1243:
345:
security standard is NERC 1300, which is a modification/update of NERC 1200. The newest version of NERC 1300 is called CIP-002-3 through CIP-009-3 (CIP=Critical
Infrastructure Protection). These standards are used to secure bulk electric systems although NERC has created standards within other areas. The bulk electric system standards also provide network security administration while still supporting best-practice industry processes.
932:
132:
framework for certification. ISO/IEC 27002 is a high-level guide to cybersecurity. It is most beneficial as explanatory guidance for the management of an organisation to obtain certification to the ISO/IEC 27001 standard. The certification once obtained lasts three years. Depending on the auditing organisation, no or some intermediate audits may be carried out during the three years.
37:) are techniques generally outlined in published materials that attempt to protect the cyber environment of a user or organization. This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks.
504:) methodology. They contain recommendations on methods, processes and procedures as well as approaches and measures for various aspects of information security. Users from public authorities and companies as well as manufacturers or service providers can use the BSI standards to make their business processes and data more secure.
561:
sensitive (personal) data as well as other assets such as command and control data. It also requires that security vulnerabilities in the software have been eliminated, security principles such as defence-in-depth have been followed, and the security of the software has been verified through penetration testing.
135:
ISO/IEC 27001 (ISMS) replaces BS 7799 part 2, but since it is backwards compatible any organization working toward BS 7799 part 2 can easily transition to the ISO/IEC 27001 certification process. There is also a transitional audit available to make it easier once an organization is BS 7799
55:
standards have existed over several decades as users and providers have collaborated in many domestic and international forums to effect the necessary capabilities, policies, and practices – generally emerging from work at the
Stanford Consortium for Research on Information Security and Policy in the
544:
The
Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit cards from the major card schemes. The PCI Standard is mandated by the card brands but administered by the Payment Card Industry Security Standards Council. The
379:
Special publication 800-12 provides a broad overview of computer security and control areas. It also emphasizes the importance of security controls and ways to implement them. Initially, this document was aimed at the federal government although most practices in this document can be applied to the
383:
Special publication 800-14 describes common security principles that are used. It provides a high-level description of what should be incorporated within a computer security policy. It describes what can be done to improve existing security as well as how to develop a new security practice. Eight
560:
UL 2900 requires that manufacturers have described and documented the attack surface of the technologies used in their products. It requires threat modeling based on the intended use and deployment environment. The standard requires the implementation of effective security measures that protect
344:
An initial attempt to create information security standards for the electrical power industry was created by NERC in 2003 and was known as NERC CSS (Cyber
Security Standards). Subsequent to the CSS guidelines, NERC evolved and enhanced those requirements. The most widely recognized modern NERC
131:
is therefore referred to as ISO 17799 or BS 7799 part 1 and, sometimes it refers to part 1 and part 7. BS 7799 part 1 provides an outline or good practice guide for cybersecurity management; whereas BS 7799 part 2 and ISO/IEC 27001 are normative and therefore provide a
401:
Special
Publication 800-82, Revision 2, "Guide to Industrial Control System (ICS) Security", revised May 2015, describes how to secure multiple types of Industrial Control Systems against cyber-attacks while considering the performance, reliability and safety requirements specific to ICS.
272:
devices. It contains technical controls and organizational policies for developers and manufacturers of
Internet-connected consumer devices. The standard was released in June 2020 and is intended to be complemented by other, more specific standards. As many consumer IoT devices handle
393:
Special publication 800-53 rev4, "Security and
Privacy Controls for Federal Information Systems and Organizations", Published April 2013 updated to include updates as of January 15, 2014, specifically addresses the 194 security controls that are applied to a system to make it "more
71:
raise complex jurisdictional questions that remain, to some extent, unanswered. Tensions between domestic law enforcement efforts to conduct cross-border cyber-exfiltration operations and international jurisdiction are likely to continue to provide improved cybersecurity norms.
