{"id":14045,"date":"2024-10-24T05:49:10","date_gmt":"2024-10-24T10:49:10","guid":{"rendered":"https:\/\/ndisac.org\/dibscc\/?page_id=14045"},"modified":"2025-03-14T12:54:09","modified_gmt":"2025-03-14T17:54:09","slug":"cybersecurity-fundamentals","status":"publish","type":"page","link":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/cybersecurity-fundamentals\/","title":{"rendered":"Cybersecurity Fundamentals"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; module_class=&#8221;banner-block&#8221; _builder_version=&#8221;4.0.4&#8243; height=&#8221;250px&#8221;][et_pb_fullwidth_header title=&#8221;Cybersecurity Fundamentals&#8221; module_id=&#8221;Aboutpg&#8221; _builder_version=&#8221;4.9.2&#8243; title_font=&#8221;Muli|800|||||||&#8221; title_text_color=&#8221;#ffffff&#8221; title_font_size=&#8221;48px&#8221; content_font=&#8221;Muli||||||||&#8221; content_text_color=&#8221;#ffffff&#8221; content_font_size=&#8221;23px&#8221; subhead_text_color=&#8221;#ffffff&#8221; background_color=&#8221;rgba(255, 255, 255, 0)&#8221; background_image=&#8221;https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/dibscc-home.jpg&#8221; background_layout=&#8221;light&#8221; height=&#8221;250px&#8221; custom_padding=&#8221;5%||10%||false|false&#8221; z_index_tablet=&#8221;500&#8243; title_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; title_text_shadow_vertical_length_tablet=&#8221;0px&#8221; title_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_text_shadow_blur_strength_tablet=&#8221;1px&#8221; subhead_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; subhead_text_shadow_vertical_length_tablet=&#8221;0px&#8221; subhead_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; button_one_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; button_one_text_shadow_vertical_length_tablet=&#8221;0px&#8221; button_one_text_shadow_blur_strength_tablet=&#8221;1px&#8221; button_two_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; button_two_text_shadow_vertical_length_tablet=&#8221;0px&#8221; button_two_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; box_shadow_horizontal_image_tablet=&#8221;0px&#8221; box_shadow_vertical_image_tablet=&#8221;0px&#8221; box_shadow_blur_image_tablet=&#8221;40px&#8221; box_shadow_spread_image_tablet=&#8221;0px&#8221; box_shadow_horizontal_button_one_tablet=&#8221;0px&#8221; box_shadow_vertical_button_one_tablet=&#8221;0px&#8221; box_shadow_blur_button_one_tablet=&#8221;40px&#8221; box_shadow_spread_button_one_tablet=&#8221;0px&#8221; box_shadow_horizontal_button_two_tablet=&#8221;0px&#8221; box_shadow_vertical_button_two_tablet=&#8221;0px&#8221; box_shadow_blur_button_two_tablet=&#8221;40px&#8221; box_shadow_spread_button_two_tablet=&#8221;0px&#8221; text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_shadow_blur_strength_tablet=&#8221;1px&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover=&#8221;null&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover=&#8221;null&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover=&#8221;null&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover=&#8221;null&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover=&#8221;null&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover=&#8221;null&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover=&#8221;null&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover=&#8221;null&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover=&#8221;null&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover=&#8221;null&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover=&#8221;null&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover=&#8221;null&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover=&#8221;null&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover=&#8221;null&#8221;][\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;dibscc-home-about&#8221; _builder_version=&#8221;4.9.2&#8243; background_color=&#8221;#FFFFFF&#8221;][et_pb_row _builder_version=&#8221;4.1&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221;]This page offers essential resources for safeguarding organizations within the Defense Industrial Base (DIB). Explore the top-10 high-value controls, learn about protecting sensitive data in the cloud, and access a wealth of tailored resources, benchmarks, policies, and guides. Additionally, access training material to dive deeper into some of the foundational elements of cybersecurity curated to help your organization stay ahead of the evolving cyber threat landscape and enhance your security posture.