Sitemap

Topics

Application Security
Mobile Application Security, Patch Management, Secure Coding, Web Application Security

Big Data
Database Security, Information Management

Cloud Security
Virtualization Security

Compliance
Audit, Governance Risk, Legislation and Standards, PCI-DSS, Regulation, Security Policy

Cybercrime
Advanced Persistent Threats, Cyber-criminals and Convictions, Phishing, Threat Intelligence, Unified Threat Management

Dark Web
Is part of the internet that isn’t visible to search engines and requires the use of an anonymity tool.

Data Protection
Data Breaches, Data Loss Prevention, Information Risk Management, Secure Disposal

Digital Forensics
Data Breach Incident Management, Fraud Detection, IT Forensics, Security Information and Event Management (SIEM)

Encryption
Digital Signatures and Certificates, PKI, SSH, SSL

Google Hacking Database (GHDB)
Google Hacking Database, GHDB, Dorks, Sensitive Directories, Login Portals, SQL injection, Online Devices, Juicy Information

Identity Access Management
Authentication Tokens, Biometrics, Digital Rights Management, Single Sign On, Two-Factor Authentication, Virtual Authentication

Internet Security
DDoS, Email Security, IM Security, Social Media Security

Malware
Anti‐Spam, Anti‐Virus, Ransomware

Mobile Security
BYOD, Mobile Access Management, Mobile Device Management, Tablet Security, VOIP Security

Network Security
Access Rights Management, End Point Security, Firewalls, Intrusion Prevention/Detection, Network Access Control, Security Monitoring, Wireless Security

Privacy
Government Security, Suveillance

Risk Management
Risk and Vulnerability Assessment, Security Analytics, Vulnerability Management

Internet of Things
Network of devices such as vehicles, and home appliances that contain electronics, software, sensors, actuators, and connectivity which allows these things to connect, interact and exchange data.

Vulnerabilities
Software security flaw, Zero-Day, Exploits