As we make the transition to online, we need to be more aware of how to better protect ourselves. While we may not think too much about cyber-criminals, doesn’t mean they are not thinking of you.
Understanding cyber security terms is your first step in dealing with this online threat.
So get empowered to get ready.
Audit logs helps administrators to understand what happens on a server or application. It is also useful during a cyber incident. For more on how it can be useful, do check our blog.
Black Hats are information technology perpetrators who enters into a network or server without authorization to conduct various nefarious activities.
Bruce force attacks are common attacks aimed at logins. Once a user name or login email is known, a combination of passwords will be used to gain entry via the login.
Content Security Policy refers to the security policy of content on a website. It is an additional layer of security against attack via the website’s content.
Distributed Denial of service (DDoS attack) – In computing, a denial-of-service attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host-server connected to the Internet.
Employee awareness training is one of the greatest defense a company can undertake against a cyber attack. After all, employees contributes a large percentage of cyber breaches. Converting a large weakness into a strength is a priority.
Endpoint solutions, is a perimeter defense. It is installed on the client devices (i.e laptops). It can detect malware. It works with firewalls as a first line of network defense.
Information Security Policy is a internal policy document to detail the company’s cyber security practices to boost its cyber posture. For more on it, please head to our blog page.
Firewall, is a perimeter defense to prevent unauthorized traffic into a protected or private network.
Malware is a category of software that is malicious in nature. Its purpose is to cause disruption or deny the use of services to the computer user. You can check out on the common malware types in our blog.
Man in the Middle attacks are attacks made by cyber hackers to intercept unprotected traffic using sniffing applications.
Phishing attacks are common attacks employed by cyber criminals to entice users to click on a link to either open a website or download a malicious file.
Social Engineering is a method used by cyber criminals to gather intelligence about a human target through social means – online and offline.
Threat Intelligence is information around impending attacks so that cyber specialists can take actions to mitigate the damaging effects of a cyber attack.
VPN is short for virtual private network. It is a security solution to encrypt data transmitting from one point to another.
White Hats are information technology experts who works with the law to ascertain the vulnerabilities in a network or to hunt down cyber black hats.
White Listing is the act of identifying and crafting a list of approved applications (i.e a application white list). This will minimize the deployment of unauthorized applications.