CYBER SECURITY glossary / concepts – page 2

Hi All,
Greetings for the day!
Continuing with CYBER SECURITY glossary.
- Data residency –
- Data residency regulations govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally.
- These regulations can differ significantly depending on jurisdiction.
- Defence In Depth –
- Defense in depth uses a layered approach to security.
- A defense in-depth strategy uses a series of mechanisms to slow the advance of an attack.
- Each layer provides protection so that, if one layer is breached, a subsequent layer will prevent an attacker getting unauthorized access to data.
- Example layers of security might include:
- Physical security such as limiting access to a datacenter to only authorized personnel.
- Identity and access security controls, such as multifactor authentication or condition-based access, to control access to infrastructure and change control.
- Perimeter security of your corporate network includes distributed denial of service (DDoS) protection to filter large-scale attacks before they can cause a denial of service for users.
- Network security, such as network segmentation and network access controls, to limit communication between resources.
- Compute layer security such as securing access to virtual machines either on-premises or in the cloud by closing certain ports.
- Application layer security to ensure applications are secure and free of security vulnerabilities.
- Data layer security including controls to manage access to business and customer data and encryption to protect data.

- Dictionary attack –
- A dictionary attack is a form of brute force attack, where a dictionary of commonly used words is applied.
- To prevent dictionary attacks, it’s important to use symbols, numbers, and multiple word combinations in a password.
- Encryption –
- Encryption is the process of making data unreadable and unusable to unauthorized viewers.
- To use or read encrypted data, it must be decrypted, which requires the use of a secret key.
- There are two top-level types of encryption:
- symmetric and
- asymmetric.
- Governance –
- Governance is the system of rules, practices, and processes an organization uses to direct and control its activities.
- Hashing –
- Hashing uses an algorithm to convert text to a unique fixed-length value called a hash.
- Hashing is different to encryption in that it doesn’t use keys, and the hashed value isn’t subsequently decrypted back to the original.
- Hashing is often used to store passwords.
- When a user enters their password, the same algorithm that created the stored hash creates a hash of the entered password. This is compared to the stored hashed version of the password. If they match, the user has entered their password correctly.
- Integrity –
- Integrity refers to keeping data or messages correct.
- Integrity is about having confidence that data hasn’t been tampered with or altered.
- Intrusion Detection –
- Intrusion Detection refers to the process of monitoring and analysing the network traffic, system logs and other security-related data to identify and detect potential security threats or unauthorized access attempts.
- The goal of Intrusion Detection is to recognize the patterns or anomalies that may indicate a malicious activity.
- Keylogging attack –
- Keylogging involves malicious software that logs keystrokes.
- Using the key logger, an attacker can log (steal) username and password combinations, which can then be used for credential stuffing attacks.
- This is a common attack at internet cafes or anywhere we use a shared computer for access.
- To prevent keylogging, don’t install untrusted software and use reputable virus-scanning software.
- Least privileged access –
- The concept of least privilege is where a user is granted the minimum rights that they require.
- By implementing the least privileged access, we will reduce an attacker’s actions if a breach occurs.
REFERENCES
- CYBER SECURITY glossary / concepts – page 1
- CYBER SECURITY glossary / concepts – page 3
- Cybersecurity terminologies – Letter C
If you have any terms that should be included or explained, feel free to add them in the comments. I’ll try to explain in detail.
Thanks for reading ! HAPPY SHARING !
Stay tuned for CYBERSECURITY updates / concepts.
If you like this article please share and subscribe to Knowledge-Junction.
Have a wonderful learning . LIFE IS BEAUTIFUL 🙂

2 Responses
[…] CYBER SECURITY glossary / concepts – page 2 […]
[…] CYBER SECURITY glossary / concepts – page 2 […]