475:
has developed prioritised mitigation strategies, in the form of the
Strategies to Mitigate Cyber Security Incidents, to help organisations protect themselves against various cyber threats. The most effective of these mitigation strategies are called the Essential Eight.
397:
Special publication 800-63-3, "Digital
Identity Guidelines", Published June 2017 updated to include updates as of December 1, 2017, provides guidelines for implementing digital identity services, including identity proofing, registration, and authentication of users.
144:(ISMS). It states the information security systems required to implement ISO/IEC 27002 control objectives. Without ISO/IEC 27001, ISO/IEC 27002 control objectives are ineffective. ISO/IEC 27002 controls objectives are incorporated into ISO 27001 in Annex A.
186:(IACS). The documents in this series are developed though a collaborative relationship between the ISA99 committee and IEC TC65 WG10, applying the IEC standards creation process where all national committees involved agree upon a common standard.
992:
Guttman, M., Swanson, M., National
Institute of Standards and Technology; Technology Administration; U.S. Department of Commerce., Generally Accepted Principles and Practices for Securing Information Technology Systems (800–14). (September
557:. The standards include general cybersecurity requirements (UL 2900-1) as well as specific requirements for medical products (UL 2900-2-1), industrial systems (UL 2900-2-2), and security and life safety signalling systems (UL 2900-2-3).
463:. It encourages organizations to adopt good practice in information security. Cyber Essentials also includes an assurance framework and a simple set of security controls to protect information from threats coming from the internet.
515:
BSI Standard 200-1 defines general requirements for an information security management system (ISMS). It is compatible with ISO 27001 and considers recommendations of other ISO standards such as ISO 27002.
147:
ISO/IEC 21827 (SSE-CMM – ISO/IEC 21827) is an International Standard based on the Systems Security Engineering Capability Maturity Model (SSE-CMM) that can measure the maturity of ISO controls objectives.
1021:
Stouffer, K.; Pillitteri, V.; Lightman, S.; Abrams, M.; Hahn, A.; National Institute of Standards and Technology; U.S. Department of Commerce., Guide to Industrial Control Systems (ICS) Security (800–82).
67:(IT) computer security, but many note that it requires significant investment. Cross-border, cyber-exfiltration operations by law enforcement agencies to counter international criminal activities on the
518:
BSI Standard 200-2 forms the basis of BSI's methodology for establishing a sound information security management system (ISMS). It establishes three procedures for implementing IT baseline protection.
387:
Special publication 800-26 provides advice on how to manage IT security. Superseded by NIST SP 800-53 rev3. This document emphasizes the importance of self-assessments as well as risk assessments.
44:. These published materials consist of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies.
215:
The third category includes work products that describe system design guidelines and requirements for the secure integration of control systems. Core in this is the zone and conduit, design model.
1007:
Swanson, M., National Institute of Standards and Technology; Technology Administration; U.S. Department of Commerce., Security Self-Assessment Guide for Information Technology Systems (800–26).
364:(NIST CSF) "provides a high level taxonomy of cybersecurity outcomes and a methodology to assess and manage those outcomes." It is intended to help private sector organizations that provide
1000:
National Institute of Standards and Technology; Technology Administration; U.S. Department of Commerce., An Introduction to Computer Security: The NIST Handbook, Special Publication 800-12.
875:
1095:
680:
354:
1081:
390:
Special publication 800-37, updated in 2010 provides a new risk approach: "Guide for Applying the Risk Management Framework to Federal Information Systems"
212:
The second category of work products targets the Asset Owner. These address various aspects of creating and maintaining an effective IACS security program.
328:
Conformance assessment of these baseline requirements is via the standard TS 103 701, which allows self-certification, or certification by another group.
1014:
Grassi, P.; Garcia, M.; Fenton, J.;National Institute of Standards and Technology; U.S. Department of Commerce., Digital Identity Guidelines (800-63-3).
829:
812:
949:
140:
provides best practice recommendations on information security management for use by those responsible for initiating, implementing or maintaining
872:
460:
218:
The fourth category includes work products that describe the specific product development and technical requirements of control system products.
