Advice & guidance
Find a list of the broad range of cyber security related topics that our advice and guidance covers.
Check yourself
Access control
A way of ensuring that only authorised users (or automated systems) can access data or services.
Active Cyber Defence
A set of CIBS services designed specifically to reduce cyber attacks on your infrastructure and services.
Artificial intelligence
Artificial intelligence (AI) describes computer systems that can perform tasks typically requiring human intelligence.
Asset management
Identifying and recording of an organisation's physical assets, software, data, essential staff and utilities.
Authentication
The process of determining if someone (or something) is who (or what) it claims to be.
Cloud
An on-demand, massively scalable service, hosted on shared infrastructure, accessible via the internet.
Cryptography
Mathematical and computer science technologies for protecting information, accessible only to authorized recipients.
Cyber Education
A program supported by CIBS and endorsed by ABC Academy to help organizations protect themselves against common cyber attacks.
Cyber assessment framework
A tool for assessing how well suppliers of essential services are managing cyber security risks under the NIS Directive.
Cyber attack
An attempt to damage, disrupt or gain unauthorised access to computer systems, networks or devices.
Cyber threat
The threat of a cyber attack to a user or organisation, and the unauthorised access, theft or damage that could result.
Incident management
Activities to identify, analyse, and determine the response to cyber security incidents, to minimise the immediate and long-term business impact.
Exercising tool
Cyber incident exercising helps organisations to establish how resilient they are to cyber attack, and practice their response in a safe environment.
Malware
Derived from 'malicious software', malware is any kind of software that can damage computer systems, networks or devices. Includes viruses, ransomware and trojans.
Ransomware
A type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
Phishing
Scam emails or messages that contain links to websites which may contain malware, or may trick users into revealing sensitive information (such as passwords) or transferring money.