusted by third parties. |
|
Stands for the Information Technology Infrastructure Library. It's a framework of best practices for delivering IT services within a business. Aims to improve efficiency and achieve predictable service delivery. |
|
Stands for Control Objectives for Information and Related Technologies. Created by a professional association ISACA, it is a roadmap for IT management and governance, information security, audit and risk management. |
|
A process of analyzing computer-generated records to diagnose and resolve issues within an application. Helps mitigate a variety of risks and meet compliance regulations. |
|
Any software used to disrupt computer operations. Once it gains access to private computer systems, it can gather sensitive information or display unwanted advertising. There are many malware types that perform different functions; e.g., spyware, trojan horse, ransomware, worms, viruses, etc. |
|
A process of determining and analyzing the functionality, origin and potential impact of given malware samples. |
|
Stands for Microsoft Certified Solutions Associate is a certification program intended for people who seek entry level jobs in an IT environment. |
|
Stands for Microsoft Certified Solutions Expert. MCSEs plan, design, and implement Microsoft Windows Server solutions and architectures in medium-or large-sized organizations. |
|
A remote vulnerability scanner, that is used during vulnerability assessments and penetration testing engagements, including malicious attacks. |
|
A process of translating the IP addresses of computers in a local network to a single IP address. It helps decrease the number of public IP addresses an organization or company use, for both economy and security purposes. |
|
A practice of preventing and protecting the underlying networking infrastructure against unauthorized intrusion into corporate networks. It is designed to protect the usability and integrity of the network and data. |
|
A part of the third generation of firewall technology. It's a more advanced version of the traditional firewall that performs a more in-depth inspection. Includes such features as application awareness and control, integrated intrusion prevention, cloud-delivered threat intelligence. |
|
US Government guidance for private sector organizations that assesses and improves their ability to prevent, detect, and respond to cyber attacks. |
|
Openswan provides a complete IPsec implementation for Linux 2.0, 2.2, 2.4 and 2.6 kernels. Openswan, begun as a fork of the now-defunct FreeS/WAN project, continues to use the GNU General Public License. Unlike the FreeS/WAN project, it does not exclusively target the GNU/Linux operating system. |
|
Palo Alto Networks provide network security solutions. They offer firewalls that identify and control applications, scan content to stop threats, prevent data leakage, integrated application, user, and content visibility. |
|
Stands for the Payment Card Industry Data Security Standard. Aims to increase controls around cardholder data to reduce credit card fraud. |
|
An enterprise security information and event management (SIEM) product. It provides security teams with the visibility and analytics needed to quickly detect, investigate and respond to threats. It"s available on premises and in a cloud environment. |
|
Reverse engineering malware is the process of taking a captured executable (a stand-alone executable or a library file, such as a DLL) and doing the computer equivalent of an MRI. |
|
Federal government policy and standards that dictate how United States government IT systems must be architected, secured, and monitored. It helps secure information systems developed by the National Institute of Standards and Technology. |
|
A process of selecting a path for traffic from source to a particular destination. Performed by a router. |
|
Global Information Assurance Certification founded by the SANS Institute. It offers more than 30 security certifications across different levels. Ensures that a certified individual has the knowledge and skills necessary for a practitioner in key areas of computer, information and software security. |
|
A plan and set of principles that should be provided to achieve security goals. Defines when and where to apply security controls. |
|
Security compliance means ensuring that your organization meets the standards for data privacy and security that apply to your specific industry. |
|
A vendor-neutral, internationally-recognized information security certification by the CompTIA (the Computing Technology Industry Association). Certifies that information security professionals have two years of full-time security-related work experience. |