Cybersecurity terminologies – Letter A

Hi all,

Greetings for the day!!!

On this page we will discuss all Cybersecurity terminologies starting with letter “A”. We will keep updating the page for not addressed terminologies.

Application Programming Interfaces (APIs)

  • APIs are published instructions to interface with a product or service.
  • APIs allow developers to assemble a command or ask for a service or data. Developers can submit it and receive an output.

Asymmetric encryption

  • Asymmetric encryption uses a public key and private key pair.
  • Either key (Public or Private) can encrypt data.
  • The key used to encrypt can’t be used to decrypt encrypted data.
  • To decrypt, we need a paired key.
  • For example, the public key is used to encrypt. Only the corresponding private key can be used to decrypt.

Attack Surface

  • A collection of all the possible paths a hacker or a malware application will follow to compromise protected data.

Attack Vector

  • An attack vector is an entry point or route for an attacker to gain access to a system.
  • Email is most common attack vector.
  • Wireless Network is another common example.
  • Some other examples are
    • Browsers
    • Cloud Services
    • Company Employees

Authentication

  • It provides the mechanism for us to trust that someone (user) is actually who they claim to be.
  • Authentication is the process of proving that a person (user) is who they say they are.

Authentication attacks / Identity attacks

  • Authentication attacks occur when someone tries to steal another person’s credentials. They can then pretend to be that person.
  • The aim of these types of attacks is to impersonate a legitimate user. They can also often be referred to as identity attacks.
  • Common attacks include, but are not limited to:
    • Brute force attack
    • Dictionary attack
    • Credential stuffing attack
    • Keylogging attack
    • Social engineering attack

Authorization

  • Authorization grants each user a specific level of access to data and assets. 
  • As a rule, users should be given just enough permissions to access the resources they need.

Availability

  • Availability refers to making data available to those who need it, when they need it.
  • It’s important to the organization to keep customer data secure. Nonetheless, it must also be available to employees who deal with customers.

Thanks for reading!!!

HAVE A FANTASTIC TIME AHEAD !!! LIFE IS BEAUTIFUL

Prasham Sabadra

LIFE IS VERY BEAUTIFUL. ENJOY THE WHOLE JOURNEY :) Founder of Microsoft 365 Junction, Speaker, Author, Learner, Developer, Passionate Techie. Certified Professional Workshop Facilitator / Public Speaker. Believe in knowledge sharing. Around 20+ years of total IT experience and 17+ years of experience in SharePoint and Microsoft 365 services Please feel free me to contact for any SharePoint / Microsoft 365 queries. I am also very much interested in behavioral (life changing) sessions like motivational speeches, Success, Goal Setting, About Life, How to live Life etc. My book - Microsoft 365 Power Shell hand book for Administrators and Beginners and 100 Power Shell Interview Questions - https://www.amazon.in/Microsoft-Administrators-Beginners-Interview-Questions/dp/9394901639/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=1679029081&sr=8-11

You may also like...

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from Microsoft 365

Subscribe now to keep reading and get access to the full archive.

Continue reading