{tableName=glossary, name=NIST SP 800-53 Minimum/Base Controls, description=
NIST SP 800-53 Minimum/Base Controls are a set of security controls established by the National Institute of Standards and Technology (NIST) to help organizations protect their information systems. These controls are designed to protect systems from unauthorized access, misuse, modification, and destruction of information. The controls are grouped into three categories: Basic, Derived, and Hybrid. Basic controls are the most basic and foundational controls that should be implemented in any system, while Derived and Hybrid controls are more advanced and tailored to the specific system. The controls cover areas such as access control, authentication, encryption, logging and monitoring, system and communications protection, and incident response. NIST SP 800-53 Minimum/Base Controls are essential for organizations to ensure the security and privacy of their information systems., topic=[{id=97620570515, createdAt=1673040885373, updatedAt=1715624498921, path='nist-sp-800-53', name='
NIST SP 800-53 Security Guide: Protect Your Data', 1='{type=string, value=NIST SP 800-53}', 2='{type=string, value=
This guide provides a comprehensive overview of NIST SP 800-53, a security and privacy control framework for federal information systems and organizations. Learn how to protect your data and comply with NIST}', 5='{type=string, value=This authoritative guide is based on the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53, which provides guidance for federal agencies on selecting, implementing, and managing information security controls. The guide covers a wide range of topics, including risk assessment, security control selection, security control implementation, and security control monitoring. It also provides detailed information on the security controls that should be implemented in the organization, as well as guidance on how to assess and monitor the effectiveness of those controls. Additionally, the guide provides detailed information on the Federal Information Security Management Act (FISMA) and its requirements for information security. The guide is intended to help organizations ensure that their information systems are secure and compliant with applicable laws and regulations.}', 15='{type=list, value=[{id=97620570515, name='NIST SP 800-53'}]}'}], hs_path=nist-sp-800-53-minimum-base-controls}--
{tableName=glossary, name=Cloud Infrastructure, description=
Cloud Infrastructure is a type of computing infrastructure that provides shared computer processing resources and data to computers and other devices on demand over the internet. It is typically composed of a combination of hardware and software components, such as servers, storage, networks, and applications. Cloud Infrastructure allows users to access their data and applications from any device, anywhere in the world, with minimal setup and maintenance. It is designed to be highly scalable and cost-effective, allowing businesses to quickly and easily expand their computing resources as needed. Cloud Infrastructure also provides enhanced security, reliability, and performance, making it a popular choice for businesses of all sizes., topic=null, hs_path=cloud-infrastructure}--
{tableName=glossary, name=Global Regulatory Management, description=
Global Regulatory Management is the process of managing and coordinating the various regulations, policies, and procedures that govern the business activities of an organization on a global scale. It involves the monitoring and assessment of the compliance of an organization’s activities with the applicable laws and regulations, both domestic and international. It also includes the management of the organization’s relationship with its regulatory bodies, such as the FDA and EPA, and other government agencies, as well as the development of strategies for responding to changes in the regulatory environment. Global Regulatory Management is an important part of any organization’s risk management strategy and is essential for the successful operation of a global business., topic=null, hs_path=global-regulatory-management}--
{tableName=glossary, name=Network Access Control, description=
Network Access Control (NAC) is a security system that helps organizations control who is allowed to access their networks. It is designed to protect networks from unauthorized access, malicious attacks, and other security threats. NAC typically works by authenticating users, devices, and other entities that attempt to access the network. It can also be used to monitor network traffic and enforce security policies. NAC can be implemented in a variety of ways, including through hardware, software, or a combination of both. It can also be used to segment networks into different levels of access, ensuring that only authorized users and devices can access sensitive data or resources. NAC can also be used to monitor user activity and detect malicious behavior. By implementing NAC, organizations can ensure that only authorized users and devices can access their networks and resources, helping to protect their data and systems from malicious attacks and other security threats., topic=null, hs_path=network-access-control}--
{tableName=glossary, name=Hybrid Data Center, description=
A hybrid data center is a combination of a physical and virtual data center that uses both on-premises and cloud-based computing resources. It combines the best of both worlds, offering the benefits of physical data centers such as control, security, and low latency, while leveraging the scalability and flexibility of cloud computing. Hybrid data centers are designed to support a wide range of applications and workloads, including enterprise applications, big data, analytics, high-performance computing, and artificial intelligence. They offer the ability to deploy and manage applications and services across multiple locations, while providing the ability to scale up or down quickly in response to changing business needs. Hybrid data centers also offer the ability to optimize costs by utilizing a mix of on-premises and cloud-based resources., topic=null, hs_path=hybrid-data-center}--
{tableName=glossary, name=Email Security, description=
Email security is the practice of protecting email messages and accounts from unauthorized access, malicious software, and harmful content. It involves a variety of measures to prevent the interception, alteration, or misuse of email messages. These measures include encryption, authentication, digital signatures, and secure email gateways. Encryption scrambles email messages so that only the intended recipient can read them. Authentication verifies the identity of the sender and recipient of an email message. Digital signatures are used to authenticate the sender of an email and verify that the message has not been altered in transit. Secure email gateways filter out malicious content and protect the email server from malicious attacks. Additionally, email security practices involve the use of strong passwords and two-factor authentication to protect email accounts from unauthorized access., topic=[{id=97620570528, createdAt=1673040885452, updatedAt=1715624222504, path='cybersecurity-risk-management', name='
Cybersecurity Risk Management: A Guide for Businesses', 1='{type=string, value=Cybersecurity Risk Management}', 2='{type=string, value=
This guide provides essential information on cyber security risk management, including how to identify, assess, and mitigate risks to your organization's data and systems. Learn how to create a cyber security strategy that}', 5='{type=string, value=This Cybersecurity Risk Management Guide is designed to provide an authoritative overview of the key concepts and processes associated with effective cybersecurity risk management. It provides an introduction to the principles of risk management and the key steps involved in developing a successful risk management plan. It outlines the importance of understanding the threats and vulnerabilities that exist in the digital environment, as well as the steps that can be taken to mitigate these risks. It also discusses the need to develop a culture of security within an organization and the role of leadership in setting the tone for a secure environment. Finally, the guide provides guidance on the selection and implementation of security technologies, as well as the monitoring and review of risk management processes. This guide is an essential resource for anyone looking to understand and manage risks associated with cyber threats.}', 15='{type=list, value=[{id=97620570528, name='Cybersecurity Risk Management'}]}'}], hs_path=email-security}--
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77