Overview
A documented set of procedures for detecting, responding to, and recovering from cybersecurity incidents.
Cross-References(1)
More in Cybersecurity
ISO 27001
Security GovernanceAn international standard for information security management systems specifying requirements for establishing and maintaining security.
Encryption
Data ProtectionThe process of converting plaintext data into ciphertext using an algorithm, making it unreadable without the decryption key.
Zero-Day Vulnerability
Offensive SecurityA software security flaw unknown to the vendor that can be exploited before a patch is available.
Phishing-Resistant Authentication
Identity & AccessAuthentication methods such as FIDO2 passkeys and hardware security keys that are immune to phishing attacks because credentials are cryptographically bound to the legitimate service.
SOC 2
Security GovernanceAn auditing framework that evaluates the security, availability, processing integrity, confidentiality, and privacy of service organisations.
Cyber Resilience
Offensive SecurityAn organisation's ability to continuously deliver intended outcomes despite adverse cyber events, encompassing prevention, detection, response, and recovery capabilities.
End-to-End Encryption
Data ProtectionA communication system where only the communicating users can read the messages, with encryption at both endpoints.
Blue Team
Offensive SecurityA group of security professionals who defend against both real attackers and simulated attacks from red teams.