<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>principles, frameworks and best practices Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/infosec-glossary/category/principles-frameworks-and-best-practices/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/infosec-glossary/category/principles-frameworks-and-best-practices</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Fri, 28 Mar 2025 12:01:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>principles, frameworks and best practices Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/infosec-glossary/category/principles-frameworks-and-best-practices</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>BCDR</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/bcdr</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/bcdr#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Fri, 28 Mar 2025 12:01:53 +0000</pubDate>
				<category><![CDATA[principles, frameworks and best practices]]></category>
		<category><![CDATA[business continuity]]></category>
		<category><![CDATA[desaster recovery]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1740</guid>

					<description><![CDATA[<p>BCDR: Business Continuity and Disaster Recovery BCDR refers to the strategies and processes that organizations put in place to ensure that critical business functions can continue during and after a disruptive event, such as natural disasters, cyber-attacks, or system failures. Business Continuity (BC) focuses on maintaining essential operations and services during such disruptions, while Disaster [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/bcdr">BCDR</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/bcdr/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CPTED</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/cpted</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/cpted#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 24 Feb 2025 18:21:44 +0000</pubDate>
				<category><![CDATA[principles, frameworks and best practices]]></category>
		<category><![CDATA[physical security]]></category>
		<category><![CDATA[prevention]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1444</guid>

					<description><![CDATA[<p>CPTED: Crime Prevention Through Environmental Design Crime Prevention Through Environmental Design (CPTED) is a strategy that aims to deter criminal behavior by modifying the physical environment. CPTED principles focus on designing spaces that enhance visibility, accessibility, and natural surveillance, thereby reducing opportunities for crime. By implementing CPTED strategies, organizations can enhance security and create safer [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/cpted">CPTED</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/cpted/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CIA</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/cia</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/cia#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sat, 22 Feb 2025 23:31:49 +0000</pubDate>
				<category><![CDATA[principles, frameworks and best practices]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1586</guid>

					<description><![CDATA[<p>CIA : Confidentiality Integrity Availability The CIA triad represents the three core principles of information security: Confidentiality, Integrity, and Availability. Confidentiality ensures that sensitive information is accessible only to authorized users, protecting it from unauthorized access. Integrity refers to the accuracy and reliability of data, ensuring that it is not altered or tampered with. Availability [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/cia">CIA</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/cia/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CCB</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/ccb</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/ccb#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 19 Feb 2025 16:12:15 +0000</pubDate>
				<category><![CDATA[principles, frameworks and best practices]]></category>
		<category><![CDATA[ITIL]]></category>
		<category><![CDATA[itsm]]></category>
		<category><![CDATA[organization]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1438</guid>

					<description><![CDATA[<p>CCB: Configuration Control Board A Configuration Control Board (CCB) is a group of individuals responsible for overseeing and managing changes to a project or system&#8217;s configuration. This typically includes evaluating, approving, or rejecting proposed changes to ensure that all modifications are aligned with project goals and do not negatively impact system performance or security. The [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/ccb">CCB</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/ccb/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>BCP</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/bcp</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/bcp#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 19 Feb 2025 09:56:08 +0000</pubDate>
				<category><![CDATA[principles, frameworks and best practices]]></category>
		<category><![CDATA[business continuity]]></category>
		<category><![CDATA[desaster recovery]]></category>
		<category><![CDATA[incident response]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1584</guid>

					<description><![CDATA[<p>BCP : Business Continuity Plan A Business Continuity Plan (BCP) is a documented strategy that outlines how an organization will continue its essential functions during and after a disruptive event. The BCP includes procedures for responding to emergencies, recovering critical operations, and protecting vital resources. It is a crucial component of Business Continuity Management (BCM) [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/bcp">BCP</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/bcp/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OSC&#038;R</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/oscr</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/oscr#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 19 Feb 2025 07:57:29 +0000</pubDate>
				<category><![CDATA[principles, frameworks and best practices]]></category>
		<category><![CDATA[devsec]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[supply chain]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1640</guid>

					<description><![CDATA[<p>OSC&#38;R : Open Software supply Chain attack Reference [&#8230;] is an open framework that provides a comprehensive, systematic and actionable way to understand attacker behaviors and techniques. Like MITRE ATT&#38;CK, OSC&#38;R is organized into a clear and structured view of the tactics, techniques, and procedures (TTPs) used by adversaries. However, OSC&#38;R is the first and [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/oscr">OSC&#038;R</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/oscr/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OTP</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/otp</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/otp#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 18 Feb 2025 18:49:00 +0000</pubDate>
				<category><![CDATA[principles, frameworks and best practices]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[identity management]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1566</guid>

					<description><![CDATA[<p>OTP: One-Time Password An One-Time Password (OTP) is a unique code that is generated for a single use, providing an additional layer of security during authentication processes. OTPs are typically used in conjunction with traditional passwords to implement a stronger security measure known as Two-Factor Authentication (2FA). When logging into an account or system, a [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/otp">OTP</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/otp/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ISAC</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/isac</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/isac#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sat, 05 Oct 2024 08:01:21 +0000</pubDate>
				<category><![CDATA[principles, frameworks and best practices]]></category>
		<category><![CDATA[threat hunting]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1467</guid>

					<description><![CDATA[<p>ISAC: Information Sharing and Analysis Center [&#8230;] non-profit organizations that provide a central resource for gathering information on cyber threats (in many cases to critical infrastructure) as well as allow two-way sharing of information between the private and the public sector about root causes, incidents and threats, as well as sharing experience, knowledge and analysis. [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/isac">ISAC</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/isac/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MAO</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/mao</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/mao#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 10 Jun 2024 11:33:54 +0000</pubDate>
				<category><![CDATA[principles, frameworks and best practices]]></category>
		<category><![CDATA[business continuity]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1428</guid>

					<description><![CDATA[<p>MAO: Maximum Allowable Outage see MTD MAO: Maximum Allowable Outage see MTD</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/mao">MAO</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/mao/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MAD</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/mad</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/mad#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 10 Jun 2024 11:33:09 +0000</pubDate>
				<category><![CDATA[principles, frameworks and best practices]]></category>
		<category><![CDATA[business continuity]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1426</guid>

					<description><![CDATA[<p>MAD: Maximum Allowable Downtime see MTD MAD: Maximum Allowable Downtime see MTD</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/mad">MAD</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/mad/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
