-
FIND ALL YOUR CYBER SECURITY ANSWERS ON OUR WIKI PAGE
The Cert2Connect wiki for a clear overview of terminology and the many abbreviations in the cyber, cloud and software security landscape.
CLOUD SECURITY
-
Advanced Persistent Threat (APT)
Read moreAdvanced Persistent Threat (APT) is a term used to refer to advanced cyberattacks that aim to gain access to a specific target, such as a company, an organization or an individual, and remain active there for a long period of time. APT attacks are often aimed at stealing data or gaining access to sensitive systems, and are often carried out by professional hackers or state-sponsored groups.
-
Cloud Security Posture Management (CSPM)
Read moreCloud Security Posture Management (CSPM) refers to a set of tools, processes, and best practices used to assess, monitor, and improve the security health and compliance level of cloud infrastructures. CSPM's goal is to ensure that cloud resources are properly configured and secured according to best practices and policies to minimize potential security risks.
-
Compliance
Read moreCompliance is a term used to describe how well an organization complies with the laws and regulations that apply to it. Compliance means that an organization is aware of the risks it runs if it does not comply with the rules, and that it takes measures to limit or prevent those risks. Compliance helps an organization to protect its reputation, customer satisfaction and financial results.
-
DLP
Read moreDLP stands for "Data Loss Prevention". DLP refers to a set of technologies and processes used to prevent sensitive information from being accidentally or intentionally leaked, stolen or damaged. This may include personal data, financial information, trade secrets and intellectual property. By implementing DLP measures, organizations can protect their data and reduce the risks of security breaches.
-
General Data Protection Regulation (GDPR)
Read moreThe General Data Protection Regulation (GDPR) is an European privacy law that came into effect on May 25, 2018. The GDPR is designed to give individuals more control over their personal data and to regulate and harmonize the way organizations process and protect personal data.
-
Managed Security Service Provider (MSSP)
Read moreA Managed Security Service Provider (MSSP) is an external service provider that offers specialized security services to organizations. MSSPs provide comprehensive security solutions and services to help businesses monitor, detect, prevent, and respond to cyber threats and security incidents. This enables organizations to reduce the complexity of security management and access expertise and resources they may not have in-house.
-
NIST
Read moreThe National Institute of Standards and Technology (NIST) is a scientific institution under the United States federal government. NIST is committed to standardization in science, such as defining units.
NIST was founded in 1901 under the name National Bureau of Standards (NBS). In 1988, the institution received its current name
-
Web skimming
Read moreWeb skimming, also known as "Magecart attacks", refers to a form of cyber attack in which attackers inject malicious code into e-commerce websites to steal customer payment information. These attacks target online shopping carts and payment pages of websites to pass sensitive information, such as credit card information, to the attackers.
-
“Watering Hole” Attack
Read moreA "Watering Hole" attack is a form of cyber-attack in which the attacker distributes malicious code or malware on websites likely to be visited by the intended victims. This approach focuses on infecting legitimate websites that are popular with a certain target group, so that when the targeted victims visit these websites, they are unknowingly infected with the malicious code.