[\/et_pb_text][et_pb_toggle title=&#8221;Top 10 High Value Controls&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; title_level=&#8221;h2&#8243; title_font_size=&#8221;30px&#8221;]<\/p>\n<p style=\"padding-left: 40px\">The DIB SCC Task Force Working Group Top 10 high value controls are a set of prioritized controls that is used to enhance contractual and regulatory requirements. It builds additional rigor around specific foundational controls already required and additional rigor, specificity and\/or inclusion of high-value Advanced Persistent Threat (APT) focused controls.<\/p>\n<style type='text\/css' media='all'>#rt-tpg-container-1979070758 .rt-holder .rt-woo-info .price{color:#0367bf;}body .rt-tpg-container .rt-tpg-isotope-buttons .selected,\n\t\t\t\t\t#rt-tpg-container-1979070758 .layout12 .rt-holder:hover .rt-detail,\n\t\t\t\t\t#rt-tpg-container-1979070758 .isotope8 .rt-holder:hover .rt-detail,\n\t\t\t\t\t#rt-tpg-container-1979070758 .carousel8 .rt-holder:hover .rt-detail,\n\t\t\t\t\t#rt-tpg-container-1979070758 .layout13 .rt-holder .overlay .post-info,\n\t\t\t\t\t#rt-tpg-container-1979070758 .isotope9 .rt-holder .overlay .post-info,\n\t\t\t\t\t#rt-tpg-container-1979070758.rt-tpg-container .layout4 .rt-holder .rt-detail,\n\t\t\t\t\t.rt-modal-1979070758 .md-content,\n\t\t\t\t\t.rt-modal-1979070758 .md-content > .rt-md-content-holder .rt-md-content,\n\t\t\t\t\t.rt-popup-wrap-1979070758.rt-popup-wrap .rt-popup-navigation-wrap,\n\t\t\t\t\t#rt-tpg-container-1979070758 .carousel9 .rt-holder .overlay .post-info{background-color:#0367bf;}#rt-tpg-container-1979070758 .layout5 .rt-holder .overlay, #rt-tpg-container-1979070758 .isotope2 .rt-holder .overlay, #rt-tpg-container-1979070758 .carousel2 .rt-holder .overlay,#rt-tpg-container-1979070758 .layout15 .rt-holder h3, #rt-tpg-container-1979070758 .isotope11 .rt-holder h3, #rt-tpg-container-1979070758 .carousel11 .rt-holder h3, #rt-tpg-container-1979070758 .layout16 .rt-holder h3,\n\t\t\t\t\t#rt-tpg-container-1979070758 .isotope12 .rt-holder h3, #rt-tpg-container-1979070758 .carousel12 .rt-holder h3 {background-color:rgba(3,103,191,0.8);}#rt-tpg-container-1979070758 .pagination-list li a,\n\t\t\t\t\trt-tpg-container-1979070758 .pagination-list li span,\n\t\t\t\t\trt-tpg-container-1979070758 .pagination li a,\n\t\t\t\t\t#rt-tpg-container-1979070758 .rt-tpg-isotope-buttons button,\n\t\t\t\t\t#rt-tpg-container-1979070758 .rt-tpg-utility .rt-tpg-load-more button,\n\t\t\t\t\t#rt-tpg-container-1979070758.rt-tpg-container .swiper-navigation .slider-btn,\n\t\t\t\t\t#rt-tpg-container-1979070758.rt-tpg-container .swiper-pagination-bullet,\n\t\t\t\t\t#rt-tpg-container-1979070758 .wc1 .rt-holder .rt-img-holder .overlay .product-more ul li a,\n\t\t\t\t\t#rt-tpg-container-1979070758 .wc2 .rt-detail .rt-wc-add-to-cart,\n\t\t\t\t\t#rt-tpg-container-1979070758 .wc3 .rt-detail .rt-wc-add-to-cart,\n\t\t\t\t\t#rt-tpg-container-1979070758 .wc4 .rt-detail .rt-wc-add-to-cart,\n\t\t\t\t\t#rt-tpg-container-1979070758 .wc-carousel2 .rt-detail .rt-wc-add-to-cart,\n\t\t\t\t\t#rt-tpg-container-1979070758 .wc-isotope2 .rt-detail .rt-wc-add-to-cart,\n\t\t\t\t\t#rt-tpg-container-1979070758 .rt-layout-filter-container .rt-filter-wrap .rt-filter-item-wrap.rt-filter-dropdown-wrap .rt-filter-dropdown,\n\t\t\t\t\t#rt-tpg-container-1979070758 .rt-layout-filter-container .rt-filter-sub-tax.sub-button-group .rt-filter-button-item,\n\t\t\t\t\t#rt-tpg-container-1979070758.rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li>a,\n\t\t\t\t\t#rt-tpg-container-1979070758 .rt-filter-item-wrap.rt-filter-button-wrap span.rt-filter-button-item,\n\t\t\t\t\t#rt-tpg-container-1979070758.rt-tpg-container .rt-pagination-wrap  .rt-loadmore-btn,\n\t\t\t\t\t#rt-tpg-container-1979070758.rt-tpg-container .rt-pagination-wrap .rt-cb-page-prev-next > *,\n\t\t\t\t\t#rt-tpg-container-1979070758 .rt-read-more,\n\t\t\t\t\t#rt-tooltip-1979070758, #rt-tooltip-1979070758 .rt-tooltip-bottom:after{background-color:#ffffff;}#rt-tpg-container-1979070758 .rt-filter-item-wrap.rt-filter-button-wrap span.rt-filter-button-item,\n\t\t\t\t\t#rt-tpg-container-1979070758 .rt-layout-filter-container .rt-filter-sub-tax.sub-button-group .rt-filter-button-item{border-color:#ffffff;}#rt-tpg-container-1979070758.rt-tpg-container .layout17 .rt-holder .overlay a.tpg-zoom .fa{color:#ffffff;}#rt-tpg-container-1979070758 .rt-holder .read-more a {background-color:#ffffff;padding: 8px 15px;}#rt-tpg-container-1979070758 .read-more a{border-radius:px;}#rt-tpg-container-1979070758.rt-tpg-container {background:#ffffff;}#rt-tpg-container-1979070758 .tpg-widget-heading-wrapper.heading-style1 .tpg-widget-heading, #rt-tpg-container-1979070758 .tpg-widget-heading-wrapper.heading-style2 .tpg-widget-heading, #rt-tpg-container-1979070758 .tpg-widget-heading-wrapper.heading-style3 .tpg-widget-heading {background:#ffffff;}#rt-tpg-container-1979070758 .tpg-widget-heading-wrapper.heading-style2 .tpg-widget-heading::after {border-top-color:#ffffff;}#rt-tpg-container-1979070758 .rt-img-holder img.rt-img-responsive,#rt-tpg-container-1979070758 .rt-img-holder,\n\t\t\t\t\t#rt-tpg-container-1979070758 .rt-post-overlay .post-img,\n\t\t\t\t\t#rt-tpg-container-1979070758 .post-sm .post-img,\n\t\t\t\t\t#rt-tpg-container-1979070758 .rt-post-grid .post-img,\n\t\t\t\t\t#rt-tpg-container-1979070758 .post-img img {border-radius:px;}<\/style><div class='rt-container-fluid rt-tpg-container tpg-shortcode-main-wrapper ' id='rt-tpg-container-1979070758'   data-layout='layout1' data-grid-style='even' data-desktop-col='5'  data-tab-col='2'  data-mobile-col='1' data-sc-id='1065'><div data-title='Loading ...' class='rt-row rt-content-loader   layout1 tpg-even '><div class=\"rt-col-md-24 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"1057\"><div class=\"rt-holder\"><div class=\"rt-img-holder\"><a data-id=\"1057\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/administrative-rights-and-privileges\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/1344236-1057-150x150.jpg\" class=\"rt-img-responsive \" alt=\"\" \/><\/a><\/div><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"1057\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/administrative-rights-and-privileges\/\">Administrative Rights and Privileges<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-24 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"1059\"><div class=\"rt-holder\"><div class=\"rt-img-holder\"><a data-id=\"1059\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059-150x150.jpg\" class=\"rt-img-responsive \" alt=\"\" \/><\/a><\/div><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"1059\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/\">Anti-virus\/Malware<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-24 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"1129\"><div class=\"rt-holder\"><div class=\"rt-img-holder\"><a data-id=\"1129\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/default-passwords\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/21906991-1129-150x150.jpg\" class=\"rt-img-responsive \" alt=\"\" \/><\/a><\/div><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"1129\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/default-passwords\/\">Default Passwords<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-24 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"1062\"><div class=\"rt-holder\"><div class=\"rt-img-holder\"><a data-id=\"1062\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059-150x150.jpg\" class=\"rt-img-responsive \" alt=\"\" \/><\/a><\/div><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"1062\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/\">DNS Mitigations<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-24 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"1084\"><div class=\"rt-holder\"><div class=\"rt-img-holder\"><a data-id=\"1084\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/email-filtering\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/controls-email-filtering-150x150.jpg\" class=\"rt-img-responsive \" alt=\"\" \/><\/a><\/div><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"1084\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/email-filtering\/\">Email Filtering<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-24 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"1102\"><div class=\"rt-holder\"><div class=\"rt-img-holder\"><a data-id=\"1102\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4-150x150.jpg\" class=\"rt-img-responsive \" alt=\"\" \/><\/a><\/div><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"1102\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/\">Employee Training and Awareness<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-24 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"1230\"><div