Network Security
Cryptography
Threats and Vulnerabilities
Cybersecurity Policies
Ethical Hacking
100

A security system that controls incoming and outgoing network traffic based on predetermined security rules.

Firewall

100

The process of converting information or data into a code, especially to prevent unauthorized access.

Encryption

100

Software that is intended to damage or disable computers and computer systems.

Malware

100

A document stipulating constraints and practices that a user must agree to for access to a corporate network or the internet.

Acceptable Use Policy (AUP)

100

A simulated cyberattack against your computer system to check for exploitable vulnerabilities.

Penetration Testing

200

A device or software application that monitors a network for malicious activity or policy violations.

Intrusion Detection System (IDS)

200

A set of roles, policies, and procedures needed to create, manage public-key encryption.

Public Key Infrastructure (PKI)

200

A method of trying to gather personal information using deceptive e-mails and websites.

Phishing

200

A well-defined, documented plan for responding to and managing the aftermath of a security breach or cyberattack.

Incident Response Plan (IRP)

200

The use of deception to manipulate individuals  into divulging confidential or personal information that may be used for fraudulent purpose.

Social Engineering
300

A method used to add security and privacy to private and public networks, like WiFi  Hotspots and the Internet.

VPN (Virtual Private Network)

300

A process of converting data into a fixed-sized string of characters, which is typically a hash code that is unique to the data.

Hashing

300

A software vulnerability that is unknown to those who should be interested in its mitigation (including the vendor or the target software).

Zero-Day Vulnerability

300

A strategy for making sure that end users do not send sensitive or critical information outside the corporate network.

Data Loss Prevention (DLP)

300

A reward paid to a person who identifies an error or vulnerability in a computer program or system.

Bug Bounty

400

A physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted  network, usually the internet.

DMZ (Demilitarized Zone)

400

A mathematical scheme for demonstrating the authenticity of digital messages or documents. 

Digital Signature

400

An interruption in an authorized user's access to a computer network, typically one caused with malicious intent.

Denial of Service (DoS)

400

The process of identifying, evaluating, and estimating the levels of risks involved in a situation, with the aim of determining an appropriate risk response.

Risk Assessment

400

A security training drill where one group (Red Team) act as attacker and another group (Blue Team) defends against the attack.

Red Team/Blue Team Exercises

500

An intermediary server separating end users from the websites they browse.

Proxy Server

500

A type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.

Symmetric Encryption

500

A type of malicious software designed to block access to a computer system until a sum of money is paid.

Ransomeware

500

Training provided to the employees to help them understand the importance of security and to learn how to recognize and deal with security threats.

Security Awareness Training

500

An ethical hacker who helps organizations find and fix security vulnerabilities.

White Hat Hacker

M
e
n
u