Skip to content
David X Martin
Cyber Risk Management for business leaders
  • Home
  • Why Cybersecurity Matters
  • CyberWellness
  • Books
  • Articles & Media
  • Glossary
  • How I Help
  • About

Tag: types of cybersecurity

Cybersecurity Glossary: Security controls

November 30, 2019 David X Martin

To protect sensitive data, security controls needs to guard weaknesses in the system and offer only required functionality to authorized users.

Continue Reading →

Posted in: Glossary Filed under: cybersecurity, types of cybersecurity

Cybersecurity Glossary: Data Security

November 21, 2019 David X Martin

The core elements of data security are: confidentiality, which ensures that data is accessed only by authorized individuals; integrity ensures that information is reliable, as well as accurate; and availability, which ensures that data is both available and accessible to satisfy business needs.

Continue Reading →

Posted in: Glossary Filed under: data breach, types of cybersecurity

Cybersecurity Glossary: Information Systems

David X Martin

Information systems are methods for storing, managing, using and gathering of data and communications in an organization. They are comprised…

Continue Reading →

Posted in: Glossary Filed under: types of cybersecurity

Cybersecurity Glossary: Information Assurance and Security Management

David X Martin

Information assurance and security is the management and protection of knowledge, information, and data. It combines two fields: – Information…

Continue Reading →

Posted in: Glossary Filed under: types of cybersecurity

Cybersecurity Glossary: Network Security

David X Martin

Network security refers to a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies.

Continue Reading →

Posted in: Glossary Filed under: types of cybersecurity

Cybersecurity Glossary: Application Security

October 25, 2019 David X Martin

Application security is important because today’s applications are often available over various networks and connected to the Cloud, increasing vulnerabilities to security threats and breaches.

Continue Reading →

Posted in: Glossary Filed under: types of cybersecurity

Can I help?

Interested to learn more about How I Help?

- Advisor & Board Director
- Expert Witness
- Speaker & Author

Follow me on Twitter

My Tweets

Latest posts

  • Ransomware: Don’t Expect Governments Alone to Save Us
  • CyRM: Mastering the Management of Cybersecurity Risk, with David X Martin
  • The Future of Risk Management

Get in touch


Contact form

Let’s Connect

  • X
  • LinkedIn

NEW! CyRM: Mastering the Management of Cybersecurity

CyRM Mastering the management of cybersecurity by David X Martin

Introducing CyRM as an approach to growth

CyRM cyberWELlness

Search DavidXMartin.com

#cyberwellness
#cyrmbook
#cybersecurity
#riskmanagement
#cyberriskmanagement

LEARN THE LINGO
Cybersecurity Glossary

Privacy Policy

Your data is protected.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
Copyright © David X Martin
Website by MediaMoxie.com