class=\"rt-holder\"><div class=\"rt-img-holder\"><a data-id=\"1230\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1-150x150.jpg\" class=\"rt-img-responsive \" alt=\"\" \/><\/a><\/div><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"1230\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/\">Multi-Factor Authentication<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-24 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"1112\"><div class=\"rt-holder\"><div class=\"rt-img-holder\"><a data-id=\"1112\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/system-patching\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/21581271-1112-150x150.jpg\" class=\"rt-img-responsive \" alt=\"\" \/><\/a><\/div><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"1112\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/system-patching\/\">Patching<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-24 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"1116\"><div class=\"rt-holder\"><div class=\"rt-img-holder\"><a data-id=\"1116\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/perimeter-hardening\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/6217219-1116-150x150.jpg\" class=\"rt-img-responsive \" alt=\"\" \/><\/a><\/div><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"1116\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/perimeter-hardening\/\">Perimeter Hardening<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-24 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"1123\"><div class=\"rt-holder\"><div class=\"rt-img-holder\"><a data-id=\"1123\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/web-content-filtering\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/100523551-1123-150x150.jpg\" class=\"rt-img-responsive \" alt=\"\" \/><\/a><\/div><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"1123\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/web-content-filtering\/\">Web Content Filtering<\/a><\/h2><\/div><\/div><\/div><\/div><\/div>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Protecting Data in the Cloud&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; title_level=&#8221;h2&#8243; title_font_size=&#8221;30px&#8221;]<\/p>\n<p style=\"padding-left: 40px\">The DIB SCC Cloud Working Group has developed <a href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cloud-security\/\">frequently asked questions<\/a> regarding cloud security. These FAQs are provided to assist organizations with implementing cloud solutions.<\/p>\n<p style=\"padding-left: 40px\">The Microsoft Cloud Services Working Group brought ND-ISAC members together with Microsoft subject matter experts to elaborate common challenges, understand features, and provide updates on Microsoft Cloud Services roadmap. The <a href=\"https:\/\/ndisac.org\/wp-content\/uploads\/2023\/11\/Microsoft-Reference-Identity-Architectures-ND-ISAC-MSCloud-Whitepaper.pdf\">Microsoft Reference Identity Architecture for US Defense Industrial Base<\/a> is a result of months of collaboration among the Microsoft Cloud Services Working Group. It provides the group\u2019s consensus on common challenges coupled with guidance on potential ways to overcome those challenges.<\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Helpful Links&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; title_level=&#8221;h2&#8243; title_font_size=&#8221;30px&#8221;]<\/p>\n<h3>Resources<\/h3>\n<!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat585 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/www.cisa.gov\/stopransomware\" id=\"link-11375\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Cybersecurity and Infrastructure Security Agency &#8211; Stop Ransomware<\/a>\n<p>The U.S. Government's official one-stop location for resources to tackle ransomware more effectively.<\/p><\/li>\n<li><a href=\"https:\/\/dodprocurementtoolbox.com\/\" id=\"link-13989\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">DoD Procurement Toolbox<\/a>\n<p>A collection of tools and services to help you and your organization manage, enable, and share procurement information across the Department of Defense.