gehackt

Begriffe zur Cybersicherheit

Beim Übergang zum Internet müssen wir uns bewusster werden, wie wir uns besser schützen können. Auch wenn wir nicht allzu viel über Cyberkriminelle nachdenken, bedeutet das nicht, dass sie nicht an Sie denken.

Das Verständnis der Begriffe der Cybersicherheit ist der erste Schritt im Umgang mit dieser Online-Bedrohung.

Machen Sie sich also bereit.

Audit logs helps administrators to understand what happens on a server or application. It is also useful during a cyber incident. For more on how it can be useful, do check Unser Blog.

Black Hats are information technology perpetrators who enters into a network or server without authorization to conduct various nefarious activities.

Bruce force attacks are common attacks aimed at logins. Once a user name or login email is known, a combination of passwords will be used to gain entry via the login.

Content Security Policy refers to the security policy of content on a website. It is an additional layer of security against attack via the website’s content.

Distributed Denial of service (DDoS attack) – In computing, a denial-of-service attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host-server connected to the Internet.

Employee awareness training is one of the greatest defense a company can undertake against a cyber attack. After all, employees contributes a large percentage of cyber breaches. Eine große Schwäche in eine Stärke umzuwandeln, hat Priorität.

Endpoint solutions, is a perimeter defense. It is installed on the client devices (i.e laptops). It can detect malware. It works with firewalls as a first line of network defense.

Information Security Policy is a internal policy document to detail the company’s cyber security practices to boost its cyber posture. For more on it, please head to our Blog-Seite.

Firewall, is a perimeter defense to prevent unauthorized traffic into a protected or private network.

Malware is a category of software that is malicious in nature. Its purpose is to cause disruption or deny the use of services to the computer user. You can check out on the Gängige Malware-Typen in our blog.

Man in the Middle attacks are attacks made by cyber hackers to intercept unprotected traffic using sniffing applications.

Phishing attacks are common attacks employed by cyber criminals to entice users to click on a link to either open a website or download a malicious file.

Social Engineering is a method used by cyber criminals to gather intelligence about a human target through social means – online and offline.

Threat Intelligence is information around impending attacks so that cyber specialists can take actions to mitigate the damaging effects of a cyber attack.

VPN is short for virtual private network. It is a security solution to encrypt data transmitting from one point to another.

White Hats are information technology experts who works with the law to ascertain the vulnerabilities in a network or to hunt down cyber black hats.

White Listing is the act of identifying and crafting a list of approved applications (i.e a application white list). This will minimize the deployment of unauthorized applications.