Cybersecurity Foundations - Rian010/Journal GitHub Wiki
Source
-
Cyber Threats
-
Frameworks for Protection against Cyber Threats
-
Making Cybersecurity Effective
-
Detecting and Managing Cyber Incidents
-
Cyber Diplomacy
ISACA
NIST
TakeDown
Information Is Beautiful World's Biggest Data Breaches and Hacks
Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
Lockheed Martin Cyber Emergency Response Team
NIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations
PCI Data Security Standard
ISO/IEC 27002
Standard of Good Practice for Information Security
Good Practices Information Security
Why Security Is a Business Issue
Enterprise Security Architecture - A Top- Down Approach
The Heartbleed Bug
Card Skimming Scam
World's Biggest Data Breaches & Hacks
PCI Security Standards
CSA Security Guidance for Critical Areas o Focus in Cloud Computing v4.0
Cloud Controls Matrix v3.0.1 Info Sheet
Common Criteria
Cybersecurity Magazine - What Exactly Is Security Assurance?
Forum of Incident Response and Security Teams (FIRST)
Cybersecurity & Infrastructure Security Agency
FIRST Conference
CREST Cyber Security Incident Response Maturity Assessment
Financial Services Information Sharing and Analysis Center (FS-ISAC)
Structured Threat Information eXpression (STIX) 1.x Archive Website
TheHive Project
European Union Agency for Cybersecurity (ENISA)
ICANN - Will There Really Be a New Russian Internet?
Torfox - The Great Firewall of China: Background
UN General Assembly- Developments in the Field of Information and Telecommunications in the Context of International Security
UN Office for Disarmament Affairs Cyberdiplomacy
Global Forum on Cyber Expertise (GFCE)
Cybill Tools & Publications
Cybil Projects
ENISA Considerations on the Traffic Light Protocol
LinkedIn Learning Security Courses
LinkedIn Learning Instructor Malcolm Shore
botnet
A network of compromised computers controllec as a group
Cyber Kill Chain
A concept that views an attack in seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and action
denial-of-service
An attack in which a remote attacker compromises IT systems by exploiting vulnerabilities
phishing
An attack that exploits a user through an email containing a malicious attachment or link to click on
rootkit
Malware that is in the core, or kernel, of the operating system
spear phishing
An attack that exploits a specific user through a custom-crafted email containing a malicious attachment or link to click on