Authentication & Authorization

  1. 2FA (Two-Factor Authentication): Verifying identity using two different factors (e.g., password + SMS code).
  2. MFA (Multi-Factor Authentication): Requires multiple factors for access (e.g., password + biometrics + device).
  3. SSO (Single Sign-On): One login gives access to multiple systems.
  4. IAM (Identity and Access Management): Systems ensuring users have appropriate access.
  5. Biometric Authentication: Using physical traits like fingerprints or facial recognition for identity verification.

Data Protection & Encryption

  1. Encryption: Converting data into unreadable code for protection.
  2. TLS (Transport Layer Security): Encrypts data in transit.
  3. PKI (Public Key Infrastructure): System for managing encryption keys and digital certificates.
  4. Data Masking: Obscuring data to protect sensitive information.
  5. Zero-Knowledge Proofs: Verifying information without revealing the actual data.

Threats & Vulnerabilities

  1. Phishing: Fraudulent attempts to steal sensitive information via deceptive emails or messages.
  2. Malware: Malicious software (e.g., viruses, worms, ransomware).
  3. Ransomware: Malware that encrypts data until a ransom is paid.
  4. Spyware: Software that secretly gathers user information.
  5. Zero-Day Exploit: Attack on a vulnerability unknown to the vendor.

Network Security

  1. Firewall: Filters traffic between networks to block unauthorized access.
  2. VPN (Virtual Private Network): Encrypts data and hides user IP for secure internet use.
  3. NIDS (Network Intrusion Detection System): Monitors network traffic for suspicious activity.
  4. Proxy Server: Intermediary server enhancing privacy and security.
  5. Port Scanning: Probing network ports to find vulnerabilities.

Incident Response & Recovery

  1. SOC (Security Operations Center): Central hub for monitoring and responding to threats.
  2. Forensics: Analyzing digital evidence post-incident.
  3. Disaster Recovery: Plans to restore systems after a cyberattack.
  4. Threat Hunting: Proactively searching for cyber threats in a network.
  5. Incident Response Plan: A documented process for handling security breaches.

Cybersecurity Frameworks & Standards

  1. NIST (National Institute of Standards and Technology): Provides guidelines for cybersecurity.
  2. ISO 27001: International standard for information security management.
  3. GDPR (General Data Protection Regulation): EU law for data privacy and protection.
  4. SOC 2: Framework for managing customer data.
  5. HIPAA: U.S. regulation for healthcare data security.

Cloud Security

  1. CASB (Cloud Access Security Broker): Ensures security policies are enforced for cloud services.
  2. SaaS (Software as a Service): Cloud software delivered over the internet.
  3. Shared Responsibility Model: Division of cloud security responsibilities between providers and users.
  4. Data Residency: Location where cloud-stored data is physically kept.
  5. Cloud Encryption: Encrypting data stored or processed in the cloud.

Access Control

  1. RBAC (Role-Based Access Control): Permissions based on roles within an organization.
  2. ABAC (Attribute-Based Access Control): Permissions based on user attributes (e.g., location, device).
  3. Privilege Escalation: Exploiting a system to gain higher privileges.
  4. Least Privilege Principle: Granting only the access required for tasks.
  5. Session Hijacking: Taking control of a user’s active session.

Emerging Technologies

  1. AI in Cybersecurity: Using artificial intelligence to detect threats.
  2. Blockchain Security: Securing data with decentralized technology.
  3. Quantum Cryptography: Using quantum mechanics for secure encryption.
  4. IoT Security: Securing connected devices like smart home gadgets.
  5. Edge Computing Security: Protecting decentralized data at network edges.

Security Testing

  1. Penetration Testing: Simulating attacks to find vulnerabilities.
  2. Vulnerability Scanning: Automated scanning for weaknesses.
  3. Red Teaming: Simulated attacks by ethical hackers.
  4. Bug Bounty Programs: Incentives for reporting software vulnerabilities.
  5. SOC 3 Audits: Public-facing reports on an organization’s security.

Monitoring & Analytics

  1. SIEM (Security Information and Event Management): Aggregates and analyzes security data.
  2. UEBA (User and Entity Behavior Analytics): Detects unusual user behavior.
  3. Log Monitoring: Continuously reviewing activity logs for anomalies.
  4. Threat Intelligence: Collecting and analyzing information on cyber threats.
  5. Network Traffic Analysis: Monitoring and analyzing data flows for irregularities.

Emerging Threats

  1. Deepfake Attacks: AI-generated fake media used for deception.
  2. Cryptojacking: Hijacking computing power for cryptocurrency mining.
  3. Botnets: Networks of compromised devices controlled by attackers.
  4. Social Engineering: Manipulating people to reveal confidential information.
  5. Supply Chain Attacks: Targeting vulnerabilities in third-party vendors.

Compliance & Governance

  1. Cyber Hygiene: Basic practices for maintaining security.
  2. Data Breach Notification Laws: Requirements for disclosing breaches.
  3. CISO (Chief Information Security Officer): Oversees an organization’s cybersecurity strategy.
  4. DLP (Data Loss Prevention): Tools to prevent unauthorized data transfer.
  5. Privacy Shield: Framework for transatlantic data protection.

Endpoints & Devices

  1. Endpoint Protection: Security measures for devices like laptops and phones.
  2. Mobile Device Management (MDM): Tools to secure and monitor mobile devices.
  3. BYOD (Bring Your Own Device): Policies for personal devices used at work.
  4. Patch Management: Updating software to fix vulnerabilities.
  5. EPP (Endpoint Protection Platform): Unified solution for securing devices.

Advanced Attacks

  1. DDoS (Distributed Denial of Service): Overwhelming a system with traffic.
  2. APT (Advanced Persistent Threat): Prolonged, targeted cyberattacks.
  3. SQL Injection: Exploiting databases via malicious queries.
  4. Cross-Site Scripting (XSS): Injecting malicious scripts into web applications.
  5. Man-in-the-Middle Attack (MITM): Intercepting communication between two parties.

Tools & Techniques

  1. Honeypot: Decoy systems to attract and study attackers.
  2. Sandboxing: Isolating suspicious files for analysis.
  3. Deception Technology: Creating fake assets to mislead attackers.
  4. Threat Modeling: Predicting and mitigating potential attacks.
  5. Kill Chain: Framework describing steps of a cyberattack.

Cybersecurity Culture

  1. Security Awareness Training: Educating employees about threats.
  2. Human Firewall: Employees who prevent breaches through vigilance.
  3. Insider Threats: Risks posed by employees or contractors.
  4. Social Engineering Red Flags: Indicators of manipulation attempts.
  5. Zero Trust Model: Assuming no user or device is trustworthy.

Cybersecurity Trends

  1. Digital Transformation: Incorporating security into modern business practices.
  2. Cyber Resilience: The ability to recover quickly from cyberattacks.
  3. DevSecOps: Integrating security into DevOps practices.
  4. Shadow IT: Unauthorized use of IT systems or services.
  5. Cyber Insurance: Policies covering damages from cyber incidents.

Miscellaneous

  1. Bot Mitigation: Preventing harmful automated activity.
  2. Cyber Kill Chain: Steps attackers take to achieve goals.
  3. Fake News Bots: Bots spreading disinformation online.
  4. Data Minimization: Collecting only necessary data to reduce risk.
  5. Digital Identity: Online representation of a person or organization.
  6. Threat Surface: All possible attack points in a system.
  7. Rogue Access Point: Unauthorized wireless access point.
  8. Smishing: SMS-based phishing attacks.
  9. Passwordless Authentication: Access without traditional passwords (e.g., via biometrics or tokens).
  10. Dark Web Monitoring: Searching for stolen data on hidden Networks