Categories
From GCA ACT
Jump to navigationJump to search
The following categories exist on the wiki, and may or may not be unused. Also see wanted categories.
- Public Health Information Management (0 members)
- Public Research Organization (3 members)
- Public Sector AI (1 member)
- Qatar (3 members)
- RC.CO-1: Public relations are managed (1 member)
- RC.CO-2: Reputation is repaired after an incident (1 member)
- RC.CO-3: Recovery activities are communicated to internal and external stakeholders as well as executive and management teams (1 member)
- RC.IM-1: Recovery plans incorporate lessons learned (1 member)
- RC.IM-2: Recovery strategies are updated (1 member)
- RC.RP-1: Recovery plan is executed during or after a cybersecurity incident (1 member)
- RECOVER (RC) (3 members)
- RESPOND (RS) (5 members)
- RS.AN-1: Notifications from detection systems are investigated (1 member)
- RS.AN-2: The impact of the incident is understood (1 member)
- RS.AN-3: Forensics are performed (1 member)
- RS.AN-4: Incidents are categorized consistent with response plans (1 member)
- RS.AN-5: Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers) (1 member)
- RS.CO-1: Personnel know their roles and order of operations when a response is needed (1 member)
- RS.CO-2: Incidents are reported consistent with established criteria (1 member)
- RS.CO-3: Information is shared consistent with response plans (1 member)
- RS.CO-4: Coordination with stakeholders occurs consistent with response plans (1 member)
- RS.CO-5: Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness (1 member)
- RS.IM-1: Response plans incorporate lessons learned (1 member)
- RS.IM-2: Response strategies are updated (1 member)
- RS.MI-1: Incidents are contained (1 member)
- RS.MI-2: Incidents are mitigated (1 member)
- RS.MI-3: Newly identified vulnerabilities are mitigated or documented as accepted risks (1 member)
- RS.RP-1: Response plan is executed during or after an incident (1 member)
- Ransomeware (5 members)
- Ransomware (1 member)
- Real-Time Data (2 members)
- Recognising Untrustworthy or Inappropriate Applications (16 members)
- Recovery (7 members)
- Recovery Planning (RC.RP) (1 member)
- Registrars & Registries (2 members)
- Registrars and Registries (3 members)
- Regular Audits and Assessments (2 members)
- Regular Software Updates (1 member)
- Regulatory Compliance (1 member)
- Reliability - AI (1 member)
- Remote Access (5 members)
- Removing Data from the Internet (1 member)
- Removing Your Data from the Internet or Devices (6 members)
- Reporting (1 member)
- Reporting Cyber-Related Fraud, Criminal, and Data Breach Activity (1 member)
- Reporting Mechanisms (1 member)
- Reputational (15 members)
- Research, Innovation, and Collaboration (118 members)
- Research & Standards - T3C (50 members)
- Researchers (5 members)