Cybersecurity terminologies – Letter A
Hi all,
Greetings for the day!!!
On this page we will discuss all Cybersecurity terminologies starting with letter “A”. We will keep updating the page for not addressed terminologies.
Application Programming Interfaces (APIs)
- APIs are published instructions to interface with a product or service.
- APIs allow developers to assemble a command or ask for a service or data. Developers can submit it and receive an output.
Asymmetric encryption
- Asymmetric encryption uses a public key and private key pair.
- Either key (Public or Private) can encrypt data.
- The key used to encrypt can’t be used to decrypt encrypted data.
- To decrypt, we need a paired key.
- For example, the public key is used to encrypt. Only the corresponding private key can be used to decrypt.
Attack Surface
- A collection of all the possible paths a hacker or a malware application will follow to compromise protected data.
Attack Vector
- An attack vector is an entry point or route for an attacker to gain access to a system.
- Email is most common attack vector.
- Wireless Network is another common example.
- Some other examples are
- Browsers
- Cloud Services
- Company Employees
Authentication
- It provides the mechanism for us to trust that someone (user) is actually who they claim to be.
- Authentication is the process of proving that a person (user) is who they say they are.
Authentication attacks / Identity attacks
- Authentication attacks occur when someone tries to steal another person’s credentials. They can then pretend to be that person.
- The aim of these types of attacks is to impersonate a legitimate user. They can also often be referred to as identity attacks.
- Common attacks include, but are not limited to:
- Brute force attack
- Dictionary attack
- Credential stuffing attack
- Keylogging attack
- Social engineering attack
Authorization
- Authorization grants each user a specific level of access to data and assets.
- As a rule, users should be given just enough permissions to access the resources they need.
Availability
- Availability refers to making data available to those who need it, when they need it.
- It’s important to the organization to keep customer data secure. Nonetheless, it must also be available to employees who deal with customers.
Thanks for reading!!!
HAVE A FANTASTIC TIME AHEAD !!! LIFE IS BEAUTIFUL
