Cybersecurity Ontology Shield Cybersecurity Ontology

Category: SecurityMechanism

Browsing 42 concepts

Found 42 matches
1Password preferred
SecurityMechanism

A password manager.

SecurityMechanism

A list of permissions attached to an object.

SecurityMechanism

An approach to security where only approved applications are allowed to run.

Argon2 preferred
SecurityMechanism

A key derivation function that was selected as the winner of the Password Hashing Competition.

SecurityMechanism

The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization's risk strategy.

Authy preferred
SecurityMechanism

A mobile app for two-factor authentication.

SecurityMechanism

Microsoft's cloud-based identity and access management service.

Bcrypt preferred
SecurityMechanism

A password-hashing function based on the Blowfish cipher.

Bitwarden preferred
SecurityMechanism

A free and open-source password management service.

Consequence preferred
SecurityMechanism

The outcome of an attack (e.g., Confidentiality Loss, Integrity Loss).

Data Security preferred
SecurityMechanism

Information and records (data) are managed consistent with the organization's risk strategy to protect the confidentiality, integrity, and availability of information.

SecurityMechanism

A defense strategy that uses multiple security measures to protect the integrity of information.

Detect (DE) preferred
SecurityMechanism

The Detect function defines the appropriate activities to identify the occurrence of a cybersecurity event.

SecurityMechanism

Cloud computing and backup service model that uses cloud resources to protect applications and data from disruption caused by disaster.

SecurityMechanism

An internal control or process that validates the integrity of operating system and application software files.

Govern (GV) preferred
SecurityMechanism

The Govern function provides high-level oversight and ensures that the organization's cybersecurity risk management strategy is established, communicated, and monitored.

Hashcat preferred
SecurityMechanism

A password recovery tool.

SecurityMechanism

A specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key.

Identify (ID) preferred
SecurityMechanism

The Identify function assists in developing an organizational understanding to managing cybersecurity risk to systems, people, assets, data, and capabilities.

SecurityMechanism

Access to physical and logical assets and associated facilities is limited to authorized users, processes, and devices, and is managed consistent with the assessed risk of unauthorized access.

SecurityMechanism

A free password cracking software tool.

KeePass preferred
SecurityMechanism

A free and open-source password manager.

SecurityMechanism

Techniques used to make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack.

LastPass preferred
SecurityMechanism

A freemium password manager.

SecurityMechanism

The principle that a security architecture should be designed so that each entity must be granted the minimum system resources and authorizations that the entity needs to perform its function.

SecurityMechanism

Authentication method requiring two or more verification factors.

SecurityMechanism

An authentication method that requires two or more verification factors.

Password Hash preferred
SecurityMechanism

A scrambled representation of a password.

SecurityMechanism

The process of applying updates to software applications to fix vulnerabilities.

SecurityMechanism

A key derivation function that applies a pseudorandom function to the input password or passphrase along with a salt value and repeats the process many times.

SecurityMechanism

An encryption program that provides cryptographic privacy and authentication for data communication.

SecurityMechanism

A set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates.

SecurityMechanism

Technical and legal aspects of privacy protection.

Protect (PR) preferred
SecurityMechanism

The Protect function outlines appropriate safeguards to ensure delivery of critical infrastructure services.

Recover (RC) preferred
SecurityMechanism

The Recover function identifies appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident.

Red Team preferred
SecurityMechanism

A group that plays the role of an enemy or competitor to provide security feedback.

Respond (RS) preferred
SecurityMechanism

The Respond function includes appropriate activities to take action regarding a detected cybersecurity incident.

Salting preferred
SecurityMechanism

Random data that is used as an additional input to a one-way function that hashes data, a password or passphrase.

Scrypt preferred
SecurityMechanism

A password-based key derivation function.

SecurityMechanism

The process of identifying, assessing, and mitigating the risks associated with the distributed and interconnected nature of IT product and service supply chains.

Test-Firewall preferred
SecurityMechanism

A test firewall.

SecurityMechanism

A method of confirming a user's claimed identity by using a combination of two different pieces of evidence.