Authentication & Authorization

  1. 2FA (Two-Factor Authentication): Verifying identity using two different factors (e.g., password + SMS code).
  2. MFA (Multi-Factor Authentication): Requires multiple factors for access (e.g., password + biometrics + device).
  3. SSO (Single Sign-On): One login gives access to multiple systems.
  4. IAM (Identity and Access Management): Systems ensuring users have appropriate access.
  5. Biometric Authentication: Using physical traits like fingerprints or facial recognition for identity verification.

Data Protection & Encryption

  1. Encryption: Converting data into unreadable code for protection.
  2. TLS (Transport Layer Security): Encrypts data in transit.
  3. PKI (Public Key Infrastructure): System for managing encryption keys and digital certificates.
  4. Data Masking: Obscuring data to protect sensitive information.
  5. Zero-Knowledge Proofs: Verifying information without revealing the actual data.

Threats & Vulnerabilities

  1. Phishing: Fraudulent attempts to steal sensitive information via deceptive emails or messages.
  2. Malware: Malicious software (e.g., viruses, worms, ransomware).
  3. Ransomware: Malware that encrypts data until a ransom is paid.
  4. Spyware: Software that secretly gathers user information.
  5. Zero-Day Exploit: Attack on a vulnerability unknown to the vendor.

Network Security

  1. Firewall: Filters traffic between networks to block unauthorized access.
  2. VPN (Virtual Private Network): Encrypts data and hides user IP for secure internet use.
  3. NIDS (Network Intrusion Detection System): Monitors network traffic for suspicious activity.
  4. Proxy Server: Intermediary server enhancing privacy and security.
  5. Port Scanning: Probing network ports to find vulnerabilities.

Incident Response & Recovery

  1. SOC (Security Operations Center): Central hub for monitoring and responding to threats.
  2. Forensics: Analyzing digital evidence post-incident.
  3. Disaster Recovery: Plans to restore systems after a cyberattack.
  4. Threat Hunting: Proactively searching for cyber threats in a network.
  5. Incident Response Plan: A documented process for handling security breaches.

Cybersecurity Frameworks & Standards

  1. NIST (National Institute of Standards and Technology): Provides guidelines for cybersecurity.
  2. ISO 27001: International standard for information security management.
  3. GDPR (General Data Protection Regulation): EU law for data privacy and protection.
  4. SOC 2: Framework for managing customer data.
  5. HIPAA: U.S. regulation for healthcare data security.

Cloud Security

  1. CASB (Cloud Access Security Broker): Ensures security policies are enforced for cloud services.
  2. SaaS (Software as a Service): Cloud software delivered over the internet.
  3. Shared Responsibility Model: Division of cloud security responsibilities between providers and users.
  4. Data Residency: Location where cloud-stored data is physically kept.
  5. Cloud Encryption: Encrypting data stored or processed in the cloud.

Access Control

  1. RBAC (Role-Based Access Control): Permissions based on roles within an organization.
  2. ABAC (Attribute-Based Access Control): Permissions based on user attributes (e.g., location, device).
  3. Privilege Escalation: Exploiting a system to gain higher privileges.
  4. Least Privilege Principle: Granting only the access required for tasks.
  5. Session Hijacking: Taking control of a user’s active session.

Emerging Technologies

  1. AI in Cybersecurity: Using artificial intelligence to detect threats.
  2. Blockchain Security: Securing data with decentralized technology.
  3. Quantum Cryptography: Using quantum mechanics for secure encryption.
  4. IoT Security: Securing connected devices like smart home gadgets.
  5. Edge Computing Security: Protecting decentralized data at network edges.

Security Testing

  1. Penetration Testing: Simulating attacks to find vulnerabilities.
  2. Vulnerability Scanning: Automated scanning for weaknesses.
  3. Red Teaming: Simulated attacks by ethical hackers.
  4. Bug Bounty Programs: Incentives for reporting software vulnerabilities.
  5. SOC 3 Audits: Public-facing reports on an organization’s security.

