Difference between revisions of "Cyber Security Glossary"

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
(14 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
[[File:BCM Institute.jpg|thumb|left|100px|]]
 
 
 
{{Header:Glossary}} {{BCMPedia Banner}} {{Languages|Cyber Security Glossary}} {{Header:Cyber Security}} {{Header:About BCMpedia}}
 
{{Header:Glossary}} {{BCMPedia Banner}} {{Languages|Cyber Security Glossary}} {{Header:Cyber Security}} {{Header:About BCMpedia}}
  
 +
[[File:BCMPedia CyberSecurity.png|thumb|left|200px]]
  
  
Line 22: Line 20:
  
 
'''C'''
 
'''C'''
* [[Chief Information Officer]] (CIO)
 
* [[Chief Information Security Officer]] (CISO)
 
* [[Chief Security Officer]] (CSO)
 
* [[Chief Technology Officer]] (CTO)
 
* [[Cloud-based Vendor]]
 
* [[Compliance]]
 
* [[Confidentiality]] of Data
 
* [[Configuration]]
 
* [[Containment]]
 
* [[Content Management System]]
 
* [[Continuous Improvement]]
 
* [[Corrective Action]]
 
* [[Credibility]] 
 
* [[Cyber Resiliency]]
 
* [[Cyber Risk]]
 
* [[Cyber Security]]
 
* [[Cyber Security Attacks]]
 
* [[Cyber Security Framework]]
 
* [[Cyber Security Incident]]
 
* [[Cyber Security Incident Response]] (CIR)
 
* [[Cyber Security Insurance]]
 
* [[Cyber Security Kill Chain]]
 
* [[Cyber Security Risk]]
 
  
|'''C'''
+
*[[Chief_Information_Officer|Chief Information Officer]] (CIO)
* [[Cyber Security Threats]]  
+
*[[Chief_Information_Security_Officer|Chief Information Security Officer]] (CISO)
** [[The Human Element]]
+
*[[Chief_Security_Officer|Chief Security Officer]] (CSO)
*** [[Social Engineering]]
+
*[[Chief_Technology_Officer|Chief Technology Officer]] (CTO)
*** [[Financial Pretexting]]
+
*[[Cloud-based_Vendor|Cloud-based Vendor]]  
*** [[Digital Extortion]]
+
*[[Compliance|Compliance]]  
*** [[Insider Threat]]
+
*[[Confidentiality|Confidentiality]] of Data
*** [[Partner Misuse]]
+
*[[Configuration|Configuration]]  
*** [[Hacktivist Attack]]
+
*[[Containment|Containment]]  
*** [[Disgruntled Employees]]
+
*[[Content_Management_System|Content Management System]]  
*** [[USB Infection]]
+
*[[Continuous_Improvement|Continuous Improvement]]  
*** [[C2 Takeover]]
+
*[[Corrective_Action|Corrective Action]]  
*** [[Mobile Assault]]
+
*[[Credibility|Credibility]]  
*** [[IoT Calamity]]
+
*[[Cyber_Criminal|Cyber Criminal]]  
** [[Configuration Exploitation]]
+
*[[Cyber_Resiliency|Cyber Resiliency]]  
*** [[Website Defacement]]
+
*[[Cyber_Risk|Cyber Risk]]  
*** [[DDoS Attack]]
+
*[[Cyber_Security|Cyber Security]]  
*** [[ICS Onslaught]]
+
*[[Cyber_Security_Attacks|Cyber Security Attacks]]  
** [[Malicious Software]]
+
*[[Cyber_Security_Framework|Cyber Security Framework]]  
*** [[Data Ransomware/Crypto Malware]]
+
*[[Cyber_Security_Incident|Cyber Security Incident]]  
*** [[Sophisticated Malware]]
+
*[[Cyber_Security_Incident_Response|Cyber Security Incident Response]] (CIR)
*** [[RAM Scraping]]
+
*[[Cyber_Security_Insurance|Cyber Security Insurance]]  
*** [[Unknown Unknowns]]
+
*[[Cyber_Security_Kill_Chain|Cyber Security Kill Chain]]  
* [[Cyber Security Team]]  
+
*[[Cyber_Security_Risk|Cyber Security Risk]]  
  
