Cybersecurity Foundations - Rian010/Journal GitHub Wiki

Source


  1. Cyber Threats

  2. Frameworks for Protection against Cyber Threats

  3. Making Cybersecurity Effective

  4. Detecting and Managing Cyber Incidents

  5. Cyber Diplomacy


ISACA

NIST

TakeDown

Information Is Beautiful World's Biggest Data Breaches and Hacks

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains

Lockheed Martin Cyber Emergency Response Team

NIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations

PCI Data Security Standard

ISO/IEC 27002

Standard of Good Practice for Information Security

Good Practices Information Security

Why Security Is a Business Issue

Enterprise Security Architecture - A Top- Down Approach

The Heartbleed Bug

Card Skimming Scam

World's Biggest Data Breaches & Hacks

PCI Security Standards

CSA Security Guidance for Critical Areas o Focus in Cloud Computing v4.0

Cloud Controls Matrix v3.0.1 Info Sheet

Common Criteria

Cybersecurity Magazine - What Exactly Is Security Assurance?

Forum of Incident Response and Security Teams (FIRST)

Cybersecurity & Infrastructure Security Agency

FIRST Conference

CREST Cyber Security Incident Response Maturity Assessment

Financial Services Information Sharing and Analysis Center (FS-ISAC)

Structured Threat Information eXpression (STIX) 1.x Archive Website

TheHive Project

European Union Agency for Cybersecurity (ENISA)

ICANN - Will There Really Be a New Russian Internet?

Torfox - The Great Firewall of China: Background

UN General Assembly- Developments in the Field of Information and Telecommunications in the Context of International Security

UN Office for Disarmament Affairs Cyberdiplomacy

Global Forum on Cyber Expertise (GFCE)

Cybill Tools & Publications

Cybil Projects

ENISA Considerations on the Traffic Light Protocol

LinkedIn Learning Security Courses

LinkedIn Learning Instructor Malcolm Shore


botnet

A network of compromised computers controllec as a group


Cyber Kill Chain

A concept that views an attack in seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and action


denial-of-service

An attack in which a remote attacker compromises IT systems by exploiting vulnerabilities


phishing

An attack that exploits a user through an email containing a malicious attachment or link to click on


rootkit

Malware that is in the core, or kernel, of the operating system


spear phishing

An attack that exploits a specific user through a custom-crafted email containing a malicious attachment or link to click on