Cyber Essentials Technical Controls Themes

Boundary Firewalls and Internal Gateways, Secure Configurations, Access Controls, Malware Protect and Security Updates

591 January 11, 2023
Cyber Essentials Plus

Cyber Essentials and the Plus version follow the same guidelines, however the difference is that a certification body, such as Data Connect,...

590 January 11, 2023
Cyber Essentials

Cyber Essentials is a government backed scheme (UK) that will help you protect your organisation, whatever its size, against a range of...

589 January 11, 2023
Cyber incident

In line with the Computer Misuse Act (1990), a cyber incident is a breach of a system's security policy in order to affect...

588 January 11, 2023
Cyber Attack

An attempt to gain illegal access to a single or multiple computer or network. Launched by a cyber criminal, cyber attacks are...

587 January 11, 2023
Cross Site Scripting (XSS)

Cross Site Scripting is an attack method whereby the attacker has infected a website with malicious scripts onto an otherwise trusted site....

586 January 11, 2023
Credentials

Verifies and authenticate a user’s identity such as password or certification.

585 January 11, 2023
Countermeasure

A method or system that an organisation uses to reduce a security threat.

584 January 11, 2023
Cookie

A token of data embedded into a web page to allow for the owner of the site to track your progress.

583 January 11, 2023
Compromise

The successful penetration into a system by a malicious actor.

582 January 11, 2023
Common Vulnerability Scoring System (CVSS)

An industry standard that gives each vulnerability a qualitative score of its severity, starting from 0 to 10. There are multiple versions to...

581 January 11, 2023
Cloud Computing

The method of using a network for remote servers hosted on the internet as opposed to using a local server or a...

580 January 11, 2023