About 948 results
Open links in new tab
  1. Newly identified vulnerabilities are mitigated or documented as accepted risks.

  2. Internet Service Providers, owners of attacking systems, victims, other CSIRTs, and vendors). RC.CO-01: Public relations are managed RC.CO-02: Reputation is repaired after an incident RC.CO-03: …

  3. Burp Proxy is an interactive HTTP/S proxy server for attacking and testing web applications. It operates as a man-in-the-middle between the end browser and the target web server, and allows the user to …

  4. [XLS]

    OWASP

    Verify application deployments are adequately sandboxed, containerized or isolated to delay and deter attackers from attacking other applications. Verify that the application build and deployment …

  5. The CSAN differentiates 3 motives: attacking confidentiality for financial gain, improve their competitive position or to use (personal) data collected without consent.

  6. Deter: the control reduces the threat, deterring hackers from attacking a given system for example. Avoid: the control involves avoiding risky situations, perhaps ensuring that a known vulnerability is …

  7. Develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities. The organization’s current cybersecurity risks are understood. ID.AM.

  8. [XLS]

    ENISA

    Access to device software Alternation of software unauthorized modifications to code or data, attacking its integrity Rogue hardware Manipulation of information Threat of intentional data manipulation to …

  9. Restoration activities are coordinated with internal and external parties (e.g., coordinating centers, Internet Service Providers, owners of attacking systems, victims, other CSIRTs, and vendors).

  10. A thorough understanding of the actual security controls in place for a covered entity will reduce the list of vulnerabilities, as well as the realistic probability, of a threat attacking (intentionally or …