-
FIND ALL YOUR CYBER SECURITY ANSWERS ON OUR WIKI PAGE
The Cert2Connect wiki for a clear overview of terminology and the many abbreviations in the cyber, cloud and software security landscape.
Kela
-
Attack Surface Management
Read more"Attack Surface Management" refers to the process of identifying, evaluating and mitigating the potential vulnerabilities and exposed entry points that an attacker can use to compromise a system, application or network.
In other words, attack surface management involves mapping out all the possible ways an attacker could try to gain access to an organization's systems and data. This can range from unused services and open ports on network devices to security weaknesses in applications and outdated software.
-
BEC or CEO fraud
Read moreBEC or CEO fraud is a form of cybercrime in which fraudulent emails are sent to employees of a company, where the sender poses as the CEO or other senior executive of the company. These emails often contain a request to transfer money to a specific bank account or to provide confidential information. This type of fraud can lead to financial losses for the company and the leakage of confidential information. To protect against BEC or CEO fraud, it is important to train employees to be critical of suspicious emails and to verify that a request for money transfer or information is actually from the manager from the company.
-
BlueTeam
Read moreA group of individuals who conduct information systems analysis to ensure security, identify security flaws, verify the effectiveness of each security measure, and ensure that all security measures remain effective once implemented. The Blue Team is also seen as the defending team.
-
Cloud Security Posture Management (CSPM)
Read moreCloud Security Posture Management (CSPM) refers to a set of tools, processes, and best practices used to assess, monitor, and improve the security health and compliance level of cloud infrastructures. CSPM's goal is to ensure that cloud resources are properly configured and secured according to best practices and policies to minimize potential security risks.
-
Computer Emergency Response Team (CERT)
Read moreA Computer Emergency Response Team (CERT) is an organization or group responsible for responding to and coordinating cybersecurity incidents, providing security advice, and helping systems recover from a cyberattack. They work with government agencies, businesses and other organizations to ensure a rapid and effective response to cyber threats and incidents.
-
Continuous Security Validation (CSV)
Read more"Continuous Security Validation" (CSV) refers to an approach in which a system's or organization's security measures and controls are continuously tested and evaluated to ensure consistent and effective protection.
Continuous security validation uses automated tools and techniques to regularly monitor and assess the security status of systems, networks, and applications. This includes simulating attacks, testing security measures and identifying potential weaknesses. By validating continuously, organizations can quickly respond to new threats, vulnerabilities and changes in IT infrastructure to ensure that security is maintained at all times.
-
DLP
Read moreDLP stands for "Data Loss Prevention". DLP refers to a set of technologies and processes used to prevent sensitive information from being accidentally or intentionally leaked, stolen or damaged. This may include personal data, financial information, trade secrets and intellectual property. By implementing DLP measures, organizations can protect their data and reduce the risks of security breaches.
-
General Data Protection Regulation (GDPR)
Read moreThe General Data Protection Regulation (GDPR) is an European privacy law that came into effect on May 25, 2018. The GDPR is designed to give individuals more control over their personal data and to regulate and harmonize the way organizations process and protect personal data.
-
OSINT
Read moreOSINT stands for Open-Source Intelligence and is a method of collecting information from publicly accessible sources, such as social media, news articles, online forums and databases. This can be used for various purposes such as research, journalism, business strategies and security analysis. OSINT is an important part of modern information and security methods and is increasingly used by governments, companies and individuals.
-
PII
Read morePII stands for "Personally Identifiable Information" and can be translated as "Personally Identifiable Data".
-
Risk Mitigation
Read moreRisk mitigation refers to the actions, strategies and measures taken to reduce or minimize the impact and likelihood of potential risks. The aim of risk mitigation is to reduce the negative consequences of risks and limit the likelihood of loss, damage or disruption of activities.
-
Security Posture Management
Read more"Security Posture Management" refers to the process of assessing, analyzing and managing an organization's overall security posture and controls. This includes identifying vulnerabilities, evaluating security controls and policies, and taking steps to improve and maintain overall security. The goal of security posture management is to increase an organization's resilience to cyberthreats and maintain a strong security posture.