Cyber Essentials Technical Controls Themes

Boundary Firewalls and Internal Gateways, Secure Configurations, Access Controls, Malware Protect and Security Updates

January 11, 2023
Cyber Essentials Plus

Cyber Essentials and the Plus version follow the same guidelines, however the difference is that a certification body, such as Data Connect,...

January 11, 2023
Cyber Essentials

Cyber Essentials is a government backed scheme (UK) that will help you protect your organisation, whatever its size, against a range of...

January 11, 2023
Cyber incident

In line with the Computer Misuse Act (1990), a cyber incident is a breach of a system's security policy in order to affect...

January 11, 2023
Cyber Attack

An attempt to gain illegal access to a single or multiple computer or network. Launched by a cyber criminal, cyber attacks are...

January 11, 2023
Cross Site Scripting (XSS)

Cross Site Scripting is an attack method whereby the attacker has infected a website with malicious scripts onto an otherwise trusted site....

January 11, 2023
Credentials

Verifies and authenticate a user’s identity such as password or certification.

January 11, 2023
Countermeasure

A method or system that an organisation uses to reduce a security threat.

January 11, 2023
Cookie

A token of data embedded into a web page to allow for the owner of the site to track your progress.

January 11, 2023
Compromise

The successful penetration into a system by a malicious actor.

January 11, 2023
Common Vulnerability Scoring System (CVSS)

An industry standard that gives each vulnerability a qualitative score of its severity, starting from 0 to 10. There are multiple versions to...

January 11, 2023
Cloud Computing

The method of using a network for remote servers hosted on the internet as opposed to using a local server or a...

January 11, 2023