 +
| '''C'''
 +
*[[Cyber_Security_Threats|Cyber Security Threats]]
 +
**[[The_Human_Element|The Human Element]]
 +
***[[Social_Engineering|Social Engineering]]
 +
***[[Financial_Pretexting|Financial Pretexting]]
 +
***[[Digital_Extortion|Digital Extortion]]
 +
***[[Insider_Threat|Insider Threat]]
 +
***[[Partner_Misuse|Partner Misuse]]
 +
***[[Hacktivist_Attack|Hacktivist Attack]]
 +
***[[Disgruntled_Employees|Disgruntled Employees]] 
 +
**[[Conduit_Devices|Conduit Devices]]
 +
***[[USB_Infection|USB Infection]]
 +
***[[Peripheral_Tampering|Peripheral Tampering]]
 +
***[[Rogue_Connection|Rogue Connection]]
 +
***[[Logic_Switch|Logic Switch]]
 +
***[[C2_Takeover|C2 Takeover]]
 +
***[[Mobile_Assault|Mobile Assault]]
 +
***[[IoT_Calamity|IoT Calamity]] 
 +
**[[Configuration_Exploitation|Configuration Exploitation]]
 +
***[[SQL_Injection|SQL Injection]]
 +
***[[CMS_Compromise|CMS Compromise]]
 +
***[[Backdoor_Access|Backdoor Access]]
 +
***[[DNS_Tunneling|DNS Tunneling]]
 +
***[[Website_Defacement|Website Defacement]]
 +
***[[DDoS_Attack|DDoS Attack]]
 +
***[[ICS_Onslaught|ICS Onslaught]]
 +
***[[Cloud_Storming|Cloud Storming]] 
 +
**[[Malicious_Software|Malicious Software]]
 +
***[[Data_Ransomware/Crypto_Malware|Data Ransomware/Crypto Malware]]
 +
***[[Sophisticated_Malware|Sophisticated Malware]]
 +
***[[RAM_Scraping|RAM Scraping]]
 +
***[[Credential_Theft|Credential Theft]]
 +
***[[Unknown_Unknowns|Unknown Unknowns]]   
 +
*[[Cyber_Security_Team|Cyber Security Team]]
  
 
'''D'''
 
'''D'''
Line 79: Line 88:
 
*[[Denial_of_Service|Denial of Service]]  
 
*[[Denial_of_Service|Denial of Service]]  
 
*[[Domain_Name_System|Domain Name System]] (DNS)  
 
*[[Domain_Name_System|Domain Name System]] (DNS)  
*[[Drives|Drives]]  
+
*[[Drivers|Drivers]]  
  
|'''E'''  
+
| '''E'''  
 
*[[Email|Email]]  
 
*[[Email|Email]]  
 
*[[Encryption|Encryption]]  
 
*[[Encryption|Encryption]]  
Line 99: Line 108:
  
 
*[[Hacktivists|Hacktivists]]  
 
*[[Hacktivists|Hacktivists]]  
*[[Human_error|Human error]]  
+
*[[Human_Error|Human Error]]  
  
 
'''I'''
 
'''I'''
Line 128: Line 137:
 
*[[Notification|Notification]]  
 
*[[Notification|Notification]]  
  
|'''O'''
+
| '''O'''  
 +
*[[Off-site|Off-site]]
  
*[[Off-site|Off-site]]
+
'''P'''
  
'''P'''
 
 
*[[Patch|Patch]]  
 
*[[Patch|Patch]]  
 
*[[Personally_Identifiable_Information|Personally Identifiable Information]] (PII)  
 
*[[Personally_Identifiable_Information|Personally Identifiable Information]] (PII)  
Line 167: Line 176:
 
*[[User_Account|User Account]]  
 
*[[User_Account|User Account]]  
  
'''V'''
 
 
*[[Voice_Communication|Voice Communication]]
 
  
 
|}
 
|}

Revision as of 13:21, 12 January 2020

BCM Institute and Standards Glossary

Business Continuity Management | Crisis Management | Crisis Communication | Disaster Recovery | Operational Resilience | Guide | BCM Audit | Cyber Security | Pandemic Flu | Supply Chain BCM | ISO22301 | ISO22320 | ISO22390 | ISO22399 | ISO31000 | ANZ5050 | ASIS | BS25999 | MS1970 | NFPA1600 | SS540 | ENISA | ITIL | NCEMA

Template:Header:Cyber Security == About BCMpedia ==

Business Continuity Management Institute (BCM Institute) Glossary in Wiki (Version 1.0) or BCMpedia provides Business Continuity (BC), Crisis Management (CM), Crisis Communication (CC), Operational Resilience, BCM Audit, Disaster Recovery (DR) and Operational Resilience (OR), Professional with definitions that help to reduce confusion, thus promoting a common understanding and interpretation when implementing the BCM planning process. While a defined word or phrase can have several other meanings or connotations, especially on its usage and interpretation, this BCM Institute's Wiki site or BCMpedia will provide you with one of the closest definitions.

It is also the most comprehensive set of business continuity and disaster recovery definitions as it includes most of the key definitions from the other sources. The definition includes similar terms used by ISO ISO22301, and older (centralised into ISO22301) standards such as the British Standard BS25999, Singapore Standard SS540, Australian Standard ANZ5050, and ASIS. Business Continuity Management: Preparedness,Crisis Communication, Crisis Management, Disaster Recovery and Operational Resilience, etc. The site map for http://www.bcmpedia.org.

BCMPedia CyberSecurity.png


Cyber Security (Incident Response) Glossary

A

B

C

C

D

E

F

G

H

I

L

M

N

O

P

R

S

T

U



Certification Menu | BCCP | CMCP | CCCP | DRCP | ORCP | BCCS | CCCS | CMCS | DRCS | ORCS | BCCE | CMCE | CCCE | DRCE | ORCE | BCCA | BCCLA
Competency Level Menu | CL 1B | CL 2B | CL 3B | CL 1C | CL 2C | CL 3C | CL 1CC | CL 2CC | CL 3CC | CL 1D | CL 2D | CL 3D | CL 1OR | CL 2OR | CL 3OR | CL 2A | CL 3A
Body of Knowledge Menu| BoK 1 | BoK 2 | BoK 3 | BoK 4 | BoK 5 | BoK 6 | BoK 7
Level of Expertise Menu | KNOW | DO | MANAGE