MYNOTE
MYNOTE
network and information secuirty = Network Security protects your network and data
from breaches,
intrusions and other threats.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++
ssl - vpn/ddos = SSL Flood is a DDoS attack type that involves sending garbage
SSL/TLS requests to the target
server.
Its aim is to exhaust target server resources and force it to deny service to
legitimate users.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++
ADC/NAC = Network Access Control is a security approach that regulates who and what
can access network resources.
It identifies, authenticates, and authorizes users and devices, ensuring
compliance with security policies.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++
ENDPOINT SECURITY
NGAV & EDR = NGAV is like a super-smart antivirus that can spot and stop tricky
cyber threats before they
cause damage.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++
EDR is like having a security guard for your computer or device that watches for
any suspicious activity and
can take action to stop it.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++
Email security = help prevent unauthorized access, data breaches, and other forms
of cybercrime via email.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++
Encryption/DLP =
Encryption converts data into a secure format that can only be read with the
right key.
It safeguards information during transmission and storage.
Data Loss Prevention (DLP) tools and policies prevent unauthorized disclosure or
leakage of sensitive data.
They monitor data transfers, enforce policies, and help organizations comply with
regulations.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++
INFRASTRUCUTRE SECURITY
IDAM = IDAM stands for Identity and Access Management. It's a system that manages
digital identities
(such as usernames and passwords)
PIM/PAM = PIM deals with managing the identities associated with privileged
accounts, PAM is concerned with
controlling and securing the actual access granted to those privileged accounts.
MFA = MFA adds an extra layer of security beyond just a password, making it
significantly more difficult for unauthorized
users to gain access to accounts or systems, even if they've obtained the
password.
2FA = 2FA stands for Two-Factor Authentication. 1 PASS 2 CODE SENT ON YPUR DEVICE.
***********************************************************************************
***************************
WAF, FIREWALL, ENDPOINT SECURITY ,DLP.
***********************************************************************************
***************************
firewall = A firewall is a network security device that monitors incoming and
outgoing network traffic and decides
whether to allow or block specific traffic based on a defined set of security
rules.
***********************************************************************************
**************************************
endpoint security = Endpoint security, or endpoint protection, is the cybersecurity
approach to defending endpoints —
such as desktops, laptops, and mobile devices — from malicious activity.
An endpoint is a remote computing device that communicates back and forth with a
network to which it is connected.
Examples of endpoints include: Desktops.
***********************************************************************************
****************************************
DLP =
Data loss prevention is a security solution that identifies and helps prevent
unsafe or inappropriate sharing, transfer,
or use of sensitive data. It can help your organization monitor and protect
sensitive information across on-premises systems,
cloud-based locations, and endpoint devices.
TO PREVENT CRITICAL INFORMATION OR DATA FROM LEAVGING YOUR ORGANISATION WE USE DATA
LOSS PREVENTION
2 STEPS
1 DATA SECURITY GOVERNANCE ( PROPER ACCESS CONTROLS)
2 DATA CLASSIFICATION AND TAGGING