1137:
623:
103:
235:
working groups. It proposes cybersecurity measures for the development lifecycle of road vehicles. The standard was published in August 2021.
255:
243:
380:
private sector as well. Specifically, it was written for those people in the federal government responsible for handling sensitive systems.
539:
112:
ISO/IEC 27001:2022 – Information security, cybersecurity and privacy protection - Information security management systems - Requirements
1068:
1681:
183:
107:
17:
985:
Department of Homeland Security, A Comparison of Cyber Security Standards Developed by the Oil and Gas Segment. (November 5, 2004)
485:
418:
141:
120:
ISO/IEC 27001 formally specifies a management system intended to bring information security under explicit management control.
99:
852:
840:
666:
1725:
1658:
917:
1715:
250:. ISO/SAE 21434 is a technical standard for automotive development that can demonstrate compliance with those regulations.
1689:
1130:
570:
278:
813:"UN Regulations on Cybersecurity and Software Updates to pave the way for mass roll-out of connected vehicles | UNECE"
1621:
1417:
472:
1078:
1671:
1073:
853:"ETSI TS 103 701 Cyber Security for Consumer Internet of Things: Conformance Assessment of Baseline Requirements"
246:
is developing a certification for a "Cyber Security Management System" (CSMS), which is to be mandatory for the
1484:
1123:
509:
361:
227:
ISO/SAE 21434 "Road vehicles - Cybersecurity engineering" is a cybersecurity standard jointly developed by
60:
957:
1676:
1597:
1397:
166:.” It allows many different software and hardware products to be integrated and tested in a secure way.
1653:
1611:
1267:
1514:
1232:
530:
The subsections below detail cybersecurity standards and frameworks related to specific industries.
1499:
1377:
1272:
554:
521:
BSI Standard 200-3 bundles all risk-related steps in the implementation of IT baseline protection.
127:
good security management practice standard. The latest version of BS 7799 is BS 7799-3. Sometimes
1587:
1539:
1202:
580:
365:
242:
regulation on cyber security that is currently being developed. In coordination with the EU, the
189:
All IEC 62443 standards and technical reports are organized into four general categories called
117:
The ISO/IEC 27001 Standard has been adopted identically as EN ISO/IEC 27001 by CEN and CENELEC.
59:
A 2016 US security framework adoption study reported that 70% of the surveyed organizations the
616:
64:
545:
standard was created to increase controls around cardholder data to reduce credit card fraud.
268:
The ETSI EN 303 645 standard provides a set of baseline requirements for security in consumer
209:
The first category includes foundational information such as concepts, models and terminology.
1720:
1628:
1362:
1110:
1058:
652:
595:
590:
456:
783:
182:
The IEC/ISA 62443 cybersecurity standards define processes, techniques and requirements for
1648:
1560:
1509:
1454:
1322:
1295:
1277:
1175:
1146:
776:
585:
496:, abbreviated as BSI) standards are an elementary component of the IT baseline protection (
95:
1242:
8:
1432:
1207:
1165:
761:
738:
705:
336:
The subsections below detail national standards and frameworks related to cybersecurity.
1100:
1063:
1616:
1544:
1449:
269:
1664:
1422:
1357:
1307:
1254:
1212:
1160:
575:
232:
1105:
1633:
1573:
1337:
1327:
1222:
717:
627:
446:
40:
The principal objective is to reduce the risks, including preventing or mitigating
1524:
1504:
1402:
1227:
1217:
1085:
879:
497:
489:
373:
163:
157:
102:(ISMS) standard, of which the last revision was published in October 2022 by the
1694:
1592:
1442:
1392:
1367:
1332:
1312:
1192:
1180:
936:
452:
239:
80:
The subsections below detail international standards related to cybersecurity.
260:, which provides regulations for vehicle cybersecurity and software updates.
