×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Cyber hoax scams are attacks that exploit unsuspecting users to provide valuable information, such as login credentials or money


What it is Website defacements are the unauthorized modification of web pages, including the addition, removal, or alteration of existing content



A zero-day exploit is a cyber attack that targets a flaw in a system before developers or the public are aware it exists.


Disaster recovery plans (DRP) seek to quickly redirect available resources into restoring data and information systems following a disaster.


Defense in Depth (DiD) involves a series of security mechanisms and controls that are thoughtfully layered throughout a computer network.


Learn more about hardware, software, and firmware - the three core components that make up present-day computers and systems.


A top-level domain (TLD) represents the right-most segment of a domain address, specifically the letters immediately following the last "dot" in the domain.


Internet Protocol (IP) is the communication standard used to uniquely identify systems on a computer network or across the internet


A Cyber Threat Actor (CTA) participates in an action or process that is characterized by malice or hostile action using computers, devices, systems, or networks. 


The VDBR provides analysis on data breach trends affecting a variety of sectors, including public administration, healthcare, and education.


Malware analysis examines the attributes or behavior of a particular piece of malware often for the purpose of identification, mitigation, or attribution.


The three parts commonly used to divide the web are the Surface Web, the Dark Web, and the Deep Web. 


The CIS Controls™ are a prioritized list of best practices that mitigate common attacks against systems and networks.


Password attacks use of software that expedites cracking or guessing passwords to maliciously authenticate into password-protected accounts.


Blockchains are distributed ledgers that are digitally signed and linked via cryptography and distributed across participants in a peer-to-peer network.


1 2 3 4