<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>infosec glossary Archive - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/infosec-glossary/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/infosec-encyclopedia</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Fri, 30 Jan 2026 16:47:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>infosec glossary Archive - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/infosec-encyclopedia</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>TPRM</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/tprm</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/tprm#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Fri, 30 Jan 2026 16:47:04 +0000</pubDate>
				<category><![CDATA[policies, laws, regulations]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[supply chain]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1766</guid>

					<description><![CDATA[<p>TPRM : Third Party Risk Managemenet Third Party Risk Management (TPRM) refers to the structured process organizations use to identify, assess, monitor, and mitigate risks arising from relationships with external vendors, suppliers, service providers, and other third parties. These risks can include cybersecurity, data protection, compliance, operational resilience, financial stability, and reputational impact. Effective TPRM [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/tprm">TPRM</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/tprm/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CTL</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/ctl</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/ctl#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 12 May 2025 19:13:10 +0000</pubDate>
				<category><![CDATA[lingo]]></category>
		<category><![CDATA[threat hunting]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[threat modeling]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1469</guid>

					<description><![CDATA[<p>CTL: Cyber Threat Landscape The Cyber Threat Landscape refers to the overall environment of potential cyber threats and vulnerabilities that organizations face in the digital world. It encompasses a wide range of malicious activities, including hacking, phishing, malware, ransomware, and other forms of cyberattacks that can compromise the confidentiality, integrity, and availability of information systems [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/ctl">CTL</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/ctl/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DPI</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/dpi</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/dpi#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 12 May 2025 19:06:34 +0000</pubDate>
				<category><![CDATA[networking]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[Network+]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1750</guid>

					<description><![CDATA[<p>DPI: Deep Packet Inspection Deep Packet Inspection (DPI) is a network management technology that analyzes the data packets transmitted over a network. Unlike traditional packet filtering methods that only examine the header of a packet, DPI inspects the entire packet, including the payload, which contains the actual data being transmitted. This allows network administrators to [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/dpi">DPI</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/dpi/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>BCDR</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/bcdr</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/bcdr#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Fri, 28 Mar 2025 12:01:53 +0000</pubDate>
				<category><![CDATA[principles, frameworks and best practices]]></category>
		<category><![CDATA[business continuity]]></category>
		<category><![CDATA[desaster recovery]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1740</guid>

					<description><![CDATA[<p>BCDR: Business Continuity and Disaster Recovery BCDR refers to the strategies and processes that organizations put in place to ensure that critical business functions can continue during and after a disruptive event, such as natural disasters, cyber-attacks, or system failures. Business Continuity (BC) focuses on maintaining essential operations and services during such disruptions, while Disaster [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/bcdr">BCDR</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/bcdr/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>RDAP</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/rdap</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/rdap#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sun, 23 Mar 2025 22:18:55 +0000</pubDate>
				<category><![CDATA[networking]]></category>
		<category><![CDATA[domain]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[standard]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1734</guid>

					<description><![CDATA[<p>RDAP: Registration Data Access Protocol The Registration Data Access Protocol (RDAP) is a protocol used to access registration data for domain names and IP addresses in a more secure and structured manner compared to its predecessor, the WHOIS protocol. RDAP provides a standardized way to retrieve information about domain name registrations, including details such as [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/rdap">RDAP</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/rdap/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CTF</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/ctf</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/ctf#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 05 Mar 2025 19:01:31 +0000</pubDate>
				<category><![CDATA[lingo]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[career hacking]]></category>
		<category><![CDATA[learning]]></category>
		<category><![CDATA[simulation]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1596</guid>

					<description><![CDATA[<p>CTF: Capture The Flag Capture The Flag (CTF) is a popular cybersecurity competition format that challenges participants to solve a series of security-related tasks in order to find hidden &#34;flags.&#34; These flags are typically strings of text that serve as proof of completion for each task. CTF competitions can vary in format, ranging from individual [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/ctf">CTF</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/ctf/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CPTED</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/cpted</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/cpted#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 24 Feb 2025 18:21:44 +0000</pubDate>
				<category><![CDATA[principles, frameworks and best practices]]></category>
		<category><![CDATA[physical security]]></category>
		<category><![CDATA[prevention]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1444</guid>

					<description><![CDATA[<p>CPTED: Crime Prevention Through Environmental Design Crime Prevention Through Environmental Design (CPTED) is a strategy that aims to deter criminal behavior by modifying the physical environment. CPTED principles focus on designing spaces that enhance visibility, accessibility, and natural surveillance, thereby reducing opportunities for crime. By implementing CPTED strategies, organizations can enhance security and create safer [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/cpted">CPTED</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/cpted/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CORS</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/cors</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/cors#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 24 Feb 2025 18:07:25 +0000</pubDate>
				<category><![CDATA[vulnerabilities, threats, attacks and countermeasures]]></category>
		<category><![CDATA[webapp]]></category>
		<category><![CDATA[websec]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1564</guid>

					<description><![CDATA[<p>CORS : Cross Origin Resource Sharing CORS, or Cross-Origin Resource Sharing, is a security feature implemented in web browsers that allows or restricts web applications running at one origin (domain) to make requests to resources hosted on a different origin. This is crucial for maintaining the security of web applications, as it prevents malicious sites [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/cors">CORS</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/cors/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CNAPP</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/cnapp</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/cnapp#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sun, 23 Feb 2025 11:45:22 +0000</pubDate>
				<category><![CDATA[vulnerabilities, threats, attacks and countermeasures]]></category>
		<category><![CDATA[cloud security]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1541</guid>

					<description><![CDATA[<p>CNAPP : Cloud Native Application Protection Platform A Cloud-Native Application Protection Platform (CNAPP) is a comprehensive security solution designed to protect applications built and deployed in cloud environments. It combines various security capabilities, including vulnerability management, compliance monitoring, and runtime protection, into a single platform to secure the entire application lifecycle — from development to [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/cnapp">CNAPP</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/cnapp/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CISSP</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/cissp</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/cissp#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sun, 23 Feb 2025 11:35:55 +0000</pubDate>
				<category><![CDATA[lingo]]></category>
		<category><![CDATA[career hacking]]></category>
		<category><![CDATA[certification]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1582</guid>

					<description><![CDATA[<p>CISSP : Certified Information Systems Security Professional The Certified Information Systems Security Professional (CISSP) is a globally recognized certification by ISC2 in the field of information security. It is designed for IT professionals who want to demonstrate their knowledge and skills in managing and implementing information security programs. The certification covers a broad range of [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/cissp">CISSP</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/cissp/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
