CYBER SECURITY glossary / concepts – page 1

Hi All,
Greetings for the day!
I am very much passionate for implementing SECURITY solutions. So starting exploring various concepts. Preparing list of CYBERSECURITY concepts.
I will keep updating this list.
This glossary will also help us to prepare various CYBERSECURITY related exams.
- Asymmetric encryption –
- Asymmetric encryption uses a public key and private key pair.
- Either key can encrypt data, but the key used to encrypt can’t be used to decrypt encrypted data. To decrypt, we need a paired key.
- For example, if the public key is used to encrypt, then only the corresponding private key can be used to decrypt.
- Authentication –
- It provides the mechanism for us to trust that someone (user) is actually who they claim to be.
- Authentication is the process of proving that a person (user) is who they say they are.
- Authentication attacks / Identity attacks –
- Authentication attacks occur when someone tries to steal another person’s credentials. They can then pretend to be that person.
- Objective of these types of attacks is to impersonate a legitimate user, they can also often be referred to as identity attacks.
- Common attacks include, but are not limited to:
- Brute force attack
- Dictionary attack
- Credential stuffing attack
- Keylogging attack
- Social engineering attack
- Authorization –
- Authorization grants each user a specific level of access to data and assets.
- As a rule, users should be given just enough permissions to access the resources they need.
- Availability –
- Availability refers to making data available to those who need it, when they need it.
- It’s important to the organization to keep customer data secure, but at the same time it must also be available to employees who deal with customers.
- Brute force attack –
- In a brute force attack, a criminal will attempt to gain access simply by trying different usernames and password combinations.
- Typically, attackers have tools that automate this process by using millions of username and password combinations.
- Simple passwords, with single-factor authentication, are vulnerable to brute force attacks.
REFERENCES
- CYBER SECURITY glossary / concepts – page 2
- https://knowledge-junction.in/2024/09/07/cyber-security-glossary-concepts-page-3/
- Cybersecurity terminologies – Letter C
If you have any terms that should be included or explained, feel free to add them in the comments. I’ll try to explain in detail.
Thanks for reading ! HAPPY SHARING !
Stay tuned for CYBERSECURITY updates / concepts.
If you like this article please share and subscribe to Knowledge-Junction.
Have a wonderful learning . LIFE IS BEAUTIFUL 🙂

2 Responses
[…] CYBER SECURITY glossary / concepts – page 1 […]
[…] CYBER SECURITY glossary / concepts – page 1 […]