Artwork

Content provided by G Mark Hardy & Ross Young, G Mark Hardy, and Ross Young. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by G Mark Hardy & Ross Young, G Mark Hardy, and Ross Young or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

#166 - Cyber Acronyms You Should Know

38:49
 
Share
 

Manage episode 398169692 series 2849492
Content provided by G Mark Hardy & Ross Young, G Mark Hardy, and Ross Young. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by G Mark Hardy & Ross Young, G Mark Hardy, and Ross Young or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

This video introduces a newly proposed acronym in the world of cybersecurity known as the 'Cyber UPDATE'. The acronym breaks down into Unchanging, Perimeterizing, Distributing, Authenticating and Authorizing, Tracing, and Ephemeralizing. The video aims to explain each component of the acronym and its significance in enhancing cybersecurity.

References:

  1. https://www.watchguard.com/wgrd-news/blog/decrypting-cybersecurity-acronyms-0
  2. https://computerhistory.org/profile/john-mccarthy/
  3. https://owasp.org/www-community/Threat_Modeling_Process#stride
  4. https://attack.mitre.org/att&ck
  5. https://d3fend.mitre.org/
  6. https://fourcore.io/blogs/mitre-attack-mitre-defend-detection-engineering-threat-hunting
  7. https://cars.mclaren.com/us-en/legacy/mclaren-p1-gtr
  8. https://csrc.nist.gov/glossary/term/confidentiality
  9. https://csrc.nist.gov/glossary/term/integrity
  10. https://csrc.nist.gov/glossary/term/availability
  11. https://www.microsoft.com/licensing/docs/view/Service-Level-Agreements-SLA-for-Online-Services
  12. https://www.nytimes.com/2006/06/30/washington/va-laptop-is-recovered-its-data-intact.html
  13. https://cloudscaling.com/blog/cloud-computing/the-history-of-pets-vs-cattle/
  14. https://apps.dtic.mil/sti/tr/pdf/ADA221814.pdf

Transcripts https://docs.google.com/document/d/16upm5bKTsIkDo3s-mvUMlgkX1uqUKnUH

Chapters

  • 00:00 Introduction
  • 01:34 Cybersecurity Acronyms: Pre-1990s
  • 02:26 STRIDE and DREAD Models
  • 02:39 PICERL and MITRE Models
  • 05:04 Defining Cybersecurity
  • 07:52 CIA Triad and Its Importance
  • 09:00 Confidentiality, Integrity, and Availability
  • 11:52 The Parkerian Hexad
  • 17:30 D.I.E. Triad Concept
  • 24:28 Cybersecurity UPDATE
  • 24:51 Unchanging
  • 25:46 Perimeterizing
  • 29:36 Distributing
  • 29:50 Authenticating
  • 33:58 Tracing
  • 36:07 Ephemeralizing
  continue reading

182 episodes

Artwork
iconShare
 
Manage episode 398169692 series 2849492
Content provided by G Mark Hardy & Ross Young, G Mark Hardy, and Ross Young. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by G Mark Hardy & Ross Young, G Mark Hardy, and Ross Young or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

This video introduces a newly proposed acronym in the world of cybersecurity known as the 'Cyber UPDATE'. The acronym breaks down into Unchanging, Perimeterizing, Distributing, Authenticating and Authorizing, Tracing, and Ephemeralizing. The video aims to explain each component of the acronym and its significance in enhancing cybersecurity.

References:

  1. https://www.watchguard.com/wgrd-news/blog/decrypting-cybersecurity-acronyms-0
  2. https://computerhistory.org/profile/john-mccarthy/
  3. https://owasp.org/www-community/Threat_Modeling_Process#stride
  4. https://attack.mitre.org/att&ck
  5. https://d3fend.mitre.org/
  6. https://fourcore.io/blogs/mitre-attack-mitre-defend-detection-engineering-threat-hunting
  7. https://cars.mclaren.com/us-en/legacy/mclaren-p1-gtr
  8. https://csrc.nist.gov/glossary/term/confidentiality
  9. https://csrc.nist.gov/glossary/term/integrity
  10. https://csrc.nist.gov/glossary/term/availability
  11. https://www.microsoft.com/licensing/docs/view/Service-Level-Agreements-SLA-for-Online-Services
  12. https://www.nytimes.com/2006/06/30/washington/va-laptop-is-recovered-its-data-intact.html
  13. https://cloudscaling.com/blog/cloud-computing/the-history-of-pets-vs-cattle/
  14. https://apps.dtic.mil/sti/tr/pdf/ADA221814.pdf

Transcripts https://docs.google.com/document/d/16upm5bKTsIkDo3s-mvUMlgkX1uqUKnUH

Chapters

  • 00:00 Introduction
  • 01:34 Cybersecurity Acronyms: Pre-1990s
  • 02:26 STRIDE and DREAD Models
  • 02:39 PICERL and MITRE Models
  • 05:04 Defining Cybersecurity
  • 07:52 CIA Triad and Its Importance
  • 09:00 Confidentiality, Integrity, and Availability
  • 11:52 The Parkerian Hexad
  • 17:30 D.I.E. Triad Concept
  • 24:28 Cybersecurity UPDATE
  • 24:51 Unchanging
  • 25:46 Perimeterizing
  • 29:36 Distributing
  • 29:50 Authenticating
  • 33:58 Tracing
  • 36:07 Ephemeralizing
  continue reading

182 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide