Authentication & Authorization
- 2FA (Two-Factor Authentication): Verifying identity using two different factors (e.g., password + SMS code).
- MFA (Multi-Factor Authentication): Requires multiple factors for access (e.g., password + biometrics + device).
- SSO (Single Sign-On): One login gives access to multiple systems.
- IAM (Identity and Access Management): Systems ensuring users have appropriate access.
- Biometric Authentication: Using physical traits like fingerprints or facial recognition for identity verification.
Data Protection & Encryption
- Encryption: Converting data into unreadable code for protection.
- TLS (Transport Layer Security): Encrypts data in transit.
- PKI (Public Key Infrastructure): System for managing encryption keys and digital certificates.
- Data Masking: Obscuring data to protect sensitive information.
- Zero-Knowledge Proofs: Verifying information without revealing the actual data.
Threats & Vulnerabilities
- Phishing: Fraudulent attempts to steal sensitive information via deceptive emails or messages.
- Malware: Malicious software (e.g., viruses, worms, ransomware).
- Ransomware: Malware that encrypts data until a ransom is paid.
- Spyware: Software that secretly gathers user information.
- Zero-Day Exploit: Attack on a vulnerability unknown to the vendor.
Network Security
- Firewall: Filters traffic between networks to block unauthorized access.
- VPN (Virtual Private Network): Encrypts data and hides user IP for secure internet use.
- NIDS (Network Intrusion Detection System): Monitors network traffic for suspicious activity.
- Proxy Server: Intermediary server enhancing privacy and security.
- Port Scanning: Probing network ports to find vulnerabilities.
Incident Response & Recovery
- SOC (Security Operations Center): Central hub for monitoring and responding to threats.
- Forensics: Analyzing digital evidence post-incident.
- Disaster Recovery: Plans to restore systems after a cyberattack.
- Threat Hunting: Proactively searching for cyber threats in a network.
- Incident Response Plan: A documented process for handling security breaches.
Cybersecurity Frameworks & Standards
- NIST (National Institute of Standards and Technology): Provides guidelines for cybersecurity.
- ISO 27001: International standard for information security management.
- GDPR (General Data Protection Regulation): EU law for data privacy and protection.
- SOC 2: Framework for managing customer data.
- HIPAA: U.S. regulation for healthcare data security.
Cloud Security
- CASB (Cloud Access Security Broker): Ensures security policies are enforced for cloud services.
- SaaS (Software as a Service): Cloud software delivered over the internet.
- Shared Responsibility Model: Division of cloud security responsibilities between providers and users.
- Data Residency: Location where cloud-stored data is physically kept.
- Cloud Encryption: Encrypting data stored or processed in the cloud.
Access Control
- RBAC (Role-Based Access Control): Permissions based on roles within an organization.
- ABAC (Attribute-Based Access Control): Permissions based on user attributes (e.g., location, device).
- Privilege Escalation: Exploiting a system to gain higher privileges.
- Least Privilege Principle: Granting only the access required for tasks.
- Session Hijacking: Taking control of a user’s active session.
Emerging Technologies
- AI in Cybersecurity: Using artificial intelligence to detect threats.
- Blockchain Security: Securing data with decentralized technology.
- Quantum Cryptography: Using quantum mechanics for secure encryption.
- IoT Security: Securing connected devices like smart home gadgets.
- Edge Computing Security: Protecting decentralized data at network edges.
Security Testing
- Penetration Testing: Simulating attacks to find vulnerabilities.
- Vulnerability Scanning: Automated scanning for weaknesses.
- Red Teaming: Simulated attacks by ethical hackers.
- Bug Bounty Programs: Incentives for reporting software vulnerabilities.
- SOC 3 Audits: Public-facing reports on an organization’s security.
Monitoring & Analytics
- SIEM (Security Information and Event Management): Aggregates and analyzes security data.
- UEBA (User and Entity Behavior Analytics): Detects unusual user behavior.
- Log Monitoring: Continuously reviewing activity logs for anomalies.
- Threat Intelligence: Collecting and analyzing information on cyber threats.
- Network Traffic Analysis: Monitoring and analyzing data flows for irregularities.
Emerging Threats
- Deepfake Attacks: AI-generated fake media used for deception.
- Cryptojacking: Hijacking computing power for cryptocurrency mining.
- Botnets: Networks of compromised devices controlled by attackers.
- Social Engineering: Manipulating people to reveal confidential information.
- Supply Chain Attacks: Targeting vulnerabilities in third-party vendors.
Compliance & Governance
- Cyber Hygiene: Basic practices for maintaining security.
- Data Breach Notification Laws: Requirements for disclosing breaches.
- CISO (Chief Information Security Officer): Oversees an organization’s cybersecurity strategy.
- DLP (Data Loss Prevention): Tools to prevent unauthorized data transfer.
- Privacy Shield: Framework for transatlantic data protection.
Endpoints & Devices
- Endpoint Protection: Security measures for devices like laptops and phones.
- Mobile Device Management (MDM): Tools to secure and monitor mobile devices.
- BYOD (Bring Your Own Device): Policies for personal devices used at work.
- Patch Management: Updating software to fix vulnerabilities.
- EPP (Endpoint Protection Platform): Unified solution for securing devices.
Advanced Attacks
- DDoS (Distributed Denial of Service): Overwhelming a system with traffic.
- APT (Advanced Persistent Threat): Prolonged, targeted cyberattacks.
- SQL Injection: Exploiting databases via malicious queries.
- Cross-Site Scripting (XSS): Injecting malicious scripts into web applications.
- Man-in-the-Middle Attack (MITM): Intercepting communication between two parties.
Tools & Techniques
- Honeypot: Decoy systems to attract and study attackers.
- Sandboxing: Isolating suspicious files for analysis.
- Deception Technology: Creating fake assets to mislead attackers.
- Threat Modeling: Predicting and mitigating potential attacks.
- Kill Chain: Framework describing steps of a cyberattack.
Cybersecurity Culture
- Security Awareness Training: Educating employees about threats.
- Human Firewall: Employees who prevent breaches through vigilance.
- Insider Threats: Risks posed by employees or contractors.
- Social Engineering Red Flags: Indicators of manipulation attempts.
- Zero Trust Model: Assuming no user or device is trustworthy.
Cybersecurity Trends
- Digital Transformation: Incorporating security into modern business practices.
- Cyber Resilience: The ability to recover quickly from cyberattacks.
- DevSecOps: Integrating security into DevOps practices.
- Shadow IT: Unauthorized use of IT systems or services.
- Cyber Insurance: Policies covering damages from cyber incidents.
Miscellaneous
- Bot Mitigation: Preventing harmful automated activity.
- Cyber Kill Chain: Steps attackers take to achieve goals.
- Fake News Bots: Bots spreading disinformation online.
- Data Minimization: Collecting only necessary data to reduce risk.
- Digital Identity: Online representation of a person or organization.
- Threat Surface: All possible attack points in a system.
- Rogue Access Point: Unauthorized wireless access point.
- Smishing: SMS-based phishing attacks.
- Passwordless Authentication: Access without traditional passwords (e.g., via biometrics or tokens).
- Dark Web Monitoring: Searching for stolen data on hidden Networks