Monitoring & Analytics

  1. SIEM (Security Information and Event Management): Aggregates and analyzes security data.
  2. UEBA (User and Entity Behavior Analytics): Detects unusual user behavior.
  3. Log Monitoring: Continuously reviewing activity logs for anomalies.
  4. Threat Intelligence: Collecting and analyzing information on cyber threats.
  5. Network Traffic Analysis: Monitoring and analyzing data flows for irregularities.

Emerging Threats

  1. Deepfake Attacks: AI-generated fake media used for deception.
  2. Cryptojacking: Hijacking computing power for cryptocurrency mining.
  3. Botnets: Networks of compromised devices controlled by attackers.
  4. Social Engineering: Manipulating people to reveal confidential information.
  5. Supply Chain Attacks: Targeting vulnerabilities in third-party vendors.

Compliance & Governance

  1. Cyber Hygiene: Basic practices for maintaining security.
  2. Data Breach Notification Laws: Requirements for disclosing breaches.
  3. CISO (Chief Information Security Officer): Oversees an organization’s cybersecurity strategy.
  4. DLP (Data Loss Prevention): Tools to prevent unauthorized data transfer.
  5. Privacy Shield: Framework for transatlantic data protection.

Endpoints & Devices

  1. Endpoint Protection: Security measures for devices like laptops and phones.
  2. Mobile Device Management (MDM): Tools to secure and monitor mobile devices.
  3. BYOD (Bring Your Own Device): Policies for personal devices used at work.
  4. Patch Management: Updating software to fix vulnerabilities.
  5. EPP (Endpoint Protection Platform): Unified solution for securing devices.

Advanced Attacks

  1. DDoS (Distributed Denial of Service): Overwhelming a system with traffic.
  2. APT (Advanced Persistent Threat): Prolonged, targeted cyberattacks.
  3. SQL Injection: Exploiting databases via malicious queries.
  4. Cross-Site Scripting (XSS): Injecting malicious scripts into web applications.
  5. Man-in-the-Middle Attack (MITM): Intercepting communication between two parties.

Tools & Techniques

  1. Honeypot: Decoy systems to attract and study attackers.
  2. Sandboxing: Isolating suspicious files for analysis.
  3. Deception Technology: Creating fake assets to mislead attackers.
  4. Threat Modeling: Predicting and mitigating potential attacks.
  5. Kill Chain: Framework describing steps of a cyberattack.

Cybersecurity Culture

  1. Security Awareness Training: Educating employees about threats.
  2. Human Firewall: Employees who prevent breaches through vigilance.
  3. Insider Threats: Risks posed by employees or contractors.
  4. Social Engineering Red Flags: Indicators of manipulation attempts.
  5. Zero Trust Model: Assuming no user or device is trustworthy.

Cybersecurity Trends

  1. Digital Transformation: Incorporating security into modern business practices.
  2. Cyber Resilience: The ability to recover quickly from cyberattacks.
  3. DevSecOps: Integrating security into DevOps practices.
  4. Shadow IT: Unauthorized use of IT systems or services.
  5. Cyber Insurance: Policies covering damages from cyber incidents.

Miscellaneous

  1. Bot Mitigation: Preventing harmful automated activity.
  2. Cyber Kill Chain: Steps attackers take to achieve goals.
  3. Fake News Bots: Bots spreading disinformation online.
  4. Data Minimization: Collecting only necessary data to reduce risk.
  5. Digital Identity: Online representation of a person or organization.
  6. Threat Surface: All possible attack points in a system.
  7. Rogue Access Point: Unauthorized wireless access point.
  8. Smishing: SMS-based phishing attacks.
  9. Passwordless Authentication: Access without traditional passwords (e.g., via biometrics or tokens).
  10. Dark Web Monitoring: Searching for stolen data on hidden Networks
While viewing the website, tap in the menu bar. Scroll down the list of options, then tap Add to Home Screen.
Use Safari for a better experience.