Index

A

Advanced persistent threat (APT)
Application security (AS)
capabilities
definition
goal and objectives
threat vectors
Asset management and supply chain (AMSC)
Audit
artifacts
assessment
controls, technologies, and manual processes
functional areas
risk mitigations
security capabilities
Audit First Methodology
audit controls
design controls
detective controls
forensic controls
preventive controls
threat analysis
deficiency
definition
remediation
tracking process
evidence collection
planning process
proving negatives
records generation
reporting and records retention
results
threat audit
threat-based objectives
validation
Audit report mapping

B

Binary value scales
Bring-your-own-devices (BYODs)

C

Chief Information Officer (CIO)
Chief Information Security Officer (CISO)
Confidentiality, ...

Get Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.