x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



What is it Social engineering is the use of deception to manipulate individuals into providing a particular response, generally for a fraudulent or



What is it An email bomb is an attack against an email inbox or server designed to overwhelm an inbox or inhibit the server’s normal function,



What is it Phishing occurs when malicious actors masquerade as legitimate entities during electronic communication in an attempt to compromise



What it is Passwords are a critical yet basic authentication mechanism in information security that consists of a combination of alphabetic,



Patching is the process of applying available updates to an operating system, website, software, hardware, or plugin tp address identified vulnerabilities.


What it is Hyper Text Transfer Protocol Secure (HTTPS) is an Internet communication protocol used to encrypt and securely transmit information



What it is Typosquatting attempts to take advantage of typographical errors (ie “typos”) introduced by users when URLs are typed directly into



What it is The CIA Triad is a benchmark model in information security designed to govern and evaluate how an organization handles data when it is



What it is Earlier this week, US-CERT released a Joint Technical Alert (TA18-106A) detailing state-sponsored Russian cyber activity targeting



What it is The principle of least privilege recommends that users, systems, and processes only have access to resources (networks, systems, and



What it is Ransomware is a type of malware (malicious software) that blocks access to a, system, device, or file until a ransom is paid Malicious



What it is Encryption is the process whereby data is converted from a readable form (ie, plaintext), to an encoded form (ie, ciphertext) This



A denial of service attack (DoS) is a cyber attack that originates from a singular source and seeks to disrupt the availability of a system or service.


1 2 3 4