1709:
1604:
1565:
1534:
1529:
1382:
1372:
1342:
426:
422:
274:
247:
177:
137:
128:
89:
52:
1638:
1494:
1197:
631:
41:
800:
1578:
1412:
1387:
1352:
1187:
136:
part 2-certified for the organization to become ISO/IEC 27001-certified.
762:"Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web"
739:"Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web"
722:
368:
with guidance on how to protect it, along with relevant protections for
1643:
1459:
1407:
1290:
1170:
1115:
892:
681:"NIST Cybersecurity Framework Adoption Hampered By Costs, Survey Finds"
434:
430:
384:
principles and fourteen practices are described within this document.
1519:
1474:
1469:
1317:
1285:
1091:
Federal Financial Institutions Examination Council's (FFIEC) Web Site
425:
government computer security standards that specify requirements for
1053:
1479:
1437:
1300:
412:
68:
667:"FSI - Consortium for Research on Information Security and Policy"
1489:
1464:
1427:
1069:
Presentation by Professor William Sanders, University of Illinois
369:
124:
1347:
1262:
935:
Text was copied from this source, which is available under a
931:
1039:
Federal Financial Institutions Examination Council (FFIEC).
873:
Symantec Control Compliance Suite – NERC and FERC Regulation
801:
ISO/SAE 21434:2021 Road vehicles — Cybersecurity engineering
417:
The 140 series of Federal Information Processing Standards (
284:
The Cybersecurity provisions in this European standard are:
1090:
228:
1040:
1028:
The North American Electric Reliability Council (NERC).
277:, implementing the standard helps with complying to the
1029:
937:
Creative Commons Attribution 4.0 International License
291:
Implement a means to manage reports of vulnerabilities
1079:
A 10 Minute Guide to the NIST Cybersecurity Framework
706:"Tallinn, Hacking, and Customary International Law"
494:
Bundesamt fĂĽr Sicherheit in der Informationstechnik
321:Make installation and maintenance of devices easy
1707:
759:
624:National Institute of Standards and Technology
553:UL 2900 is a series of standards published by
525:
355:National Institute of Standards and Technology
104:International Organization for Standardization
1131:
540:Payment Card Industry Data Security Standard
297:Securely store sensitive security parameters
162:This standard develops what is called the “
1138:
1124:
617:"Guidelines for Smart Grid Cyber Security"
318:Make it easy for users to delete user data
83:
75:
1682:Security information and event management
721:
279:General Data Protection Regulation (GDPR)
275:personally identifiable information (PII)
184:Industrial Automation and Control Systems
123:ISO/IEC 27002 incorporates part 1 of the
108:International Electrotechnical Commission
1145:
736:
703:
440:
1111:Future of Global Cyber Insurance Market
981:
486:Federal Office for Information Security
253:A derivative of this is in the work of
142:information security management systems
14:
1708:
1074:Global Cybersecurity Policy Conference
882:Subsection: History of NERC Standards
100:information security management system
63:as the most popular best practice for
1659:Host-based intrusion detection system
1119:
1106:ISO/SAE 21434 Challenges in the Field
1010:
790:. Genorma, CEN and CENELEC standards.
479:
461:National Cyber Security Centre (NCSC)
331:
699:
697:
510:Business Continuity Management (BCM)
437:are accepted as current and active.
1690:Runtime application self-protection
1017:
1003:
996:
988:
609:
309:Ensure that personal data is secure
94:ISO/IEC 27001, part of the growing
27:Technology standards and techniques
24:
1241:
1035:
920:. Australian Cyber Security Centre
571:Chief information security officer
466:
263:
25:
1737:
1622:Security-focused operating system
1047:
1024:
694:
312:Make systems resilient to outages
96:ISO/IEC 27000 family of standards
1418:Insecure direct object reference
930:
918:"Essential Eight Maturity Model"
784:"Information Security Standards"
473:Australian Cyber Security Centre
303:Minimize exposed attack surfaces
222:
169:
151:
1672:Information security management
942:
910:
885:
866:
845:
834:
823:
805:
653:"ITU-T Recommendation database"
459:scheme that is operated by the
238:The standard is related to the
1096:CIS Critical Security Controls
1059:ISO 27001 Information Security
1032:. Retrieved November 12, 2005.
