Cybersecurity terminologies – Letter C

Hi all,

Greetings for the day!!!

On this page we will discuss all Cybersecurity terminologies starting with letter ”C’. We will keep updating the page for not addressed terminologies.

Compliance

  • Compliance refers to the country/region, state or federal laws or even multi-national regulations that an organization must follow.
  • These regulations define
    • what types of data must be protected,
    • what processes are required under the legislation,
    • and what penalties are issued to organizations that fail to comply.

Conditional Access

  • Conditional access involves access with conditions.
  • If something is true, you’re granted access, but if it’s false, you’re denied.

Confidentiality 

  • Confidentiality refers to the need to keep confidential sensitive data such as customer information, passwords, or financial data.
  • We can encrypt data to keep it confidential, but then we also need to keep the encryption keys confidential.
  • Confidentiality is the most visible part of security. We can clearly see need for sensitive data, keys, passwords, and other secrets to be kept confidential.

Credential stuffing attack

  • Credential stuffing is an attack method.
  • This takes advantage of the fact that many people use the same username and password across many sites.
  • Attackers will use stolen credentials, usually obtained after a data breach on one site, to attempt to access other areas.
  • Attackers typically use software tools to automate this process.
  • To prevent credential stuffing, it’s important not to reuse passwords, and to change them regularly, particularly after a security breach.

CYBERATTACKS

  • CYBERATTACK is trying to get the illegal access to any digital device to damage it.
  • A CYBERATTACK is an effort to unlawfully access a computer or any digital device.
  • It is meant to cause harm.

Cybersecurity

Cybersecurity refers to

  • Technologies,
  • Processes, and
  • Training

That helps to protect

  • Systems,
  • Networks,
  • Programs, and
  • Data

From

  • Cyberattacks,
  • Damage, and
  • Unauthorized access.

If you think some terms which are not listed and you require details please free to mention in comments section.

Have a wonderful day ahead!!!

Thanks for reading !!!

Prasham Sabadra

LIFE IS VERY BEAUTIFUL. ENJOY THE WHOLE JOURNEY :) Founder of Microsoft 365 Junction, Speaker, Author, Learner, Developer, Passionate Techie. Certified Professional Workshop Facilitator / Public Speaker. Believe in knowledge sharing. Around 20+ years of total IT experience and 17+ years of experience in SharePoint and Microsoft 365 services Please feel free me to contact for any SharePoint / Microsoft 365 queries. I am also very much interested in behavioral (life changing) sessions like motivational speeches, Success, Goal Setting, About Life, How to live Life etc. My book - Microsoft 365 Power Shell hand book for Administrators and Beginners and 100 Power Shell Interview Questions - https://www.amazon.in/Microsoft-Administrators-Beginners-Interview-Questions/dp/9394901639/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=1679029081&sr=8-11

You may also like...

3 Responses

  1. November 12, 2024

    […] Cybersecurity terminologies – C […]

  2. November 12, 2024

    […] Cybersecurity terminologies – Letter C […]

  3. November 13, 2024

    […] Cybersecurity terminologies – Letter C […]

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from Microsoft 365

Subscribe now to keep reading and get access to the full archive.

Continue reading