Domain 7 links:
- Internal control https://en.wikipedia.org/wiki/Internal_control
- ISO/IEC 27031 Guidelines http:https:https://www.iso27001security.com/html/27031.html
- NIST SP 800-34 Rev. 1 https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-34r1.pdf
- NIST SP 800-92 https://en.wikipedia.org/wiki/NIST_Special_Publication_800-92
- Change Management https://en.wikipedia.org/wiki/Change_management
- NIST Publications https://www.nist.gov/publications
- NIST SP 800-128 https://csrc.nist.gov/publications/detail/sp/800-128/final
- Fire Sprinkler System https://en.wikipedia.org/wiki/Fire_sprinkler_system
- Physical Information Security https://en.wikipedia.org/wiki/Physical_information_security
- AI in Security https://en.wikipedia.org/wiki/Applications_of_artificial_intelligence#Cyber_security
- Antivirus software https://en.wikipedia.org/wiki/Antivirus_software
- Application Positive-listing https://en.wikipedia.org/wiki/Whitelist
- Configuration Management https://en.wikipedia.org/wiki/Configuration_management
- Endpoint Security https://en.wikipedia.org/wiki/Endpoint_security
- Keystroke Logging https://en.wikipedia.org/wiki/Keystroke_logging
- Logging and Monitoring https://en.wikipedia.org/wiki/Log_management
- Patch Management https://en.wikipedia.org/wiki/Patch_(computing)
- Sandboxing https://en.wikipedia.org/wiki/Sandbox_(computer_security)
- Security Tools http:https:https://sectools.org/
- SIEM Article https://www.experts-exchange.com/articles/32316/What-Gives-SIEM-a-Good-Name.html
- Software deployment https://en.wikipedia.org/wiki/Software_deployment
- Artificial Intelligence (AI) https://en.wikipedia.org/wiki/Artificial_intelligence
- Managed security service https://en.wikipedia.org/wiki/Managed_security_service
- Managed Services https://en.wikipedia.org/wiki/Managed_services
- Backup Site https://en.wikipedia.org/wiki/Backup_site
- Backups https://en.wikipedia.org/wiki/Backup
- Computer Security Incident Management https://en.wikipedia.org/wiki/Computer_security_incident_management
- Crisis Management https://en.wikipedia.org/wiki/Crisis_management
- Disaster Recovery https://en.wikipedia.org/wiki/Disaster_recovery
- Disaster Recovery Plan https://en.wikipedia.org/wiki/Disaster_recovery_plan
- Disaster Recovery Solution Design https://www.experts-exchange.com/articles/33009/Disaster-Recovery-Solution-Design.html
- Emergency Management https://en.wikipedia.org/wiki/Emergency_management
- Emergency Operations Center https://en.wikipedia.org/wiki/Emergency_operations_center
- FEMA COOP Planning Template https://www.fema.gov/sites/default/files/2020-10/fema_planning-template-federal-departments-agencies_october-2020_0.pdf
- Incident Management https://en.wikipedia.org/wiki/Incident_management
- Post-Disaster Recovery Planning Forum Notes https://www.weather.gov/nthmp/Minutes/oct-nov07/post-disaster_recovery_planning_forum_uo-csc-2.pdf
- Recovery Time Objective (RTO) https://en.wikipedia.org/wiki/Recovery_time_objective
- Redundancy https://en.wikipedia.org/wiki/Redundancy_(engineering)
- System Resilience https://en.wikipedia.org/wiki/High_availability#Resilience
- Honeynets/Honeypots https://en.wikipedia.org/wiki/Honeypot_(computing)
- Malware https://en.wikipedia.org/wiki/Malware
- Incident Handling and Response Plan https://www.experts-exchange.com/articles/31763/Incident-Handling-and-Response-Plan.html
- Phishing https://en.wikipedia.org/wiki/Phishing
- Ransomware https://en.wikipedia.org/wiki/Ransomware
- Security information and event management (SIEM) https://en.wikipedia.org/wiki/Security_information_and_event_management
- Security orchestration, automation and response (SOAR) https://en.wikipedia.org/wiki/Security_orchestration
- Chain of custody https://en.wikipedia.org/wiki/Chain_of_custody
- Computer forensics https://en.wikipedia.org/wiki/Computer_forensics
- Digital Forensics https://en.wikipedia.org/wiki/Digital_forensics
- Digital Forensics Tools https://en.wikipedia.org/wiki/List_of_digital_forensics_tools
- Evidence Artifacts https://en.wikipedia.org/wiki/Digital_artifact
- Service-level Agreements https://en.wikipedia.org/wiki/Service-level_agreement
- Threat Intelligence https://en.wikipedia.org/wiki/Cyber_threat_intelligence
- User and entity behavior analytics (UEBA) https://en.wikipedia.org/wiki/User_behavior_analytics
- Mean Time Between Failures (MTBF) https://en.wikipedia.org/wiki/Mean_time_between_failures
- Mean Time To Repair (MTTR) https://en.wikipedia.org/wiki/Mean_time_to_repair
- Performance Indicator https://en.wikipedia.org/wiki/Performance_indicator
- Performance indicator KPI https://en.wikipedia.org/wiki/Performance_indicator#Key_performance_indicator
- RAID https://en.wikipedia.org/wiki/RAID
- Supercomputer https://en.wikipedia.org/wiki/Supercomputer
