Categories
From GCA ACT
Jump to navigationJump to search
The following categories exist on the wiki, and may or may not be unused. Also see wanted categories.
- Cryptocurrency Investigation Training (1 member)
- Cryptocurrency News Sources (4 members)
- Cryptocurrency Project Risk Intelligence and Management (3 members)
- Cryptocurrency Risk Management (9 members)
- Cryptocurrency Technical Support Scam (3 members)
- Cryptocurrency Wallet Risk Intelligence and Management (3 members)
- Cryptocurrency and Blockchain Security Awareness Education (7 members)
- Cryptojacking (1 member)
- Custom AI Solutions (1 member)
- Customer Authentication (1 member)
- Customer Identity & Access Management (CIAM) (1 member)
- Customer Information (1 member)
- Customizable Block Lists (1 member)
- Customization - AI (1 member)
- Cyber-Related Fraud, Criminal, or Data Breach Activity (1 member)
- Cyber Security Terms & Definitions (3 members)
- Cyber Threat Defense (3 members)
- Cyber Threat Detection (1 member)
- Cyber Threat Protection (1 member)
- Cyberbullying (18 members)
- Cyberbullying Prevention (2 members)
- Cybercrime Policy (1 member)
- Cybercrime Reporting (10 members)
- Cybercrime Victimization (1 member)
- Cybercrime Victims - Individuals (9 members)
- Cybersecurity Careers (2 members)
- Cybersecurity Metrics (1 member)
- Cybersecurity Professionals (1 member)
- Cybersecurity Providers (30 members)
- Cyprus (2 members)
- Czech Republic (1 member)
- DDoS Protection (7 members)
- DE.AE-1: A baseline of network operations and expected data flows for users and systems is established and managed (1 member)
- DE.AE-2: Detected events are analyzed to understand attack targets and methods (1 member)
- DE.AE-3: Event data are collected and correlated from multiple sources and sensors (1 member)
- DE.AE-4: Impact of events is determined (1 member)
- DE.AE-5: Incident alert thresholds are established (1 member)
- DE.CM-1: The network is monitored to detect potential cybersecurity events (1 member)
- DE.CM-2: The physical environment is monitored to detect potential cybersecurity events (1 member)
- DE.CM-3: Personnel activity is monitored to detect potential cybersecurity events (1 member)
- DE.CM-4: Malicious code is detected (1 member)
- DE.CM-5: Unauthorized mobile code is detected (1 member)
- DE.CM-6: External service provider activity is monitored to detect potential cybersecurity events (1 member)
- DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed (1 member)
- DE.CM-8: Vulnerability scans are performed (1 member)
- DE.DP-1: Roles and responsibilities for detection are well defined to ensure accountability (1 member)
- DE.DP-2: Detection activities comply with all applicable requirements (1 member)
- DE.DP-3: Detection processes are tested (1 member)
- DE.DP-4: Event detection information is communicated (1 member)
- DE.DP-5: Detection processes are continuously improved (1 member)