RMF - Risk Management Framework : Every organization must adapt RMF for securing their IT infrastructure.
CONTROLLING Access: Control the ability to gain knowledge of the information the system contains or control system components and functions
STOPPING Active Attack: Stop actual assault perpetrated by an intentional threat source.
ENABLING Blacklist: Deny access to certain entities
ELIMINATION of Bots: Computers on internet that are compromised.
SECURING Critical Infrastructure: Classify and Secure Critical Infrastructure
CRYPTOGRAPHY: confidentiality, data integrity, entity authentication and data origin authentication.
MANAGING Cyber Space: Manage the interdependent network of Internet, telecommunications networks, computer systems and embedded processors and controllers.
ELIMINATION of Data Breach: Eliminate the unauthorized movement or disclosure of sensitive information to a party that is not authorized to have or see the information.
GATHERING Digital Forensics: Gather, retain and analyze system-related data (digital evidence) for investigative purposes.
ENTERPRISE Risk Management: Make decisions for managing risks that may hinder an organization's ability to achieve its objectives.
INFORMATION ASSURANCE : The measures that protect and defend information and information systems by ensuring their availability, integrity and confidentiality.
INTRUSION DETECTION: Information and Research to find out if security breach or security violation has occurred.
PREVENTING Malware: Software that compromises the operation of a system by performing an unauthorized function or process.
PENETRATION Testing: An evaluation methodology whereby assessors search for vulnerabilities and attempt to circumvent the security features of a network and/or information system.
PREVENTING Phishing: A digital form of social engineering to deceive individuals into providing sensitive information.
SOFTWARE ASSURANCE: The level of confidence that software is free from vulnerabilities
REMOVING Viruses: A computer program that can replicate itself, infect a computer without permission or knowledge of the user and then spread or propagate to another computer.
TRUSTING Whitelist: A list of entities that are considered trustworthy and are granted access or privileges.