893:"NIST Cybersecurity Framework"
794:
753:
737:Ghappour, Ahmed (2017-04-01).
730:
704:Ghappour, Ahmed (2017-01-01).
673:
659:
645:
598:for cyber security investments
288:No universal default passwords
31:Information security standards
13:
1:
975:
315:Examine system telemetry data
1726:Computer security procedures
362:NIST Cybersecurity Framework
61:NIST Cybersecurity Framework
7:
1716:Computer security standards
1677:Information risk management
1598:Multi-factor authentication
1154:Related security categories
1043:. Retrieved April 18, 2018.
956:(in German). Archived from
564:
526:Industry-specific Standards
406:
10:
1742:
1654:Intrusion detection system
1612:Computer security software
1268:Advanced persistent threat
548:
537:
533:
508:BSI Standard 100-4 covers
444:
410:
352:
175:
155:
87:
47:
1553:
1253:
1239:
1233:Digital rights management
1153:
306:Ensure software integrity
248:type approval of vehicles
1378:Denial-of-service attack
1273:Arbitrary code execution
760:Ghappour, Ahmed (2017).
602:
270:Internet of things (IoT)
110:(IEC). Its full name is
35:cyber security standards
18:Cyber security standards
1588:Computer access control
1540:Rogue security software
1203:Electromagnetic warfare
1101:UK NCSC Common Criteria
581:Control system security
366:critical infrastructure
348:
339:
195:Policies and Procedures
84:ISO/IEC 27001 and 27002
76:International Standards
1634:Obfuscation (software)
1363:Browser Helper Objects
1247:
950:"BSI - IT-Grundschutz"
841:ETSI EN 303 645 V2.1.0
632:10.6028/NIST.IR.7628r1
501:
493:
451:Cyber Essentials is a
65:Information Technology
1629:Data-centric security
1510:Remote access trojans
1245:
1041:https://www.ffiec.gov
591:Information assurance
457:information assurance
441:NCSC Cyber Essentials
294:Keep software updated
1561:Application security
1455:Privilege escalation
1323:Cross-site scripting
1176:Cybersex trafficking
1147:Information security
586:Information security
300:Communicate securely
1208:Information warfare
1166:Automotive security
1030:http://www.nerc.com
766:Stanford Law Review
743:Stanford Law Review
723:10.1017/aju.2017.59
324:Validate input data
240:European Union (EU)
1617:Antivirus software
1485:Social engineering
1450:Polymorphic engine
1403:Fraudulent dialers
1308:Hardware backdoors
1248:
1084:2021-04-14 at the
1064:NERC CIP Standards
1054:IEC Cyber Security
899:. 12 November 2013
878:2016-10-22 at the
626:. September 2014.
