This website uses cookies
We use cookies to continuously improve your experience on our site. More info.
Cyber Security |
|
Stands for Security Information and Event Management. Enables to detect, monitor, analyze and respond to security events or incidents within a real-time IT environment. Multiple security applications and devices can be managed. |
|
Stands for Security Content Automation Protocol. It's a set of open standards for sharing security data developed by the U.S. National Institute of Standards and Technology (NIST). Enables the automated vulnerability management, measurement, and policy compliance evaluation of systems deployed in an organization. |
|
Stands for Microsoft System Center Configuration Manager. Certification is designed to affirm a learner's ability to help businesses manage client computers and devices. |
|
Stands for Security Operations Center. A centralized unit that monitors and analyzes an organization’s security posture, and deals with cybersecurity incidents. |
|
Stands for Systems Security Certified Practitioner. It's a vendor-neutral entry-level information security certification issued by the International Information System Security Certification Consortium, also known as (ISC)². |
|
Stands for Security Technical Implementation Guide. It contains policy requirements for security programs and best practices for Information Assurance (IA) enabled applications. Based on Department of Defense (DoD) policy and security controls. |
|
Surfshark is a comprehensive cybersecurity suite designed to protect every aspect of users' online experience. It provides VPN services, as well as security features like antivirus protection, data breach alerts, a private search tool, and a personal data removal system. |
|
A mechanism of directing a signal or data element toward a particular hardware address or hardware pieces. It makes it possible to connect multiple devices on the same network within a building or campus. |
|
Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and action-oriented advice about an existing or emerging menace or hazard to assets. |
|
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized. |
|
A process by which organizations identify and resolve threats to their systems. Occurs when the threat can be eradicated. It is dependent on the type, category and priority that the threat falls into. |
|
Stands for Top Secret / Sensitive Compartmented Information. It's a US DoD security clearance. Eligibility for access to TS/SCI is determined by a Single Scope Background Investigation (SSBI) or periodic reinvestigation. |
|
Stands for the Tactics, Techniques and Procedures of cyber threats. The highest-level description of the behavior or methods of working of cyber adversaries. |
|
Vulnerability is a security weakness in a computer system that permits unauthorized or unwelcome access. |
|
A process of identifying, analyzing and ranking vulnerabilities in computer systems, applications, and network infrastructures. |
|
A process of identifying, classifying, remediating, and mitigating security vulnerabilities. It is integral to computer security and network security. |
|
An application firewall for HTTP applications that protects servers. It filters and monitors HTTP traffic between a web application and the Internet. |
|
A computer or a software system that acts as a gateway between a local network and a larger-scale network such as the internet. It provides increased performance and security and helps filter what users connected to the network can access. |
|
A subset of network security that prevents unauthorized and malicious access to computers or data using wireless networks. It is delivered through wireless devices. |