Cybersecurity

Cybersecurity #

Certifications #

Vulnerability Case Studies #

Info Graphs #

img1 img2 img3

Goodies #

Abbreviations #

  • VLAN - Virtual LAN
  • CSA - Cloud Security Alliance
  • CCM - Cloud Controls Matrix
  • SDN - Software defined networking
  • SDV - Software defined visibility
  • VPC - Virtual Private Cloud
  • HSM - Hardware Security Modules
  • CASB - Cloud Access Security Broker
  • MSP - Managed Service Provider
  • MSSP - Managed Security Service Provider
  • FDE - Full-disk encryption
  • TDE - Transparent Data Encryption
  • CLE - Column-Level Encryption
  • NIST - National Institute of Standards and Technology
  • AES - Advanced Encryption Standard
  • DES - Data Encryption Standard
  • ECC - Elliptic Curve Cryptography
  • PKI - Public Key Infrastructure
  • CN - Common Name
  • SANS - Subject Alternative Names
  • CSR - Certificate Signing Request
  • DV - Domain Validation
  • EX - Extended Validation
  • CRL - Certificate Revocation List
  • OCSP - Online Certificate Status Protocol
  • CPS - Certificate Practice Statement
  • DER - Distinguished Encoding Rules
  • PEM - Privacy Enhanced Mail
  • PFX - Personal Information Exchange
  • HMAC - Hash-Based Message Authentication Code
  • SHS - Secure Hash Standard
  • SHA - Secure Hashing Algorithm
  • SCAP - Security Content Automation Protocol
  • CGE - Common Configuration Enumeration
  • CGE - Common Platform Enumeration
  • CVE - Common Vulnerabilities and Exposures
  • CVSS - Common Vulnerability Scoring System
  • XCCDF - Common Configuration Checklist Description Format
  • OVAL - Open Vulnerability and Assessment Language
  • SIEM - Security Information and Event Management
  • IDS - Intrusion detection systems
  • IPS - Intrusion prevention systems
  • APT - advanced persistent threat
  • STIX - Structured Threat Information eXpression
  • TAXII - Trusted Automated eXchange of Intelligence Information
  • ISACs - Information Sharing and Analysis Centers
  • RAID - Redundant Array of Independent Disks
  • RTO - Recovery Time Objective
  • UAV - Unmanned Aerial Vehicles
  • CCTV - Closed-Circuit TV
  • RFID - Radio Frequency Identification
  • UEFI - Unified Extensible Firmware Interface
  • OEM - Original Equipment Manufacturer
  • PCRs - Platform Configuration Registers
  • TPM - Trusted Platform Module
  • PUFs - Physically Unclonable Functions
  • KMS - Key Management Services
  • EDR - Endpoint Detection and Response
  • DLP - Data Loss Prevention
  • HIPS - Host-Based Intrusion Prevention System
  • SD-WAN - Software-Defined Wide Area Network
  • MPLS - Multiprotocol Label Switching
  • SASE - Secure Access Service Edge
  • DMZ - Demilitarized Zone
  • NAC - Network Access Control
  • BPDU - Bridge Protocol Data Unit
  • STP - Spanning Tree Protocol
  • DHCP - Dynamic Host Configuration Protocol
  • VPN - Virtual Private Network
  • IPSec - Internet Protocol Security
  • AH - Authentication Header
  • ESP - Encapsulating Security Payload
  • SA - Security Associations
  • SSL - Secure Socket Layer
  • TLS - Transport Layer Security
  • SNMP - Simple Network Management Protocol
  • DKIM - DomainKeys Identified Mail
  • SPF - Sender Policy Framework
  • DMARC - Domain Based Message Authentication Reporting and Conformance
  • S/MIME - Secure Multipurpose Internet Mail Extension
  • SRTP - Secure Real Time Transport Protocol
  • SRTCP - Secure Real Time Control Protocol
  • HSTS - HTTP Strict Transport Security
  • QoS - Quality Of Service
  • DDoS - Distributed Denial-of-Service
  • NGFW - Next-Generation Firewalls
  • UTM - Unified Threat Management
  • ACLs - Access Control Lists
  • SSID - Service Set Identifiers
  • WPA - Wi‑Fi Protected Access
  • CCMP - Counter Mode Cipher Block Chaining Message Authentication Code Protocol
  • SAE - Simultaneous Authentication of Equals
  • OWE - Opportunistic Wireless Encryption
  • WLAN - Wireless Local Area Network
  • EAP - Extensible Authentication Protocol
  • PEAP - Protected EAP
  • EAP-FAST - EAP-Flexible Authentication Via Secure Tunneling
  • EAP-TLS - EAP-Transport Layer Security
  • EAP-TTLS - EAP-Tunneled Transport Layer Security
  • TKIP - Temporal Key Integrity Protocol
  • BYOD - Bring-Your-Own-Device
  • CYOD - Choose-Your-Own-Device
  • COPE - Corporate-Owned, Personally-Enabled
  • COBO - Corporate-Owned; Business Only
  • VDI - Virtual Desktop Infrastructure
  • UEM - Unified Endpoint Management
  • MDM - Mobile Device Management
  • MAM - Mobile Application Management
  • MCM - Mobile Content Management
  • GPS - Global Positioning System
  • NFC - Near Field Communication
  • PII - Personal Identifiable Information
  • PHI - Protected Health Information
  • DPO - Data Protection Officer