MITRE Attack Framework
MITRE Attack Framework is a knowledge base of tactics, using real-world observations, designed to help classify specific attacks, objectives and assess an organization's risk.
MITRE Attack Framework is a knowledge base of tactics, using real-world observations, designed to help classify specific attacks, objectives and assess an organization's risk.
Multi Factor Authentication (MFA) is a security method that requires a user to provide two or more verification factors to login. This method is used to protect user data, such as PII and financial assets, from being accessed by unauthorized parties who may have gained access to login details and passwords associated with an [...]
A network perimeter is a boundary between the secured private and locally managed side of a network, and the public facing external side of a network.
The New York Privacy Act (NYPA) is a proposed law by New York which seeks to address how online platform/social media firms process personal data.
On Device defines application functionality that operates entirely on the CPU of the device operating system it is installed on. This contrasts with applications that use remote servers (cloud infrastructure) to perform data processing.
A patch is a set of software changes that fixes a bug or security vulnerability in a software already currently in use by the organization.
Penetration testing, also known as a pen test or ethical hacking, is an authorized simulated cyberattack used to identify, test and highlight vulnerabilities in an organization's security posture.
Personally identifiable information (PII) is any data that when used alone, or with other relevant data, could identify a specific individual. Examples include (but are not limited to): name, address, contact number, email address, driver's license number, SSN, D.O.B, passport number, fingerprint.
Phishing is defined as a form of social engineering in which a cyber threat actor poses as a trustworthy colleague or acquaintance of an organization to lure a victim into providing sensitive information or network access.
Profiling refers to the practice of creating detailed and data-driven representations (or profiles) of typical system behavior, user actions, network traffic, or threat actor characteristics to identify anomalies or detect potential security risks. In essence, profiling is the process of analyzing patterns and behaviors within a system to create baselines of what is considered [...]