Most linked-to categories

From GCA ACT
Jump to navigationJump to search

Showing below up to 50 results in range #901 to #950.

View ( | ) (20 | 50 | 100 | 250 | 500)

  1. RS.IM-2: Response strategies are updated‏‎ (1 member)
  2. NIST CSF v1.1‏‎ (1 member)
  3. Iceland‏‎ (1 member)
  4. DE.DP-4: Event detection information is communicated‏‎ (1 member)
  5. ID.AM-4: External information systems are catalogued‏‎ (1 member)
  6. BYOD Policy Implmentation‏‎ (1 member)
  7. ID.SC-5: Response and recovery planning and testing are conducted with suppliers and third-party providers‏‎ (1 member)
  8. ID.BE-2: The organization’s place in critical infrastructure and its industry sector is identified and communicated‏‎ (1 member)
  9. ID.AM-6: Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established‏‎ (1 member)
  10. PR.IP-7: Protection processes are improved‏‎ (1 member)
  11. ID.GV-3: Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed‏‎ (1 member)
  12. PR.AT-5: Physical and cybersecurity personnel understand their roles and responsibilities‏‎ (1 member)
  13. DE.CM-2: The physical environment is monitored to detect potential cybersecurity events‏‎ (1 member)
  14. PR.DS-8: Integrity checking mechanisms are used to verify hardware integrity‏‎ (1 member)
  15. DE.CM-6: External service provider activity is monitored to detect potential cybersecurity events‏‎ (1 member)
  16. PR.AT-3: Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities‏‎ (1 member)
  17. RC.IM-1: Recovery plans incorporate lessons learned‏‎ (1 member)
  18. Wallet Private Key Protection (Storage - Retrieval - Use)‏‎ (1 member)
  19. Volunteer Authentication‏‎ (1 member)
  20. PR.PT-5: Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations‏‎ (1 member)
  21. RS.CO-1: Personnel know their roles and order of operations when a response is needed‏‎ (1 member)
  22. Centralized Transaction Mixer‏‎ (1 member)
  23. RC.CO-1: Public relations are managed‏‎ (1 member)
  24. Captcha‏‎ (1 member)
  25. PR.PT-1: Audit or log records are determined, documented, implemented, and reviewed in accordance with policy‏‎ (1 member)
  26. DE.CM-4: Malicious code is detected‏‎ (1 member)
  27. Asset Collocation Risk Reduction Techniques‏‎ (1 member)
  28. DE.CM-3: Personnel activity is monitored to detect potential cybersecurity events‏‎ (1 member)
  29. PR.PT-2: Removable media is protected and its use restricted according to policy‏‎ (1 member)
  30. Political and Social-1.5‏‎ (1 member)
  31. Journalists-6‏‎ (1 member)
  32. DE.CM-1: The network is monitored to detect potential cybersecurity events‏‎ (1 member)
  33. PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties‏‎ (1 member)
  34. Political and Social-8.7‏‎ (1 member)
  35. Journalists-8.7‏‎ (1 member)
  36. PR.MA-2: Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access‏‎ (1 member)
  37. PR.PT-3: The principle of least functionality is incorporated by configuring systems to provide only essential capabilities‏‎ (1 member)
  38. PR.DS-1: Data-at-rest is protected‏‎ (1 member)
  39. DE.CM-5: Unauthorized mobile code is detected‏‎ (1 member)
  40. Political and Social-6‏‎ (1 member)
  41. ID.BE-1: The organization’s role in the supply chain is identified and communicated‏‎ (1 member)
  42. ID.AM-1: Physical devices and systems within the organization are inventoried‏‎ (1 member)
  43. Journalists-1.5‏‎ (1 member)
  44. Protecting Sensitive Sudent Information‏‎ (1 member)
  45. DE.AE-3: Event data are collected and correlated from multiple sources and sensors‏‎ (1 member)
  46. PR.PT-4: Communications and control networks are protected‏‎ (1 member)
  47. RS.RP-1: Response plan is executed during or after an incident‏‎ (1 member)
  48. PR.AC-6: Identities are proofed and bound to credentials and asserted in interactions‏‎ (1 member)
  49. Election Officials-1‏‎ (1 member)
  50. Voters-1‏‎ (1 member)

View ( | ) (20 | 50 | 100 | 250 | 500)