CYBER SECURITY glossary / concepts – page 2

Defense In Depth
Defense In Depth

Hi All,

Greetings for the day!

Continuing with CYBER SECURITY glossary.

  • Data residency
    • Data residency regulations govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally.
    • These regulations can differ significantly depending on jurisdiction.
  • Defence In Depth –
    • Defense in depth uses a layered approach to security.
    • A defense in-depth strategy uses a series of mechanisms to slow the advance of an attack.
    • Each layer provides protection so that, if one layer is breached, a subsequent layer will prevent an attacker getting unauthorized access to data.
    • Example layers of security might include:
      • Physical security such as limiting access to a datacenter to only authorized personnel.
      • Identity and access security controls, such as multifactor authentication or condition-based access, to control access to infrastructure and change control.
      • Perimeter security of your corporate network includes distributed denial of service (DDoS) protection to filter large-scale attacks before they can cause a denial of service for users.
      • Network security, such as network segmentation and network access controls, to limit communication between resources.
      • Compute layer security such as securing access to virtual machines either on-premises or in the cloud by closing certain ports.
      • Application layer security to ensure applications are secure and free of security vulnerabilities.
      • Data layer security including controls to manage access to business and customer data and encryption to protect data.
CYBERSECURITY - Defence In Depth
fig : CYBERSECURITY – Defence In Depth
  • Dictionary attack
    • A dictionary attack is a form of brute force attack, where a dictionary of commonly used words is applied.
    • To prevent dictionary attacks, it’s important to use symbols, numbers, and multiple word combinations in a password.
  • Encryption
    • Encryption is the process of making data unreadable and unusable to unauthorized viewers.
    • To use or read encrypted data, it must be decrypted, which requires the use of a secret key.
    • There are two top-level types of encryption:
      • symmetric and
      • asymmetric.
  • Governance
    • Governance is the system of rules, practices, and processes an organization uses to direct and control its activities.
  • Hashing
    • Hashing uses an algorithm to convert text to a unique fixed-length value called a hash.
    • Hashing is different to encryption in that it doesn’t use keys, and the hashed value isn’t subsequently decrypted back to the original.
    • Hashing is often used to store passwords.
      • When a user enters their password, the same algorithm that created the stored hash creates a hash of the entered password. This is compared to the stored hashed version of the password. If they match, the user has entered their password correctly.
  • Integrity
    • Integrity refers to keeping data or messages correct.
    • Integrity is about having confidence that data hasn’t been tampered with or altered.
  • Intrusion Detection
    • Intrusion Detection refers to the process of monitoring and analysing the network traffic, system logs and other security-related data to identify and detect potential security threats or unauthorized access attempts.
    • The goal of Intrusion Detection is to recognize the patterns or anomalies that may indicate a malicious activity.
  • Keylogging attack
    • Keylogging involves malicious software that logs keystrokes.
    • Using the key logger, an attacker can log (steal) username and password combinations, which can then be used for credential stuffing attacks.
    • This is a common attack at internet cafes or anywhere we use a shared computer for access.
    • To prevent keylogging, don’t install untrusted software and use reputable virus-scanning software.
  • Least privileged access
    • The concept of least privilege is where a user is granted the minimum rights that they require.
    • By implementing the least privileged access, we will reduce an attacker’s actions if a breach occurs.

REFERENCES

If you have any terms that should be included or explained, feel free to add them in the comments. I’ll try to explain in detail.

Thanks for reading ! HAPPY SHARING !

Stay tuned for CYBERSECURITY updates / concepts.

If you like this article please share and subscribe to Knowledge-Junction.

Have a wonderful learning . LIFE IS BEAUTIFUL 🙂

Prasham Sabadra

LIFE IS VERY BEAUTIFUL. ENJOY THE WHOLE JOURNEY :) Founder of Microsoft 365 Junction, Speaker, Author, Learner, Developer, Passionate Techie. Certified Professional Workshop Facilitator / Public Speaker. Believe in knowledge sharing. Around 20+ years of total IT experience and 17+ years of experience in SharePoint and Microsoft 365 services Please feel free me to contact for any SharePoint / Microsoft 365 queries. I am also very much interested in behavioral (life changing) sessions like motivational speeches, Success, Goal Setting, About Life, How to live Life etc. My book - Microsoft 365 Power Shell hand book for Administrators and Beginners and 100 Power Shell Interview Questions - https://www.amazon.in/Microsoft-Administrators-Beginners-Interview-Questions/dp/9394901639/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=1679029081&sr=8-11

You may also like...

2 Responses

  1. August 2, 2024

    […] CYBER SECURITY glossary / concepts – page 2 […]

  2. November 7, 2024

    […] CYBER SECURITY glossary / concepts – page 2 […]

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from Microsoft 365

Subscribe now to keep reading and get access to the full archive.

Continue reading