📄️ Terminologies
Summary of cybersecurity terms
📄️ CIA Triad
Confidentiality, Integrity, and Availability
📄️ AAA of Security
Authentication, Authorization, and Accounting
📄️ Control Frameworks
COBIT, ISO 27001, NIST 800-53, etc.
📄️ Standards and Frameworks
GDPR, HIPAA,PCI DSS, etc.
📄️ Computer Crimes
Laws protecting against computer crimes
📄️ Intellectual Property Protection
Protecting the legal rights if creators and owners
📄️ Import/Export Contols (US)
GDPR, HIPAA,PCI DSS, etc.
📄️ The Code of Ethics
The ISC2 Code of Ethics
📄️ Agreement Types
The different agreement types you'll encounter when working in Cybersecurity
📄️ Security Policy Framework
Policies, procedures, and controls
📄️ Gap Analysis
Current performance versus desired performance
📄️ Zero Trust
No one should be trusted by default
📄️ Aligning Security with Business
Wearing two hats
📄️ Risk Management
Managing and Prioritizing Risks
📄️ Risk Management Process
Identify, assess, and prioritize risk
📄️ Risk Management Frameworks
CIS, ISO, NIST etc.
📄️ Security Controls
Physical, Technical, Administrative, etc.
📄️ Governance
Overall management of the organization's IT resources
📄️ Governance Elements
Policies, Standards, Procedures, and Guidelins
📄️ Compliance
Adherence to laws, regulations, standards, and policies
📄️ Vendor Assessment
Assessing vendors
📄️ Vendor Management
Assessing vendors
📄️ Third-Party Vendor Risks
Potential security from external entities
📄️ Security Policies
Common security policies
📄️ Security Awareness
Understanding of potential threats