0% found this document useful (0 votes)
13 views

MYNOTE

explanation of cyber security solutions

Uploaded by

divyaranimalge12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

MYNOTE

explanation of cyber security solutions

Uploaded by

divyaranimalge12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 4

NETWORK SECURITY

network and information secuirty = Network Security protects your network and data
from breaches,
intrusions and other threats.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++

WAF = A WAF or web application firewall helps protect web applications by


filtering and
monitoring HTTP traffic between a web application and the Internet. It typically
protects web
applications from attacks such as cross-site forgery, cross-site-scripting (XSS),
file inclusion,
and SQL injection, among others.
(WAF SECURE INSDIE NETWORK FROM OUT SDE INTERNET WITH THE HELP FIREWALL )
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++

ssl - vpn/ddos = SSL Flood is a DDoS attack type that involves sending garbage
SSL/TLS requests to the target
server.
Its aim is to exhaust target server resources and force it to deny service to
legitimate users.

enables individual users to access an organization's network, client-server


applications, and internal network
utilities and directories without the need for specialized software.
(BTWEEN HOME IP AND FIRE WALL SSL CREATE SAFE TUNNEL WHERE IT WILL CONNET TO
COMPANIES SERVER SO USER CAN
SAFELY USE SSL COMES UNDER VPN )

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++

NGFW = A next-generation firewall (NGFW) is a security appliance that processes


network traffic and applies rules
to block potentially dangerous traffic. NGFWs evolve and expand upon the
capabilities of traditional firewalls.
They do all that firewalls do, but more powerfully and with additional features.

(FIREWALL BUT WITH ADDITIONAL FEATURE )


+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++++

ADC/NAC = Network Access Control is a security approach that regulates who and what
can access network resources.
It identifies, authenticates, and authorizes users and devices, ensuring
compliance with security policies.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++

CASB/ZTNA = CASB provides security for cloud-based applications and services.


ZTNA governs access to internal applications based on strict identity
verification.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++

ENDPOINT SECURITY

ZERO TRUST = adheres to the principle, "Never trust, always verify."


In terms of endpoints, that means always verify all endpoints.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++

NGAV & EDR = NGAV is like a super-smart antivirus that can spot and stop tricky
cyber threats before they
cause damage.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++

EDR is like having a security guard for your computer or device that watches for
any suspicious activity and
can take action to stop it.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++
Email security = help prevent unauthorized access, data breaches, and other forms
of cybercrime via email.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++

Encryption/DLP =
Encryption converts data into a secure format that can only be read with the
right key.
It safeguards information during transmission and storage.

Data Loss Prevention (DLP) tools and policies prevent unauthorized disclosure or
leakage of sensitive data.
They monitor data transfers, enforce policies, and help organizations comply with
regulations.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++

INFRASTRUCUTRE SECURITY

Infrastructure security involves protecting an organization's IT assets, including


hardware, software, networks,
and data centers, from cyber threats and physical damage. It includes measures
like network security,
endpoint security, physical security, data security, identity and access
management, security monitoring,
and incident response.

IDAM = IDAM stands for Identity and Access Management. It's a system that manages
digital identities
(such as usernames and passwords)

PIM/PAM = PIM deals with managing the identities associated with privileged
accounts, PAM is concerned with
controlling and securing the actual access granted to those privileged accounts.

MFA = MFA adds an extra layer of security beyond just a password, making it
significantly more difficult for unauthorized
users to gain access to accounts or systems, even if they've obtained the
password.

2FA = 2FA stands for Two-Factor Authentication. 1 PASS 2 CODE SENT ON YPUR DEVICE.

***********************************************************************************
***************************
WAF, FIREWALL, ENDPOINT SECURITY ,DLP.

waf = A WAF or web application firewall helps protect web applications by


filtering and
monitoring HTTP traffic between a web application and the Internet. It typically
protects web
applications from attacks such as cross-site forgery, cross-site-scripting (XSS),
file inclusion,
and SQL injection, among others.

***********************************************************************************
***************************
firewall = A firewall is a network security device that monitors incoming and
outgoing network traffic and decides
whether to allow or block specific traffic based on a defined set of security
rules.

A firewall is either a hardware device or a software application that helps protect


your network from attackers.
The firewall shields your network by acting as a 24/7 filter, scanning the data
that attempts to enter your network
and preventing anything that looks suspicious from getting through.

***********************************************************************************
**************************************
endpoint security = Endpoint security, or endpoint protection, is the cybersecurity
approach to defending endpoints —
such as desktops, laptops, and mobile devices — from malicious activity.

An endpoint is a remote computing device that communicates back and forth with a
network to which it is connected.
Examples of endpoints include: Desktops.

***********************************************************************************
****************************************
DLP =
Data loss prevention is a security solution that identifies and helps prevent
unsafe or inappropriate sharing, transfer,
or use of sensitive data. It can help your organization monitor and protect
sensitive information across on-premises systems,
cloud-based locations, and endpoint devices.

TO PREVENT CRITICAL INFORMATION OR DATA FROM LEAVGING YOUR ORGANISATION WE USE DATA
LOSS PREVENTION

2 STEPS
1 DATA SECURITY GOVERNANCE ( PROPER ACCESS CONTROLS)
2 DATA CLASSIFICATION AND TAGGING

WE NEED AUTOMATED PROCESS THAT CLASIFIES TAGS DATA CON

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy