لیست ۴۲ #آسیب_پذیری از ۱۸ تکنولوژی که گروههای هکری از آن ها برای initial access استفاده میکنند تا باج افزارهای خود را اجرا کنند.
👁 @intsec
#ransomware
👁 @intsec
#ransomware
#لیست آخرین استانداردهای مرتبط با کلود و رایانش ابری
☑️ ISO/IEC 17203:2017
Information technology — Open Virtualization Format (OVF) specification
☑️ ISO/IEC 17788:2014
Information technology — Cloud computing — Overview and vocabulary
☑️ ISO/IEC 17789:2014
Information technology — Cloud computing — Reference architecture
☑️ ISO/IEC 17826:2016
Information technology — Cloud Data Management Interface (CDMI)
☑️ ISO/IEC 18384-1:2016
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 1: Terminology and concepts for SOA
☑️ ISO/IEC 18384-2:2016
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 2: Reference Architecture for SOA Solutions
☑️ ISO/IEC 18384-3:2016
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 3: Service Oriented Architecture ontology
☑️ ISO/IEC 19086-1:2016
Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts
☑️ ISO/IEC 19086-2:2018
Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model
☑️ ISO/IEC 19086-3:2017
Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements
☑️ ISO/IEC 19086-4:2019
Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII
☑️ ISO/IEC 19941:2017
Information technology — Cloud computing — Interoperability and portability
☑️ ISO/IEC 19944:2017
Information technology — Cloud computing — Cloud services and devices: Data flow, data categories and data use
☑️ ISO/IEC 19944-1:2020
Cloud computing and distributed platforms ─ Data flow, data categories and data use — Part 1: Fundamentals
☑️ ISO/IEC DIS 19944-2
Cloud computing and distributed platforms — Data flow, data categories and data use — Part 2: Guidance on application and extensibility
☑️ ISO/IEC TR 22678:2019
Information technology — Cloud computing — Guidance for policy development
☑️ ISO/IEC TS 23167:2020
Information technology — Cloud computing — Common technologies and techniques
☑️ ISO/IEC TR 23186:2018
Information technology — Cloud computing — Framework of trust for processing of multi-sourced data
☑️ ISO/IEC 27017:2015
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
☑️ ISO/IEC 27018:2019
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
☑️ ISO/IEC 27036-1:2014
Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and concepts
☑️ ISO/IEC 27036-2:2014
Information technology — Security techniques — Information security for supplier relationships — Part 2: Requirements
☑️ ISO/IEC 27036-3:2013
Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security
☑️ ISO/IEC 27036-4:2016
Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services
☑️ ISO/IEC 27040:2015
Information technology — Security techniques — Storage security
☑️ ISO/IEC TR 30102:2012
Information technology — Distributed Application Platforms and Services (DAPS) — General technical principles of Service Oriented Architecture
👁 @intsec
#Cloud #Standard #ISO #Framework
☑️ ISO/IEC 17203:2017
Information technology — Open Virtualization Format (OVF) specification
☑️ ISO/IEC 17788:2014
Information technology — Cloud computing — Overview and vocabulary
☑️ ISO/IEC 17789:2014
Information technology — Cloud computing — Reference architecture
☑️ ISO/IEC 17826:2016
Information technology — Cloud Data Management Interface (CDMI)
☑️ ISO/IEC 18384-1:2016
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 1: Terminology and concepts for SOA
☑️ ISO/IEC 18384-2:2016
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 2: Reference Architecture for SOA Solutions
☑️ ISO/IEC 18384-3:2016
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 3: Service Oriented Architecture ontology
☑️ ISO/IEC 19086-1:2016
Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts
☑️ ISO/IEC 19086-2:2018
Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model
☑️ ISO/IEC 19086-3:2017
Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements
☑️ ISO/IEC 19086-4:2019
Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII
☑️ ISO/IEC 19941:2017
Information technology — Cloud computing — Interoperability and portability
☑️ ISO/IEC 19944:2017
Information technology — Cloud computing — Cloud services and devices: Data flow, data categories and data use
☑️ ISO/IEC 19944-1:2020
Cloud computing and distributed platforms ─ Data flow, data categories and data use — Part 1: Fundamentals
☑️ ISO/IEC DIS 19944-2
Cloud computing and distributed platforms — Data flow, data categories and data use — Part 2: Guidance on application and extensibility
☑️ ISO/IEC TR 22678:2019
Information technology — Cloud computing — Guidance for policy development
☑️ ISO/IEC TS 23167:2020
Information technology — Cloud computing — Common technologies and techniques
☑️ ISO/IEC TR 23186:2018
Information technology — Cloud computing — Framework of trust for processing of multi-sourced data
☑️ ISO/IEC 27017:2015
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
☑️ ISO/IEC 27018:2019
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
☑️ ISO/IEC 27036-1:2014
Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and concepts
☑️ ISO/IEC 27036-2:2014
Information technology — Security techniques — Information security for supplier relationships — Part 2: Requirements
☑️ ISO/IEC 27036-3:2013
Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security
☑️ ISO/IEC 27036-4:2016
Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services
☑️ ISO/IEC 27040:2015
Information technology — Security techniques — Storage security
☑️ ISO/IEC TR 30102:2012
Information technology — Distributed Application Platforms and Services (DAPS) — General technical principles of Service Oriented Architecture
👁 @intsec
#Cloud #Standard #ISO #Framework
HackerSploit_DockerSecurity.pdf
2 MB
Title: An In-Depth Guide to Mobile Device #Forensics
Year: 2021
Author(s): Chuck Easttom
Publisher: CRC Press
Language: English
Pages: 249
👁 @intsec
#CT #Book
Year: 2021
Author(s): Chuck Easttom
Publisher: CRC Press
Language: English
Pages: 249
👁 @intsec
#CT #Book
D-STR-CYB_GUIDE.01-2018-PDF-E.pdf
950.3 KB
آيين_نامه_پيشـنهادی_نظـارت_پارلمـان_و_شـورای_اروپـا_بـر_رمزدارايی.pdf
1.6 MB
آييننامه پيشنهادی نظارت پارلمان و شـورای اروپا بر رمزدارايیها و اصلاحيه دستورالعمل (EU) 1937/2019 توسط مرکز ملی فضای مجازی ترجمه و منتشر شد.
👁 @intsec
👁 @intsec