Cybersecurity refers to the protection of internet-connected systems, including hardware, software, and data, from cyberattacks.
A vulnerability is a weakness in a system; a threat is something that can exploit the vulnerability; risk is the potential damage that could result if the vulnerability is exploited.
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
The main types of firewalls are packet-filtering firewalls, stateful inspection firewalls, proxy firewalls, and next-generation firewalls.
A VPN extends a private network across a public network and enables users to send and receive data as if their devices were directly connected to the private network.
Encryption is the process of converting data into a code to prevent unauthorized access.
Symmetric encryption uses the same key to encrypt and decrypt data, whereas asymmetric encryption uses two different keys—a public key and a private key.
A brute force attack is a trial-and-error method used to decode encrypted data, such as passwords, by trying many possible combinations.
A Distributed Denial-of-Service (DDoS) attack overwhelms a target server, service, or network with a flood of internet traffic to disrupt its normal functioning.
SQL injection is a code injection technique that exploits a security vulnerability in a web application's software by inserting malicious SQL statements into an entry field.
Common types include phishing, malware, ransomware, SQL injection, man-in-the-middle attacks, and denial-of-service (DoS) attacks.
Phishing is a type of social engineering attack where attackers trick individuals into revealing personal information such as passwords and credit card numbers.
The CIA triad stands for Confidentiality, Integrity, and Availability, which are the three main objectives of cybersecurity.
Two-factor authentication adds an extra layer of security by requiring not only a password but also an additional piece of information, such as a code sent to a mobile device.
IDS (Intrusion Detection System) monitors network traffic for suspicious activity, while IPS (Intrusion Prevention System) monitors and also takes action to prevent potential threats.
A zero-day vulnerability is a flaw in software that is unknown to the vendor and exploited by hackers before it can be patched.
Honeypots are decoy systems used to lure attackers into revealing their methods, providing a way to study cyberattacks.
Social engineering is the psychological manipulation of people into divulging confidential information or performing actions that compromise security.
Penetration testing, or ethical hacking, involves testing a computer system, network, or web application to find security vulnerabilities before attackers do.
Vulnerability assessment identifies potential vulnerabilities, while penetration testing actively exploits vulnerabilities to determine their impact.