Author: DKALYA

InfoSecWOTD#15 APT πŸ’€βš“

Today’s #infosec Word of the Day #15 is

#APT πŸ’€βš“

It stands for Advanced Persistent Threat. A threat actor who is acting for a organized crime operative such as a nation state or state sponsored criminal group.

They are typically well funded, use cutting edge technology and target high value companies to conduct cyber espionage, theft of intellectual property for financial gains.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning! A new word* will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD. #learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #APT #HACKERS #THREATS

InfoSecWOTD#14 NGFW πŸ”₯🧱

Today’s #infosec Word of the Day #14 is

#NGFW πŸ”₯🧱

In computer networking, It stands for Next-Generation Firewall (FW). There are many kinds of FWs. For example, a stateful firewall, monitors & detects states of all traffic(data) on a network to track & defend based on traffic patterns & flows. There are other types FWs and are commonly grouped as traditional FWs.

An NGFW provides capabilities beyond a traditional, stateful firewall. While a traditional firewall typically provides stateful inspection of incoming and outgoing network traffic, a next-generation firewall includes features like application awareness (whitelisting/blacklisting), intrusion detection & prevention, & cloud-delivered threat intelligence, & more.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation & keep #Learning!.

Are you looking for the previous word of the day? Just search #INFOSECWOTD. #learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #NGFW #Firewall #IPS #IDS #ApplicationWhitelisting #Network #CISCO #FORTINET #Checkpoint

InfoSecWOTD#13 Warm Site πŸŒ“

Today’s #infosec Word of the Day #13 is

#WARMSite πŸŒ“

It is summer in most parts of the world but a warm site is not what you think it is. A warm site is a middle ground between two disaster recovery options, A Hot site πŸŒ• and a Cold site πŸŒ‘, in your Disaster Recovery Planning (DRP).

A hot site is a backup facility that represents a mirrored copy of the primary production center. A cold site represents the same work area, recovery space, and infrastructure support as a hot site, but they don’t function as a complete mirrored copy of the primary production center.

So the warm site is simply a backup facility with all of the primary production equipment without the actual data or information, a middle ground between hot and cold site.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!. A new word* will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD and you will be able to find them. #learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #Hotsite #warmsite #Coldsite #DRP

InfoSecWOTD#12 #DRP πŸ”‹ πŸ”Œ

Today’s #infosec Word of the Day #12 is

#DRP πŸ”‹ πŸ”Œ

DRP stands for Disaster Recovery Plan. It is simply a plan for any business to be able to access the various components of information computer technology after a disaster strikes. #INFOSECWOTD

#DRP is often misunderstood or not properly implemented and is often confused with BCP – Business Continuity Plan. Which is a more comprehensive plan to make sure business can continue business operations through different challenges such as a break in supply chain, disaster and anything that is considered a business interruption. #INFOSECWOTD

Want to learn more in depth? Check out my article on ICSBits blog here: https://lnkd.in/e74vRa3

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!. A new word* will be posted tomorrow.

Are you looking for the previous word of the day? Just do a search for #INFOSECWOTD and you will be able to find them.

#learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #BCP #DRP #DR #RiskAssessment

InfoSecWOTD#11 TPM βœ…πŸ›‘

Today’s #infosec Word of the Day #11 is

#TPM βœ…πŸ›‘

TPM stands for Trusted Platform Module. It is a little piece of hardware that sits on your motherboard that has just one important function which is to generate and store cryptographic keys which are then used to authenticate your device. It is also called a cryptoprocessor.

#TPM is trending in the NEWS lately because #Microsoft just announced that the new #Windows11 will only run on a device that has some form of TPM. Here is a good #theVerge article: https://lnkd.in/e7CRUXK

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!. A new word* will be posted tomorrow. Are you looking for the previous word of the day? Just do a search for #INFOSECWOTD and you will be able to find them.

#learning!#cybersecurityawareness #cybersecurity#ransomware #INFOSECWOTD #Windows11 #TPM

InfoSecWOTD#10 PII 🧍

Today’s #infosec Word of the Day #10 is

#PII 🧍

PII stands for Personally identifiable information. Any data that can identify an individual directly or indirectly. Some of the examples are name, address, social security number, telephone number, email address, etc.,

The loss of PII can result in substantial harm to individuals, including identity theft or other fraudulent use of the information. Recent leak of 700 million users of LinkedIn is an example. LinkedIn users should use caution when clicking on emails and be aware of social engineering attacks as this leak greatly increases the risks to especially LinkedIn users.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!

A new word* will be posted tomorrow. Are you looking for previous word of the day? Just do a search for #INFOSECWOTD and you will be able to find them.

#learning!#cybersecurityawareness #cybersecurity #smurfattack #ddosattacks #DDos #PII #privacy

InfoSecWOTD#9 Smurfattack 😈

Today’s #infosec Word of the Day #9 is

#Smurfattack πŸ˜ˆ

Smurf attack is a type of Distributed Denial of Service attack (DDoS). The name Smurf comes from the exploit / tool that was used which is called Smurf and it exploits vulnerabilities of the Internet Protocol (IP) and Internet Control Message Protocols (ICMP).

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!

A new word* will be posted tomorrow. Are you looking for previous word of the day? Just do a search for #INFOSECWOTD and you will be able to find them.

#learning!#cybersecurityawareness #cybersecurity #smurfattack #ddosattacks #DDos

InfoSecWOTD#8 RansomCloud πŸ’€β˜οΈ

Today’s #infosec Word of the Day #8 is

#RansomCloud πŸ’€β˜οΈ

RansomCloud is Ransomware that targets your cloud data. Basically. it works similar to a ransomware attack but will get system level access to your cloud environment through various means, one of them is #phishing. Once it has access to the cloud infrastructure, it runs its process of scanning and encryption of data (emails, Databases etc.) over the cloud.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!. A new word* will be posted tomorrow. Are you looking for previous word of the day? Just do a search for #INFOSECWOTD and you will be able to find them.

#learning!#ransomcloud #cybersecurityawareness #cybersecurity #phising #ransomware #INFOSECWOTD

InfoSecWOTD#7 OT Cybersecurity 🧿

Today’s #infosec Word of the Day #7 is

#otcybersecurity 🧿

OT security / OT cybersecurity is the protection of the OT systems and assets from cybersecurity incidents due to the increased connectivity between cyber and physical realms.

Operational Technology (OT) is the use of hardware and software to achieve industrial process automation. Essentially, OT helps in detecting or causing a change in the process through the direct monitoring and/or control of physical devices.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!. A new word* will be posted tomorrow. Are you looking for previous word of the day? Just do a search for #INFOSECWOTD and you will be able to find them.

#threatassessment #cybersecurityawareness #cybersecurity #blueteam #penetrationtesting #INFOSECWOTD

InfoSecWOTD#6 Blue Team πŸ›‘

Today’s #infosec Word of the Day #6 is

#Blueteam πŸ›‘

You may have heard the term, Blue Team, sometimes also used in a discussion on security assessments. Also used is Pen Testing* & Red Team. The concept of the blue team & red team has their humble beginnings in the military. The idea behind this is that one group attacks another team & the second team tries to defend themselves. 

So a blue team is a group of individuals who work tirelessly to ensure security, identify security flaws, verify the effectiveness of each security measure, and make certain all security measures will continue to be effective after implementation. Essentially they work for the company from the inside.

That was it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep. A new word* will be posted tomorrow.

#learning!#threatassessment #cybersecurityawareness #cybersecurity #blueteam #penetrationtesting #INFOSECWOTD