CYBER SECURITY glossary / concepts – page 3

Hi All,

Greetings for the day!

Continuing with CYBER SECURITY glossary.

  • Mean Time to Detect (MTTD)
    • MTTD measures the average time it takes to identify security incident.
    • This metric is critical in accessing the efficiency and effectiveness of the organization’s incident response processes.
    • Faster detection can significantly reduce the impact of security breaches.
  • Mean Time to Respond (MTTR)
    • MTTR measures the average time taken to respond and mitigate the threat.
    • This metric is critical in accessing the efficiency and effectiveness of the organization’s incident response processes.
    • Faster detection can significantly reduce the impact of security breaches.
  • Multifactor authentication
    • Multifactor authentication is a system where two, or even three, authentication types are used.
    • System uses two types of authentications.
    • Example : Password and then OTP to mobile.
    • Multifactor authentication reduces the likelihood that a bad actor will be able to get access to confidential information.
  • Risk
    • Risk management is the process of identifying, assessing, and responding to threats or events that can impact company or customer objectives.
  • Single-factor authentication
    • Single-factor authentication is a system where only one authentication type is used.
    • Simplest method of authentication.
    • Least secure authentication method.
    • Example :
      • Using – Username and Password for authentication.
      • Using – biometrics. Using fingerprint to unlock mobile.
    • Very easy for hackers to hack.
    • Single-factor authentication is convenient but isn’t suitable for a highly secure system.
  • Social engineering attack
    • Social engineering involves an attempt to get people to reveal information or complete an action to enable an attack.
    • Social engineering attacks are exploit the vulnerabilities of humans. The attacker tries to gain the trust of a legitimate user. They persuade the user to divulge information or take an action that enables them to cause damage or steal information.
  • Symmetric encryption
    • Symmetric encryption uses the same key to encrypt and decrypt the data.
  • Zero Trust
    • Zero Trust is a model that enables organizations to provide secure access to their resources by teaching us to “never trust, always verify”.
    • It’s based on three principles that employ concepts
      • Verify explicitly
      • Use least privileged access
      • Assume breach
    • By employing a Zero Trust security model, organizations can better adapt to a modern distributed workplace that provides secure access to resources.

REFERENCES

If you have any terms that should be included or explained, feel free to add them in the comments. I’ll try to explain in detail.

Thanks for reading ! HAPPY SHARING !

Stay tuned for CYBERSECURITY updates / concepts.

If you like this article please share and subscribe to Knowledge-Junction.

Have a wonderful learning . LIFE IS BEAUTIFUL 🙂

Prasham Sabadra

LIFE IS VERY BEAUTIFUL. ENJOY THE WHOLE JOURNEY :) Founder of Microsoft 365 Junction, Speaker, Author, Learner, Developer, Passionate Techie. Certified Professional Workshop Facilitator / Public Speaker. Believe in knowledge sharing. Around 20+ years of total IT experience and 17+ years of experience in SharePoint and Microsoft 365 services Please feel free me to contact for any SharePoint / Microsoft 365 queries. I am also very much interested in behavioral (life changing) sessions like motivational speeches, Success, Goal Setting, About Life, How to live Life etc. My book - Microsoft 365 Power Shell hand book for Administrators and Beginners and 100 Power Shell Interview Questions - https://www.amazon.in/Microsoft-Administrators-Beginners-Interview-Questions/dp/9394901639/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=1679029081&sr=8-11

You may also like...

2 Responses

  1. September 7, 2024

    […] CYBER SECURITY glossary / concepts – page 3 […]

  2. September 7, 2024

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from Microsoft 365

Subscribe now to keep reading and get access to the full archive.

Continue reading