File:3D Cover - A Manager's Guide to Business Continuity Management for Cyber Security Incident Response.png
Size of this preview: 456 × 600 pixels. Other resolution: 892 × 1,173 pixels.
Original file (892 × 1,173 pixels, file size: 1.04 MB, MIME type: image/png)
3D Cover - A Manager's Guide to Business Continuity Management for Cyber Security Incident Response
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 16:38, 15 August 2017 | 892 × 1,173 (1.04 MB) | Moh heng (talk | contribs) | 3D Cover - A Manager's Guide to Business Continuity Management for Cyber Security Incident Response |
File usage
The following file is a duplicate of this file (more details):
More than 100 pages use this file. The following list shows the first 100 pages that use this file only. A full list is available.
- Access Control
- Asset
- Audit
- Availability
- Awareness
- BCM Specialist Series
- Backdoor Access
- Backup
- C2 Takeover
- CMS Compromise
- Chief Information Officer
- Chief Information Security Officer
- Chief Security Officer
- Chief Technology Officer
- Cloud-based Vendor
- Compliance
- Conduit Devices
- Confidentiality
- Configuration
- Configuration Exploitation
- Containment
- Content Management System
- Continuous Improvement
- Corrective Action
- Credibility
- Cyber Resiliency
- Cyber Risk
- Cyber Security
- Cyber Security Attacks
- Cyber Security Framework
- Cyber Security Incident
- Cyber Security Incident Response
- Cyber Security Insurance
- Cyber Security Kill Chain
- Cyber Security Risk
- Cyber Security Team
- Cyber Security Threats
- DNS Tunneling
- Data Breach
- Data Management
- Data Recovery
- Denial of Service
- Digital Extortion
- Disgruntled Employees
- Domain Name System
- Encryption
- Escalation
- Extortion
- Financial Pretexting
- Firewall
- Forensics
- Hacktivist Attack
- Hacktivists
- Human Error
- Incident Response
- Information Asset
- Information Security
- Information Security Team
- Information Technology
- Information Technology Security Team
- Insider Threat
- Integrity
- IoT Calamity
- Leadership
- Legislation
- Logic Switch
- Malware
- Management Commitment
- Mitigation
- Mobile Assault
- Monitoring
- NIST Framework
- Notification
- Off-site
- Partner Misuse
- Patch
- Peripheral Tampering
- Personally Identifiable Information
- Phishing
- Physical/Virtual Server
- Prevention
- Privilege
- Ransomware
- Redundancy
- Replication
- Resiliency
- Responsive Action
- Risk Assessment
- Risk Management
- Risk Mitigation
- Rogue Connection
- SQL Injection
- Social Engineering
- Social Media
- Storage
- Testing and Exercising
- The Human Element
- Training
- USB Infection
View more links to this file.