<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>lingo Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/infosec-glossary/category/lingo/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/infosec-glossary/category/lingo</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Mon, 12 May 2025 19:13:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>lingo Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/infosec-glossary/category/lingo</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CTL</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/ctl</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/ctl#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 12 May 2025 19:13:10 +0000</pubDate>
				<category><![CDATA[lingo]]></category>
		<category><![CDATA[threat hunting]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[threat modeling]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1469</guid>

					<description><![CDATA[<p>CTL: Cyber Threat Landscape The Cyber Threat Landscape refers to the overall environment of potential cyber threats and vulnerabilities that organizations face in the digital world. It encompasses a wide range of malicious activities, including hacking, phishing, malware, ransomware, and other forms of cyberattacks that can compromise the confidentiality, integrity, and availability of information systems [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/ctl">CTL</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/ctl/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CTF</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/ctf</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/ctf#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 05 Mar 2025 19:01:31 +0000</pubDate>
				<category><![CDATA[lingo]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[career hacking]]></category>
		<category><![CDATA[learning]]></category>
		<category><![CDATA[simulation]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1596</guid>

					<description><![CDATA[<p>CTF: Capture The Flag Capture The Flag (CTF) is a popular cybersecurity competition format that challenges participants to solve a series of security-related tasks in order to find hidden &#34;flags.&#34; These flags are typically strings of text that serve as proof of completion for each task. CTF competitions can vary in format, ranging from individual [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/ctf">CTF</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/ctf/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CISSP</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/cissp</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/cissp#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sun, 23 Feb 2025 11:35:55 +0000</pubDate>
				<category><![CDATA[lingo]]></category>
		<category><![CDATA[career hacking]]></category>
		<category><![CDATA[certification]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1582</guid>

					<description><![CDATA[<p>CISSP : Certified Information Systems Security Professional The Certified Information Systems Security Professional (CISSP) is a globally recognized certification by ISC2 in the field of information security. It is designed for IT professionals who want to demonstrate their knowledge and skills in managing and implementing information security programs. The certification covers a broad range of [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/cissp">CISSP</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/cissp/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDC</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/cdc</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/cdc#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 19 Feb 2025 16:21:34 +0000</pubDate>
				<category><![CDATA[lingo]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[intrusion detection]]></category>
		<category><![CDATA[organization]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1578</guid>

					<description><![CDATA[<p>CDC: Cyber Defense Center A Cyber Defense Center (CDC) is a dedicated facility or team within an organization that focuses on protecting the organization&#8217;s information systems and data from cyber threats. The primary role of a CDC is to monitor, detect, analyze, and respond to cybersecurity incidents and vulnerabilities. This includes implementing security measures, conducting [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/cdc">CDC</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/cdc/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>XOR</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/xor</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/xor#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 19 Feb 2025 16:02:19 +0000</pubDate>
				<category><![CDATA[lingo]]></category>
		<category><![CDATA[cryptography]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1684</guid>

					<description><![CDATA[<p>XOR: eXclusive OR XOR, short for exclusive OR, is a logical operation that takes two binary inputs and returns true if and only if one of the inputs is true, but not both. In other words, if one input is 1 (true) and the other is 0 (false), the output will be 1. However, if [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/xor">XOR</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/xor/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>COA</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/coa</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/coa#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sat, 05 Oct 2024 07:54:34 +0000</pubDate>
				<category><![CDATA[lingo]]></category>
		<category><![CDATA[threat hunting]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1465</guid>

					<description><![CDATA[<p>COA: Course Of Action A Course of Action (COA) is a strategy or plan that outlines specific steps to be taken in response to a particular situation or incident. In the context of cybersecurity, COAs are developed to address security incidents, mitigate risks, and enhance overall security posture. By establishing clear COAs, organizations can improve [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/coa">COA</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/coa/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ICT</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/ict</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/ict#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 24 Apr 2024 17:07:30 +0000</pubDate>
				<category><![CDATA[lingo]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1400</guid>

					<description><![CDATA[<p>ICT: Information and Communications Technology [&#8230;] is the infrastructure and components that enable modern computing. Among the goals of IC technologies, tools and systems is to improve the way humans create, process and share data or information with each other. https://www.techtarget.com/searchcio/definition/ICT-information-and-communications-technology-or-technologies ICT: Information and Communications Technology [&#8230;] is the infrastructure and components that enable modern [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/ict">ICT</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/ict/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ISAM</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/isam</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/isam#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 24 Apr 2024 17:00:23 +0000</pubDate>
				<category><![CDATA[lingo]]></category>
		<category><![CDATA[awareness training]]></category>
		<category><![CDATA[security awareness]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1396</guid>

					<description><![CDATA[<p>ISAM: Information Security Awareness Maturity ISAM: Information Security Awareness Maturity</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/isam">ISAM</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/isam/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ISAT</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/isat</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/isat#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 24 Apr 2024 16:59:31 +0000</pubDate>
				<category><![CDATA[lingo]]></category>
		<category><![CDATA[awareness training]]></category>
		<category><![CDATA[security awareness]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1394</guid>

					<description><![CDATA[<p>ISAT: Information Security Awareness Training ISAT: Information Security Awareness Training</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/isat">ISAT</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/isat/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SIRP</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/sirp</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/sirp#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 09 Apr 2024 17:17:40 +0000</pubDate>
				<category><![CDATA[lingo]]></category>
		<category><![CDATA[incident response]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1386</guid>

					<description><![CDATA[<p>SIRP: Security Incident Response Process SIRP: Security Incident Response Process</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/sirp">SIRP</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/sirp/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