<\/p><\/li>\n<li><a href=\"https:\/\/www.nist.gov\/itl\/smallbusinesscyber\" id=\"link-11376\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">NIST &#8211; Small Business Cybersecurity Corner<\/a>\n<p>NIST\u2019s Small Business Cybersecurity Corner is your go-to source for learning how to keep your data safe. You\u2019ll find information on cybersecurity basics, training for you and your employees,  a NIST Cybersecurity Framework quick start guide and more, all specifically geared toward small businesses. It also has up-to-date guidance for teleworking security, as that becomes a more common practice in small businesses everywhere.<\/p><\/li>\n<li><a href=\"https:\/\/www.sba.gov\/business-guide\/manage-your-business\/strengthen-your-cybersecurity\" id=\"link-1722\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">U.S. Small Business Administration &#8211; Strengthen Your Cybersecurity<\/a>\n<p>SBA resource that provides an introduction to cybersecurity for small business.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\n\n<h3>Benchmarks, Policies, and Guides<\/h3>\n<!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat589 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/www.cisecurity.org\/cis-benchmarks\" id=\"link-1961\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Center for Internet Security &#8211; Benchmarks<\/a>\n<p>The CIS Benchmarks are prescriptive configuration recommendations for more than 25+ vendor product families. They represent the consensus-based effort of cybersecurity experts globally to help you protect your systems against threats more confidently.<\/p><\/li>\n<li><a href=\"https:\/\/www.cisecurity.org\/controls\" id=\"link-1680\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Center for Internet Security &#8211; Critical Security Controls<\/a>\n<p>CIS Controls v8.1 help you keep on top of your evolving workplace, the technology you need to support it, and the threats confronting those systems. It places specific emphasis on moving to a hybrid or fully cloud environment and managing security across your supply chain.<\/p><\/li>\n<li><a href=\"https:\/\/www.cisecurity.org\/cis-hardened-image-list\" id=\"link-1684\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Center for Internet Security &#8211; Hardened Images<\/a>\n<p>CIS Hardened Images are virtual machine (VM) images that are pre-configured to meet the robust security recommendations of the associated CIS Benchmark. They provide users with a secure, on-demand, and scalable computing environment. CIS Hardened Images are available on major cloud service provider marketplaces.<\/p><\/li>\n<li><a href=\"https:\/\/www.cisecurity.org\/insights\/white-papers\/cis-controls-telework-and-small-office-network-security-guide\" id=\"link-1706\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Center for Internet Security &#8211; Telework and Small Office Network Security Guide<\/a>\n<p>This guide is meant to assist individuals and organizations in securing commodity routers, modems, and other network devices. Securing these devices is important as there are serious cybersecurity considerations surrounding the usage of network devices.<\/p><\/li>\n<li><a href=\"https:\/\/www.cshub.com\/whitepapers\" id=\"link-1707\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Cybersecurity Hub White Papers<\/a>\n<p>Cyber Security Hub provides enterprise security professionals with the most comprehensive selection of cyber security whitepapers from our own network or cyber security experts. All Cyber Security Hub members can research and be informed on a variety of topics through our collection of whitepapers.<\/p><\/li>\n<li><a href=\"https:\/\/www.cyber.mil\/stigs\/\" id=\"link-1709\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">DISA &#8211; Security Technical Information Guide (STIG)<\/a>\n<p>This site contains the Security Technical Implementation Guides and Security Requirements Guides for the Department of Defense (DOD) information technology systems as mandated by DODI 8500.01. This guidance bridges the gap between the National Institute of Standards and Technology Special Publication 800-53 and risk management framework (RMF).<\/p><\/li>\n<li><a href=\"https:\/\/www.cyber.mil\/stigs\/downloads\/\" id=\"link-1713\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">DISA &#8211; Security Technical Information Guide (STIG): Document Library<\/a>\n<p>Direct link to the STIGs document library<\/p><\/li>\n<li><a href=\"https:\/\/gcatoolkit.org\/smallbusiness\/\" id=\"link-4581\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Global Cyber Alliance &#8211; Cybersecurity Toolkit<\/a>\n<p>This website provides free and effective tools you can use today to take immediate action to reduce risk for your business.