Table of Contents |
---|
In no particular order, except maybe the order of interest I have in them
...
Security and Risk Management
Asset Security
Security Architecture and Engineering
Communications and Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
Software Development Security
Words
Cybercrime
[C]rimes directed at computing or other ICT, such as unauthorised access to, modification or impairment of electronic communication or data. This does not include technology-enabled crimes where computers or ICT are an integral part of an offence, such as online fraud, identity theft and the distribution of child exploitation material. (Source),
Cyberattack
Advanced Persistent Threat
Threat vector
Blue Team
Red Team
Purple Team
Threat Actors / Malicious Actors / State Sponsored Actors
Data Sovereignty
Business Email Compromise (BEC)