Artwork

Indhold leveret af CISO Tradecraft®. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af CISO Tradecraft® eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !

#166 - Cyber Acronyms You Should Know

38:49
 
Del
 

Manage episode 398169692 series 2849492
Indhold leveret af CISO Tradecraft®. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af CISO Tradecraft® eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.

This video introduces a newly proposed acronym in the world of cybersecurity known as the 'Cyber UPDATE'. The acronym breaks down into Unchanging, Perimeterizing, Distributing, Authenticating and Authorizing, Tracing, and Ephemeralizing. The video aims to explain each component of the acronym and its significance in enhancing cybersecurity.

References:

  1. https://www.watchguard.com/wgrd-news/blog/decrypting-cybersecurity-acronyms-0
  2. https://computerhistory.org/profile/john-mccarthy/
  3. https://owasp.org/www-community/Threat_Modeling_Process#stride
  4. https://attack.mitre.org/att&ck
  5. https://d3fend.mitre.org/
  6. https://fourcore.io/blogs/mitre-attack-mitre-defend-detection-engineering-threat-hunting
  7. https://cars.mclaren.com/us-en/legacy/mclaren-p1-gtr
  8. https://csrc.nist.gov/glossary/term/confidentiality
  9. https://csrc.nist.gov/glossary/term/integrity
  10. https://csrc.nist.gov/glossary/term/availability
  11. https://www.microsoft.com/licensing/docs/view/Service-Level-Agreements-SLA-for-Online-Services
  12. https://www.nytimes.com/2006/06/30/washington/va-laptop-is-recovered-its-data-intact.html
  13. https://cloudscaling.com/blog/cloud-computing/the-history-of-pets-vs-cattle/
  14. https://apps.dtic.mil/sti/tr/pdf/ADA221814.pdf

Transcripts https://docs.google.com/document/d/16upm5bKTsIkDo3s-mvUMlgkX1uqUKnUH

Chapters

  • 00:00 Introduction
  • 01:34 Cybersecurity Acronyms: Pre-1990s
  • 02:26 STRIDE and DREAD Models
  • 02:39 PICERL and MITRE Models
  • 05:04 Defining Cybersecurity
  • 07:52 CIA Triad and Its Importance
  • 09:00 Confidentiality, Integrity, and Availability
  • 11:52 The Parkerian Hexad
  • 17:30 D.I.E. Triad Concept
  • 24:28 Cybersecurity UPDATE
  • 24:51 Unchanging
  • 25:46 Perimeterizing
  • 29:36 Distributing
  • 29:50 Authenticating
  • 33:58 Tracing
  • 36:07 Ephemeralizing
  continue reading

205 episoder

Artwork
iconDel
 
Manage episode 398169692 series 2849492
Indhold leveret af CISO Tradecraft®. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af CISO Tradecraft® eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.

This video introduces a newly proposed acronym in the world of cybersecurity known as the 'Cyber UPDATE'. The acronym breaks down into Unchanging, Perimeterizing, Distributing, Authenticating and Authorizing, Tracing, and Ephemeralizing. The video aims to explain each component of the acronym and its significance in enhancing cybersecurity.

References:

  1. https://www.watchguard.com/wgrd-news/blog/decrypting-cybersecurity-acronyms-0
  2. https://computerhistory.org/profile/john-mccarthy/
  3. https://owasp.org/www-community/Threat_Modeling_Process#stride
  4. https://attack.mitre.org/att&ck
  5. https://d3fend.mitre.org/
  6. https://fourcore.io/blogs/mitre-attack-mitre-defend-detection-engineering-threat-hunting
  7. https://cars.mclaren.com/us-en/legacy/mclaren-p1-gtr
  8. https://csrc.nist.gov/glossary/term/confidentiality
  9. https://csrc.nist.gov/glossary/term/integrity
  10. https://csrc.nist.gov/glossary/term/availability
  11. https://www.microsoft.com/licensing/docs/view/Service-Level-Agreements-SLA-for-Online-Services
  12. https://www.nytimes.com/2006/06/30/washington/va-laptop-is-recovered-its-data-intact.html
  13. https://cloudscaling.com/blog/cloud-computing/the-history-of-pets-vs-cattle/
  14. https://apps.dtic.mil/sti/tr/pdf/ADA221814.pdf

Transcripts https://docs.google.com/document/d/16upm5bKTsIkDo3s-mvUMlgkX1uqUKnUH

Chapters

  • 00:00 Introduction
  • 01:34 Cybersecurity Acronyms: Pre-1990s
  • 02:26 STRIDE and DREAD Models
  • 02:39 PICERL and MITRE Models
  • 05:04 Defining Cybersecurity
  • 07:52 CIA Triad and Its Importance
  • 09:00 Confidentiality, Integrity, and Availability
  • 11:52 The Parkerian Hexad
  • 17:30 D.I.E. Triad Concept
  • 24:28 Cybersecurity UPDATE
  • 24:51 Unchanging
  • 25:46 Perimeterizing
  • 29:36 Distributing
  • 29:50 Authenticating
  • 33:58 Tracing
  • 36:07 Ephemeralizing
  continue reading

205 episoder

Alle episoder

×
 
Loading …

Velkommen til Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Hurtig referencevejledning