CYBER SECURITY glossary / concepts – page 3
Hi All,
Greetings for the day!
Continuing with CYBER SECURITY glossary.
- Mean Time to Detect (MTTD) –
- MTTD measures the average time it takes to identify security incident.
- This metric is critical in accessing the efficiency and effectiveness of the organization’s incident response processes.
- Faster detection can significantly reduce the impact of security breaches.
- Mean Time to Respond (MTTR) –
- MTTR measures the average time taken to respond and mitigate the threat.
- This metric is critical in accessing the efficiency and effectiveness of the organization’s incident response processes.
- Faster detection can significantly reduce the impact of security breaches.
- Multifactor authentication –
- Multifactor authentication is a system where two, or even three, authentication types are used.
- System uses two types of authentications.
- Example : Password and then OTP to mobile.
- Multifactor authentication reduces the likelihood that a bad actor will be able to get access to confidential information.
- Risk –
- Risk management is the process of identifying, assessing, and responding to threats or events that can impact company or customer objectives.
- Single-factor authentication –
- Single-factor authentication is a system where only one authentication type is used.
- Simplest method of authentication.
- Least secure authentication method.
- Example :
- Using – Username and Password for authentication.
- Using – biometrics. Using fingerprint to unlock mobile.
- Very easy for hackers to hack.
- Single-factor authentication is convenient but isn’t suitable for a highly secure system.
- Social engineering attack –
- Social engineering involves an attempt to get people to reveal information or complete an action to enable an attack.
- Social engineering attacks are exploit the vulnerabilities of humans. The attacker tries to gain the trust of a legitimate user. They persuade the user to divulge information or take an action that enables them to cause damage or steal information.
- Symmetric encryption
- Symmetric encryption uses the same key to encrypt and decrypt the data.
- Zero Trust
- Zero Trust is a model that enables organizations to provide secure access to their resources by teaching us to “never trust, always verify”.
- It’s based on three principles that employ concepts
- Verify explicitly
- Use least privileged access
- Assume breach
- By employing a Zero Trust security model, organizations can better adapt to a modern distributed workplace that provides secure access to resources.
REFERENCES
- CYBER SECURITY glossary / concepts – page 1
- CYBER SECURITY glossary / concepts – page 2
- Cybersecurity terminologies – C
If you have any terms that should be included or explained, feel free to add them in the comments. I’ll try to explain in detail.
Thanks for reading ! HAPPY SHARING !
Stay tuned for CYBERSECURITY updates / concepts.
If you like this article please share and subscribe to Knowledge-Junction.
Have a wonderful learning . LIFE IS BEAUTIFUL 🙂

2 Responses
[…] CYBER SECURITY glossary / concepts – page 3 […]
[…] https://knowledge-junction.in/2024/09/07/cyber-security-glossary-concepts-page-3/ […]