CYBER SECURITY glossary / concepts – page 1

cybersecurity
cybersecurity

Hi All,

Greetings for the day!

I am very much passionate for implementing SECURITY solutions. So starting exploring various concepts. Preparing list of CYBERSECURITY concepts.

I will keep updating this list.

This glossary will also help us to prepare various CYBERSECURITY related exams.

  • Asymmetric encryption –
    • Asymmetric encryption uses a public key and private key pair.
    • Either key can encrypt data, but the key used to encrypt can’t be used to decrypt encrypted data. To decrypt, we need a paired key.
    • For example, if the public key is used to encrypt, then only the corresponding private key can be used to decrypt.
  • Authentication 
    • It provides the mechanism for us to trust that someone (user) is actually who they claim to be.
    • Authentication is the process of proving that a person (user) is who they say they are.
  • Authentication attacks / Identity attacks
    • Authentication attacks occur when someone tries to steal another person’s credentials. They can then pretend to be that person.
    • Objective of these types of attacks is to impersonate a legitimate user, they can also often be referred to as identity attacks.
    • Common attacks include, but are not limited to:
      • Brute force attack
      • Dictionary attack
      • Credential stuffing attack
      • Keylogging attack
      • Social engineering attack
  • Authorization
    • Authorization grants each user a specific level of access to data and assets. 
    • As a rule, users should be given just enough permissions to access the resources they need.
  • Availability
    • Availability refers to making data available to those who need it, when they need it.
    • It’s important to the organization to keep customer data secure, but at the same time it must also be available to employees who deal with customers.
  • Brute force attack
    • In a brute force attack, a criminal will attempt to gain access simply by trying different usernames and password combinations.
    • Typically, attackers have tools that automate this process by using millions of username and password combinations.
    • Simple passwords, with single-factor authentication, are vulnerable to brute force attacks.

REFERENCES

If you have any terms that should be included or explained, feel free to add them in the comments. I’ll try to explain in detail.

Thanks for reading ! HAPPY SHARING !

Stay tuned for CYBERSECURITY updates / concepts.

If you like this article please share and subscribe to Knowledge-Junction.

Have a wonderful learning . LIFE IS BEAUTIFUL 🙂

Prasham Sabadra

LIFE IS VERY BEAUTIFUL. ENJOY THE WHOLE JOURNEY :) Founder of Microsoft 365 Junction, Speaker, Author, Learner, Developer, Passionate Techie. Certified Professional Workshop Facilitator / Public Speaker. Believe in knowledge sharing. Around 20+ years of total IT experience and 17+ years of experience in SharePoint and Microsoft 365 services Please feel free me to contact for any SharePoint / Microsoft 365 queries. I am also very much interested in behavioral (life changing) sessions like motivational speeches, Success, Goal Setting, About Life, How to live Life etc. My book - Microsoft 365 Power Shell hand book for Administrators and Beginners and 100 Power Shell Interview Questions - https://www.amazon.in/Microsoft-Administrators-Beginners-Interview-Questions/dp/9394901639/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=1679029081&sr=8-11

You may also like...

2 Responses

  1. August 2, 2024

    […] CYBER SECURITY glossary / concepts – page 1 […]

  2. September 7, 2024

    […] CYBER SECURITY glossary / concepts – page 1 […]

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from Microsoft 365

Subscribe now to keep reading and get access to the full archive.

Continue reading