Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 11 Current »

In no particular order, except maybe the order of interest I have in them

CISSP 8 Domains

  1. Security and Risk Management

  2. Asset Security

  3. Security Architecture and Engineering

  4. Communications and Network Security

  5. Identity and Access Management

  6. Security Assessment and Testing

  7. Security Operations

  8. Software Development Security

Words

  • Cybercrime

    • [C]rimes directed at computing or other ICT, such as unauthorised access to, modification or impairment of electronic communication or data. This does not include technology-enabled crimes where computers or ICT are an integral part of an offence, such as online fraud, identity theft and the distribution of child exploitation material. (Source),

  • Cyberattack

  • Advanced Persistent Threat

  • Threat Vector / Threat Actors

  • Blue Team

  • Red Team

  • Purple Team

  • Threat Actors / Malicious Actors / State Sponsored Actors

  • Data Sovereignty

  • Business Email Compromise (BEC)

  • Driftnetting

  • Phishing

  • No labels