<\/p><\/li>\n<li><a href=\"https:\/\/www.sans.org\/information-security-policy\" id=\"link-1714\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">SANS &#8211; Security Policy Templates<\/a>\n<p>In partnership, the Cybersecurity Risk Foundation (CRF) and SANS have created a library of free cybersecurity policy templates to help organizations quickly define, document, and deploy key cybersecurity policies.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\n\n<h3>Training<\/h3>\n<!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat183 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/www.cyber.mil\/training\" id=\"link-1720\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">DoD Cyber Exchange Training<\/a>\n<p>Collection of cyber training courses and training aids provided by the DoD Cyber Exchange. It provides an overview of cybersecurity threats and best practices to keep information and information systems secure.\u00a0<\/p><\/li>\n<li><a href=\"https:\/\/www.knowbe4.com\/security-awareness-training\" id=\"link-1725\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">KnowBe4 &#8211; Security and Awareness Training<\/a>\n<p>KnowBe4 is a large security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.<\/p><\/li>\n<li><a href=\"https:\/\/www.hhs.gov\/about\/agencies\/asa\/ocio\/cybersecurity\/security-awareness-training\/index.html\" id=\"link-1514\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">U.S. Department of Health &amp; Human Service Security Awareness and Training<\/a>\n<p>This resource provides general awareness and role-based information security training documents.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\n\n<p>[\/et_pb_toggle][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; module_class=&#8221;banner-block&#8221; _builder_version=&#8221;4.0.4&#8243; height=&#8221;250px&#8221;][et_pb_fullwidth_header title=&#8221;Cybersecurity Fundamentals&#8221; module_id=&#8221;Aboutpg&#8221; _builder_version=&#8221;4.9.2&#8243; title_font=&#8221;Muli|800|||||||&#8221; title_text_color=&#8221;#ffffff&#8221; title_font_size=&#8221;48px&#8221; content_font=&#8221;Muli||||||||&#8221; content_text_color=&#8221;#ffffff&#8221; content_font_size=&#8221;23px&#8221; subhead_text_color=&#8221;#ffffff&#8221; background_color=&#8221;rgba(255, 255, 255, 0)&#8221; background_image=&#8221;https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/dibscc-home.jpg&#8221; background_layout=&#8221;light&#8221; height=&#8221;250px&#8221; custom_padding=&#8221;5%||10%||false|false&#8221; z_index_tablet=&#8221;500&#8243; title_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; title_text_shadow_vertical_length_tablet=&#8221;0px&#8221; title_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":14043,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Welcome to National Defense ISAC Sites. This is your first post. Edit or delete it, then start blogging!","_et_gb_content_width":"","footnotes":""},"class_list":["post-14045","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Fundamentals - DIB SCC CyberAssist<\/title>\n<meta name=\"description\" content=\"Helpful information and links are provided to assist organizations who are getting started with cybersecurity fundamentals.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/cybersecurity-fundamentals\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Fundamentals - DIB SCC CyberAssist\" \/>\n<meta property=\"og:description\" content=\"Helpful information and links are provided to assist organizations who are getting started with cybersecurity fundamentals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/cybersecurity-fundamentals\/\" \/>\n<meta property=\"og:site_name\" content=\"DIB SCC CyberAssist\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-14T17:54:09+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/cybersecurity-fundamentals\/\",\"url\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/cybersecurity-fundamentals\/\",\"name\":\"Cybersecurity Fundamentals - DIB SCC CyberAssist\",\"isPartOf\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\"},\"datePublished\":\"2024-10-24T10:49:10+00:00\",\"dateModified\":\"2025-03-14T17:54:09+00:00\",\"description\":\"Helpful information and links are provided to assist organizations who are getting started with cybersecurity fundamentals.