Skip to content
CISO Plus
  • Tools
    • Cyber Security Web Services and Tools
    • Open Source Cyber Security Solutions
  • Knowledge Base
    • Core Concepts
    • Videos
    • Guides
  • Certifications
    • CISSP
      • CISSP Practice Exam Questions
      • CISSP Certification & Exam Prep
    • CISM
      • CISM Certification & Exam Prep
  • Blog
  • News Room
  • Contact Us
  • Tools
    • Cyber Security Web Services and Tools
    • Open Source Cyber Security Solutions
  • Knowledge Base
    • Core Concepts
    • Videos
    • Guides
  • Certifications
    • CISSP
      • CISSP Practice Exam Questions
      • CISSP Certification & Exam Prep
    • CISM
      • CISM Certification & Exam Prep
  • Blog
  • News Room
  • Contact Us
  • Tools
    • Cyber Security Web Services and Tools
    • Open Source Cyber Security Solutions
  • Knowledge Base
    • Core Concepts
    • Videos
    • Guides
  • Certifications
    • CISSP
      • CISSP Certification & Exam Prep
      • CISSP Practice Exam Questions
    • CISM
      • CISM Certification & Exam Prep
  • Blog
  • News Room
  • Contact Us
  • Tools
    • Cyber Security Web Services and Tools
    • Open Source Cyber Security Solutions
  • Knowledge Base
    • Core Concepts
    • Videos
    • Guides
  • Certifications
    • CISSP
      • CISSP Certification & Exam Prep
      • CISSP Practice Exam Questions
    • CISM
      • CISM Certification & Exam Prep
  • Blog
  • News Room
  • Contact Us
Core Concepts

Core Concepts

Core Concepts

Navigate the complex world of cyber security core concepts and terms

Administrative Controls

Administrative Controls

Advanced Persistent Threat (APT)

Advanced Persistent Threat (APT)

AICPA Service Organization Control 2 (SOC2)

AICPA Service Organization Control 2 (SOC2)

Anti Malware Scan Interface (AMSI)

Anti Malware Scan Interface (AMSI)

Antivirus AV NGAV

Antivirus (AV)

CASB Bastion Host

Bastion Host

Bell LaPadula Model

Biba Model

Cyber Attack Malware

Brute Force Attack

Business Continuity Plan (BCP)

Business Impact Analysis (BIA)

Business Impact Analysis (BIA)

CCPA

California Consumer Privacy Act (CCPA)

CRISC

Certified in Risk and Information Systems Control (CRISC)

CISM

Certified Information Security Manager (CISM)

CISSP

Certified Information Systems Security Professional (CISSP)

CISO Data Owner

Chief Information Security Officer (CISO)

CIA Triad

CIA Triad

CIS

CIS Community Defense Model (CDM) 2.0

Subscribe to our newsletter!

    Website Navigation

    Online Tools

    Open Source Solutions

    Core Concepts

    Videos

    Guides

    CISSP

    Blog

    News Room

    Legal

    Terms of Use

    Privacy Policy

    Accessibility

    Connect With Us

    Contact Us

    Website Navigation

    Online Tools

    Open Source Solutions

    Core Concepts

    Videos

    Guides

    CISSP

    Blog

    News Room

    Legal

    Terms of Use

    Privacy Policy

    Accessibility

    Connect With Us

    Contact Us

    Subscribe to our newsletter!

      © Cygeta | All Rights Reserved 2023-2025

      CISO Plus
      Notice!

      Before using this website, please read our terms of use and privacy policy carefully.

      Please contact us with any question you may have.

      We urge you not to use this website if you do not accept our terms of use and privacy policy.

      Functional Always active
      The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
      Preferences
      The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
      Statistics
      The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
      Marketing
      The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
      Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
      View preferences
      {title} {title} {title}