(3)Improvement (ID.IM): Improvements to organizational cybersecurity risk management pr...
(3)Improvement (ID.IM): Improvements to organizational cybersecurity risk management pr...
(2)Risk Assessment风险评估 (ID.RA): The cybersecurity risk to the organization, assets, and...
IDENTIFY识别 (ID): The organization’s current cybersecurity risks are understood了解组织当前的网络...
(6)Cybersecurity Supply Chain Risk Management网络安全供应链风险管理(GV.SC): Cyber supply chain ris...
(5)Oversight监督(GV.OV): Results of organization-wide cybersecurity risk management activ...
(4)Policy策略(GV.PO): Organizational cybersecurity policy is established, communicated, a...
Oauth:Open AuthorizationOpenID:直观得没法解释OIDC:OpenID ConnectSAML:Security Assertion Markup...
(3)Roles, Responsibilities, and Authorities角色、职责和授权(GV.RR): Cybersecurity roles, respon...
(2)Risk Management Strategy风险管理战略 (GV.RM): The organization’s priorities, constraints, ...
CBK和OSG的文字中不太区分标记(mark)、标签(label)和标签(tag),甚至经常交替、混合使用这几个词,但据各方情报←_←,考试中的确有涉及区分的情况。 NIST...
GOVERN治理 (GV): The organization’s cybersecurity risk management strategy, expectations,...
NIST Cybersecurity Framework (CSF) 2.0于2024年2月正式发布。 CSF 2.0由以下组成部分组成: CSF Core: 提供了一套组织...
范围(scoping)和裁剪(tailoring)两个术语关联场景相似,再加上经翻译后的语义误差,挺容易弄混的。有标准就以标准定义为准咯,以下是从NIST SP 800-53...
继续讨论第七类威胁:Non-compliance 不合规,Nc.4。 Non-compliance 不合规 见前文。 Nc.4 Non-compliance with pri...
继续讨论第七类威胁:Non-compliance 不合规,Nc.3。 Non-compliance 不合规 见前文。 Nc.3 Insufficient cybersecur...
继续讨论第七类威胁:Non-compliance 不合规,Nc.2。 Non-compliance 不合规 见前文。 Nc.2 Improper personal data ...
继续讨论第七类威胁:Non-compliance 不合规,Nc.1-Nc.1.2。 Non-compliance 不合规 见前文。 Nc.1 Regulatory non-c...
开始讨论第七类威胁:Non-compliance 不合规,Nc.1-Nc.1.1。 Non-compliance 不合规 Non-compliance threats ari...
继续讨论第六类威胁:Unawareness&Unintervenability 不知情和不可干预性,U.2-U.2.3。 U.2 Lack of data subject c...
继续讨论第六类威胁:Unawareness&Unintervenability 不知情和不可干预性,U.2-U.2.2。 U.2 Lack of data subject c...