Cyber defense


• UNE-ISO 28000: especificación para sistemas de gestión de seguridad de la cadena deb bsuministrosb Report. - 2008.GUÍA DECIBERDEFENSA



Download 2.54 Mb.
View original pdf
Page81/85
Date09.12.2022
Size2.54 Mb.
#60094
1   ...   77   78   79   80   81   82   83   84   85
Cyber Defense Handbook
• UNE-ISO 28000: especificación para sistemas de gestión de seguridad de la cadena deb bsuministrosb Report. - 2008.
GUÍA DE
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
96


GUÍA DE
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
97
1
NATO Bi-SC Initial Assessment of Recognising Cyberspace as a Domain


GUÍA DE
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
98
2
MAGERIT is the risk analysis and management methodology developed by the Spanish Higher Council for Electronic Administration (Consejo Superior de Administración Electrónica de España).
3
PILAR is the risk analysis tool developed by the CCN-CERT that facilitates the application of the
MAGERIT methodology.
4
CRAMM, risk analysis methodology developed by the British CCTA (Central Computer and Telecommunication Agency).
5
OCTAVE (Operationally Critical Threat Asset and Vulnerability Evaluation, risk analysis methodology developed by the Carnegie Mellon University CERT.
6
Zero-day cyber attack is a type of cyber attack that occurs by exploiting an unknown vulnerability or for which there is still no patch.
7
EXPLOIT is piece of software code, a data chunk, or a script that exploits a bug or cyber vulnerability to cause an impact.
8
PHISHING is a type of cyber attack aimed at deceiving a victim (simulating trustworthy sources for the victim, usually by email) in order to obtain confidential or private information (user, passwords, bank details, credit card details, etc.).
9
SPEAR PHISHING is a type of cyber attack aimed at deceiving a group of specifically selected people pretending to be a trustworthy entity for the victims) in order to obtain confidential information usernames, passwords, bank details, credit card details, etc) useful for carrying out a cyber operation.

Download 2.54 Mb.

Share with your friends:
1   ...   77   78   79   80   81   82   83   84   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page