480:BSI IT-Grundschutz
332:National Standards
1703:
1702:
1665:Anomaly detection
1570:Secure by default
1423:Keystroke loggers
1358:Drive-by download
1246:vectorial version
1213:Internet security
1161:Computer security
830:ETSI announcement
596:Gordon–Loeb model
576:Computer security
16:(Redirected from
1733:
1574:Secure by design
1505:Hardware Trojans
1338:History sniffing
1328:Cross-site leaks
1223:Network security
1140:
1133:
1126:
1117:
1116:
1038:
1027:
1020:
1013:
1006:
999:
991:
984:
969:
968:
966:
965:
946:
940:
934:
929:
927:
925:
914:
908:
907:
905:
904:
889:
883:
870:
864:
863:
857:
849:
843:
838:
832:
827:
821:
820:
809:
803:
798:
792:
791:
780:
774:
773:
757:
751:
750:
734:
728:
727:
725:
701:
692:
691:
689:
688:
677:
671:
670:
663:
657:
656:
649:
643:
642:
640:
638:
621:
613:
447:Cyber Essentials
21:
1741:
1740:
1736:
1735:
1734:
1732:
1731:
1730:
1706:
1705:
1704:
1699:
1549:
1249:
1237:
1228:Copy protection
1218:Mobile security
1149:
1144:
1086:Wayback Machine
1050:
978:
973:
972:
963:
961:
948:
947:
943:
923:
921:
916:
915:
911:
902:
900:
891:
890:
886:
880:Wayback Machine
871:
867:
855:
851:
850:
846:
839:
835:
828:
824:
811:
810:
806:
799:
795:
782:
781:
777:
758:
754:
735:
731:
702:
695:
686:
684:
683:. 30 March 2016
679:
678:
674:
665:
664:
660:
651:
650:
646:
636:
634:
619:
615:
614:
610:
605:
567:
551:
542:
536:
528:
482:
469:
467:Essential Eight
449:
443:
415:
409:
374:civil liberties
357:
353:Main category:
351:
342:
334:
266:
264:ETSI EN 303 645
225:
180:
172:
164:Common Criteria
160:
158:Common Criteria
154:
92:
86:
78:
50:
28:
23:
22:
15:
12:
11:
5:
1739:
1729:
1728:
1723:
1718:
1701:
1700:
1698:
1697:
1695:Site isolation
1692:
1687:
1686:
1685:
1679:
1669:
1668:
1667:
1662:
1651:
1646:
1641:
1636:
1631:
1626:
1625:
1624:
1619:
1609:
1608:
1607:
1602:
1601:
1600:
1593:Authentication
1585:
1584:
1583:
1582:
1581:
1571:
1568:
1557:
1555:
1551:
1550:
1548:
1547:
1542:
1537:
1532:
1527:
1522:
1517:
1512:
1507:
1502:
1497:
1492:
1487:
1482:
1477:
1472:
1467:
1462:
1457:
1452:
1447:
1446:
1445:
1435:
1430:
1425:
1420:
1415:
1410:
1405:
1400:
1395:
1393:Email spoofing
1390:
1385:
1380:
1375:
1370:
1365:
1360:
1355:
1350:
1345:
1340:
1335:
1333:DOM clobbering
1330:
1325:
1320:
1315:
1313:Code injection
1310:
1305:
1304:
1303:
1298:
1293:
1288:
1280:
1275:
1270:
1265:
1259:
1257:
1251:
1250:
1240:
1238:
1236:
1235:
1230:
1225:
1220:
1215:
1210:
1205:
1200:
1195:
1193:Cyberterrorism
1190:
1185:
1184:
1183:
1181:Computer fraud
1178:
1168:
1163:
1157:
1155:
1151:
1150:
1143:
1142:
1135:
1128:
1120:
1114:
1113:
1108:
1103:
1098:
1093:
1088:
1076:
1071:
1066:
1061:
1056:
1049:
1048:External links
1046:
1045:
1044:
1033:
1022:
1015:
1008:
1001:
994:
986:
977:
974:
971:
970:
941:
909:
884:
865:
844:
833:
822:
804:
793:
775:
752:
729:
693:
672:
658:
644:
607:
