Skip to content

David X Martin

Cyber Risk Management for business leaders
  • Home
  • Why Cybersecurity Matters
  • CyberWellness
  • Books
  • Articles & Media
  • Glossary
  • How I Help
  • About

Media

Cybersecurity Glossary: Forensics

November 21, 2019 David X Martin

The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.

Continue Reading →

Posted in: Glossary Filed under: cyberattack, data breach, hack

Cybersecurity Glossary: Disaster Recovery

David X Martin

Disaster recovery refers to a process that includes performing risk assessment, establishing priorities, developing recovery strategies in case of a…

Continue Reading →

Posted in: Glossary Filed under: cybersecurity

Cybersecurity Glossary: Sensitive Data (Information)

David X Martin

Sensitive information is data that must be guarded from unauthorized access and unwarranted disclosure in order to maintain the information security of an individual or organization.

Continue Reading →

Posted in: Glossary Filed under: types of data

Cybersecurity Glossary: Data Security

David X Martin

The core elements of data security are: confidentiality, which ensures that data is accessed only by authorized individuals; integrity ensures that information is reliable, as well as accurate; and availability, which ensures that data is both available and accessible to satisfy business needs.

Continue Reading →

Posted in: Glossary Filed under: data breach, types of cybersecurity

Cybersecurity Glossary: Information Systems

David X Martin

Information systems are methods for storing, managing, using and gathering of data and communications in an organization. They are comprised…

Continue Reading →

Posted in: Glossary Filed under: types of cybersecurity

Cybersecurity Glossary: Information Assurance and Security Management

David X Martin

Information assurance and security is the management and protection of knowledge, information, and data. It combines two fields: – Information…

Continue Reading →

Posted in: Glossary Filed under: types of cybersecurity

Cybersecurity Glossary: Network Security

David X Martin

Network security refers to a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies.

Continue Reading →

Posted in: Glossary Filed under: types of cybersecurity

Cybersecurity Glossary: Cyber Crime

November 12, 2019 David X Martin

Cyber crime occurs when a computer is the object of the crime or is used as a tool to commit an offense.

Continue Reading →

Posted in: Glossary Filed under: cyberattack, data breach, hack, types of breaches

Cybersecurity Glossary: Denial of Service (DoS)

October 29, 2019 David X Martin

A Denial of Service (DoS) is a cyberattack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.

Continue Reading →

Posted in: Glossary Filed under: cyberattack

Cybersecurity Glossary: Ransomware

David X Martin

Ransomware is essentially digital extortion executed through software that uses encryption techniques to keep files — and entire systems — locked from use by their original owner, and holds them hostage.

Continue Reading →

Posted in: Glossary Filed under: cyberattack, data breach, hack

Post navigation

Page 5 of 10
← Previous 1 … 4 5 6 … 10 Next →

Latest posts

  • Ransomware: Don’t Expect Governments Alone to Save Us
  • CyRM: Mastering the Management of Cybersecurity Risk, with David X Martin
  • The Future of Risk Management

Get in touch


Contact form

Let’s Connect

  • X
  • LinkedIn

NEW! CyRM: Mastering the Management of Cybersecurity

CyRM Mastering the management of cybersecurity by David X Martin

Introducing CyRM as an approach to growth

CyRM cyberWELlness

Search DavidXMartin.com

#cyberwellness
#cyrmbook
#cybersecurity
#riskmanagement
#cyberriskmanagement

LEARN THE LINGO
Cybersecurity Glossary

Privacy Policy

Your data is protected.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
Copyright © David X Martin
Website by MediaMoxie.com