\",\"breadcrumb\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/cybersecurity-fundamentals\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/cybersecurity-fundamentals\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/cybersecurity-fundamentals\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ndisac.org\/dibscc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CyberAssist\",\"item\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Getting Started with Cybersecurity\",\"item\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity Fundamentals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\",\"url\":\"https:\/\/ndisac.org\/dibscc\/\",\"name\":\"DIB SCC CyberAssist\",\"description\":\"Cybersecurity Resources for DIB companies and suppliers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Fundamentals - DIB SCC CyberAssist","description":"Helpful information and links are provided to assist organizations who are getting started with cybersecurity fundamentals.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/cybersecurity-fundamentals\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Fundamentals - DIB SCC CyberAssist","og_description":"Helpful information and links are provided to assist organizations who are getting started with cybersecurity fundamentals.","og_url":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/cybersecurity-fundamentals\/","og_site_name":"DIB SCC CyberAssist","article_modified_time":"2025-03-14T17:54:09+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/cybersecurity-fundamentals\/","url":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/cybersecurity-fundamentals\/","name":"Cybersecurity Fundamentals - DIB SCC CyberAssist","isPartOf":{"@id":"https:\/\/ndisac.org\/dibscc\/#website"},"datePublished":"2024-10-24T10:49:10+00:00","dateModified":"2025-03-14T17:54:09+00:00","description":"Helpful information and links are provided to assist organizations who are getting started with cybersecurity fundamentals.","breadcrumb":{"@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/cybersecurity-fundamentals\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/cybersecurity-fundamentals\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/cybersecurity-fundamentals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ndisac.org\/dibscc\/"},{"@type":"ListItem","position":2,"name":"CyberAssist","item":"https:\/\/ndisac.org\/dibscc\/cyberassist\/"},{"@type":"ListItem","position":3,"name":"Getting Started with Cybersecurity","item":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity Fundamentals"}]},{"@type":"WebSite","@id":"https:\/\/ndisac.org\/dibscc\/#website","url":"https:\/\/ndisac.org\/dibscc\/","name":"DIB SCC CyberAssist","description":"Cybersecurity Resources for DIB companies and suppliers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"markcarr","author_link":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; module_class=&#8221;banner-block&#8221; _builder_version=&#8221;4.0.4&#8243; height=&#8221;250px&#8221;][et_pb_fullwidth_header title=&#8221;Cybersecurity Fundamentals&#8221; module_id=&#8221;Aboutpg&#8221; _builder_version=&#8221;4.9.2&#8243; title_font=&#8221;Muli|800|||||||&#8221; title_text_color=&#8221;#ffffff&#8221; title_font_size=&#8221;48px&#8221; content_font=&#8221;Muli||||||||&#8221; content_text_color=&#8221;#ffffff&#8221; content_font_size=&#8221;23px&#8221; subhead_text_color=&#8221;#ffffff&#8221; background_color=&#8221;rgba(255, 255, 255, 0)&#8221; background_image=&#8221;https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/dibscc-home.jpg&#8221; background_layout=&#8221;light&#8221; height=&#8221;250px&#8221; custom_padding=&#8221;5%||10%||false|false&#8221; z_index_tablet=&#8221;500&#8243; title_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; title_text_shadow_vertical_length_tablet=&#8221;0px&#8221; title_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; [&hellip;]","_links":{"self":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages\/14045"}],"collection":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/comments?post=14045"}],"version-history":[{"count":24,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages\/14045\/revisions"}],"predecessor-version":[{"id":14778,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages\/14045\/revisions\/14778"}],"up":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages\/14043"}],"wp:attachment":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media?parent=14045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}