606:
604:
601:
600:
599:
593:
588:
583:
578:
573:
566:
563:
550:
547:
538:Main article:
535:
532:
527:
524:
523:
522:
519:
516:
513:
502:IT-Grundschutz
481:
478:
468:
465:
453:United Kingdom
445:Main article:
442:
439:
429:modules. Both
411:Main article:
408:
405:
404:
403:
399:
395:
391:
388:
385:
381:
377:
350:
347:
341:
338:
333:
330:
326:
325:
322:
319:
316:
313:
310:
307:
304:
301:
298:
295:
292:
289:
265:
262:
224:
221:
220:
219:
216:
213:
210:
176:Main article:
171:
168:
156:Main article:
153:
150:
106:(ISO) and the
88:Main article:
85:
82:
77:
74:
49:
46:
26:
9:
6:
4:
3:
2:
1738:
1727:
1724:
1722:
1719:
1717:
1714:
1713:
1711:
1696:
1693:
1691:
1688:
1683:
1680:
1678:
1675:
1674:
1673:
1670:
1666:
1663:
1660:
1657:
1656:
1655:
1652:
1650:
1647:
1645:
1642:
1640:
1637:
1635:
1632:
1630:
1627:
1623:
1620:
1618:
1615:
1614:
1613:
1610:
1606:
1605:Authorization
1603:
1599:
1596:
1595:
1594:
1591:
1590:
1589:
1586:
1580:
1577:
1576:
1575:
1572:
1569:
1567:
1566:Secure coding
1564:
1563:
1562:
1559:
1558:
1556:
1552:
1546:
1543:
1541:
1538:
1536:
1535:SQL injection
1533:
1531:
1528:
1526:
1523:
1521:
1518:
1516:
1515:Vulnerability
1513:
1511:
1508:
1506:
1503:
1501:
1500:Trojan horses
1498:
1496:
1495:Software bugs
1493:
1491:
1488:
1486:
1483:
1481:
1478:
1476:
1473:
1471:
1468:
1466:
1463:
1461:
1458:
1456:
1453:
1451:
1448:
1444:
1441:
1440:
1439:
1436:
1434:
1431:
1429:
1426:
1424:
1421:
1419:
1416:
1414:
1411:
1409:
1406:
1404:
1401:
1399:
1396:
1394:
1391:
1389:
1386:
1384:
1383:Eavesdropping
1381:
1379:
1376:
1374:
1373:Data scraping
1371:
1369:
1366:
1364:
1361:
1359:
1356:
1354:
1351:
1349:
1346:
1344:
1343:Cryptojacking
1341:
1339:
1336:
1334:
1331:
1329:
1326:
1324:
1321:
1319:
1316:
1314:
1311:
1309:
1306:
1302:
1299:
1297:
1294:
1292:
1289:
1287:
1284:
1283:
1281:
1279:
1276:
1274:
1271:
1269:
1266:
1264:
1261:
1260:
1258:
1256:
1252:
1244:
1234:
1231:
1229:
1226:
1224:
1221:
1219:
1216:
1214:
1211:
1209:
1206:
1204:
1201:
1199:
1196:
1194:
1191:
1189:
1186:
1182:
1179:
1177:
1174:
1173:
1172:
1169:
1167:
1164:
1162:
1159:
1158:
1156:
1152:
1148:
1141:
1136:
1134:
1129:
1127:
1122:
1121:
1118:
1112:
1109:
1107:
1104:
1102:
1099:
1097:
1094:
1092:
1089:
1087:
1083:
1080:
1077:
1075:
1072:
1070:
1067:
1065:
1062:
1060:
1057:
1055:
1052:
1051:
1042:
1037:
1034:
1031:
1026:
1023:
1019:
1016:
1012:
1009:
1005:
1002:
998:
995:
990:
987:
983:
980:
979:
960:on 2013-09-30
959:
955:
951:
945:
938:
933:
919:
913:
898:
894:
888:
881:
877:
874:
869:
861:
854:
848:
842:
837:
831:
826:
818:
814:
808:
802:
797:
789:
785:
779:
771:
767:
763:
756:
748:
744:
740:
733:
724:
719:
715:
711:
707:
700:
698:
682:
676:
668:
662:
654:
648:
633:
629:
625:
618:
612:
608:
597:
594:
592:
589:
587:
584:
582:
579:
577:
574:
572:
569:
568:
562:
558:
556:
546:
541:
531:
520:
517:
514:
511:
507:
