Blog Index
Click on the name or phrase to take you to that post. We will add new links to existing posts on an ongoing basis.
Adaptive Identity
Adware
Ansible
API (Application Programming Interface)
APT (Advanced Persistent Threat)
Attack Frameworks
BCP (Business Continuity Plan)
Brand Impersonation
Buffer Overflow
Bug Bounty
CASB (Cloud Access Security Broker)
Certutil Video
Change Management
Clean Desk Policy
Cloud Responsibility Matrix
Containers
CSRF (Cross-Site Request Forgery)
Dark Web
Data Owner
Data Processor
Data in Transit
Data in Use
Data Sovereignty
Directory Traversal Attack
DKIM
DMARC
DNS Hijacking
DrDoS
EAP-FAST
EAP-TLS
EAP-TTLS
EDR
Elasticity
ESP (Encapsulating Security Payload)
Expansionary Risk Appetite
Fail Closed
Containers
CSRF (Cross-Site Request Forgery)
Dark Web
DATA GOVERNANCE ROLES
Data CustodianData Owner
Data Processor
***********************************
DATA PROTECTION
Data at RestData in Transit
Data in Use
***********************************
Data RetentionData Sovereignty
Directory Traversal Attack
DKIM
DMARC
DNS Hijacking
DrDoS
EAP-FAST
EAP-TLS
EAP-TTLS
EDR
Elasticity
ESP (Encapsulating Security Payload)
Expansionary Risk Appetite
Fail Closed
Fail Open
Flow Collector
Fuzzing
Geographic Restrictions
Geolocation
GPS Tagging
Guard Rails
Homomorphic Encryption
Honeyfile
Honeypot / Honeynet
Honeytoken
IaC (Infrastructure as Code)
IKE Phase 1
IMAP
IPSec
IPSec Transport Mode
ISACs
Jump Box / Jump Server
Key Escrow
Key Stretching
KPI (Key Performance Indicator)
Legal Hold
Load Balancing
Metadata
Nation State
Pretexting
Side Channel Attack
Smishing
Supply Chain Security
SY0-701 Acronym Flashcards
Syslog
VM Escape
VM Sprawl
Flow Collector
Fuzzing
GDPR (General Data Protection Regulation)
Right to be Forgotten***************************************
GeofencingGeographic Restrictions
Geolocation
GPS Tagging
Guard Rails
Homomorphic Encryption
Honeyfile
Honeypot / Honeynet
Honeytoken
IaC (Infrastructure as Code)
IKE Phase 1
IMAP
IPSec
IPSec Transport Mode
ISACs
Jump Box / Jump Server
Key Escrow
Key Stretching
KPI (Key Performance Indicator)
Legal Hold
Load Balancing
Metadata
Nation State
Pretexting
Side Channel Attack
Smishing
Supply Chain Security
SY0-701 Acronym Flashcards
Syslog
THREAT ACTORS
Insider********************************
VishingVM Escape
VM Sprawl
No comments:
Post a Comment