When computer resources (CPU, memory, GPU) are used to mine cryptocurrency.
What is Crypto-jacking
The act or practice of splitting a computer network into sub-networks.
What is Segmentation?
When a user logs in with a single ID and password to gain access to any of several related systems.
What is Single Sign-On (SSO)?
Security services that have been outsourced to a service provider.
What are Managed Security Services (MSS)?
Is an integrated solution that has the following capabilities: anti-malware, personal firewall, port and device control.
What is an Endpoint Protection Platform (EPP)?
How data is collected, aggregated, distributed and served to monitoring and analytics tools.
What is Network Visibility?
It filters, monitors, and blocks HTTP traffic to and from a web application
What is a Web Application Firewall (WAF)?
The combination of people, processes, and technology to improve an organization's security posture, making machines do task-oriented 'human work'.
What is Security Automation and Orchestration?
Promotes heightened awareness around cyber risks and threats.
What is User Awareness Training?
The techniques cyber attackers use to progressively move through a network.
What is Lateral Movement?
It is the process of safeguarding important information from corruption, compromise or loss.
What is Data Protection?
Refers to the security architecture, tools and processes that ensure the security of an entire computing platform and its associated applications & data.
What is Platform Security?