506:
505:
503:
499:
495:
491:
487:
477:
474:
464:
462:
458:
454:
448:
438:
436:
432:
428:
424:
420:
414:
400:
396:
392:
389:
386:
382:
378:
375:
371:
367:
363:
359:
358:
356:
346:
337:
329:
323:
320:
317:
314:
311:
308:
305:
302:
299:
296:
293:
290:
287:
286:
285:
282:
280:
276:
271:
261:
259:
257:
251:
249:
245:
241:
236:
234:
230:
223:ISO/SAE 21434
217:
214:
211:
208:
207:
206:
204:
200:
196:
192:
187:
185:
179:
178:IEC/ISA 62443
174:
170:IEC/ISA 62443
167:
165:
159:
152:ISO/IEC 15408
149:
145:
143:
139:
138:ISO/IEC 27002
133:
130:
129:ISO/IEC 27002
126:
121:
118:
115:
113:
109:
105:
101:
97:
91:
90:ISO/IEC 27001
81:
73:
70:
66:
62:
57:
54:
53:Cybersecurity
45:
43:
42:cyber-attacks
38:
36:
32:
19:
1721:Cyberwarfare
1639:Data masking
1198:Cyberwarfare
1036:
1025:
1018:
1011:
1004:
997:
989:
982:
962:. Retrieved
958:the original
953:
944:
924:29 September
922:. Retrieved
912:
901:. Retrieved
896:
887:
868:
859:
847:
836:
825:
816:
807:
796:
787:
778:
769:
765:
755:
746:
742:
732:
713:
710:AJIL Unbound
709:
685:. Retrieved
675:
661:
647:
635:. Retrieved
611:
559:
552:
543:
529:
483:
470:
450:
427:cryptography
416:
343:
335:
327:
283:
267:
254:
252:
237:
226:
202:
198:
194:
190:
188:
181:
173:
161:
146:
134:
122:
119:
116:
111:
93:
79:
58:
51:
39:
34:
30:
29:
1579:Misuse case
1413:Infostealer
1388:Email fraud
1353:Data breach
1188:Cybergeddon
788:Genorma.com
716:: 224–228.
637:28 November
455:government
281:in the EU.
1710:Categories
1644:Encryption
1520:Web shells
1460:Ransomware
1408:Hacktivism
1171:Cybercrime
976:References
964:2021-03-26
903:2016-08-02
749:(4): 1075.
687:2016-08-02
435:FIPS 140-3
431:FIPS 140-2
1475:Shellcode
1470:Scareware
1318:Crimeware
1278:Backdoors
817:unece.org
203:Component
1649:Firewall
1554:Defenses
1480:Spamming
1465:Rootkits
1438:Phishing
1398:Exploits
1082:Archived
876:Archived
565:See also
413:FIPS 140
407:FIPS 140
394:secure".
98:, is an
69:dark web
1490:Spyware
1433:Payload
1428:Malware
1368:Viruses
1348:Botnets
1255:Threats
549:UL 2900
534:PCI DSS
370:privacy
191:General
125:BS 7799
56:1990s.
48:History
1684:(SIEM)
1661:(HIDS)
1545:Zombie
1282:Bombs
1263:Adware
498:German
490:German
421:) are
199:System
33:(also
1530:Worms
1525:Wiper
1443:Voice
1291:Logic
993:1996)
856:(PDF)
620:(PDF)
603:Notes
256:UNECE
244:UNECE
1296:Time
1286:Fork
926:2022
897:NIST
860:ETSI
772:(4).
639:2023
484:The
471:The
433:and
423:U.S.
419:FIPS
372:and
360:The
349:NIST
340:NERC
258:WP29
231:and
201:and
1301:Zip
954:BSI
718:doi
714:111
628:doi
233:SAE
229:ISO
1712::
952:.
895:.
858:.
815:.
786:.
770:69
768:.
764:.
747:69
745:.
741:.
712:.
708:.
696:^
622:.
555:UL
500::
492::
205:.
197:,
193:,
114:.
1139:e
1132:t
1125:v
967:.
939:.
928:.
906:.
862:.
819:.
726:.
720::
690:.
669:.
655:.
641:.
630::
512:.
488:(
376:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.