Category: InfoSecWOTD

InfoSecWOTD#21 Ciphertext ๐Ÿงฎ

Today’s #InfosecWOTD Day 21 is

#Ciphertext ๐Ÿงฎ 

When you take a plain text and apply encryption algorithm, the resulting text is called ciphertext. The algorithm is called a cipher.

The word cipher (cypher) has its origins in the Arabic word ุตูุฑ sifr which means zero and it took many centuries for the word to mean encoding.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning! A new word will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD. #learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #cipher #ciphertext #cypher

InfoSecWOTD#19 Cryptojacking ๐Ÿ’ธ๐Ÿ˜ˆ

Today’s #InfosecWOTD Day 19 is

#Cryptojacking ๐Ÿ’ธ๐Ÿ˜ˆ

Cryptojacking is the unauthorized use of personal or enterprise systems for crypto mining. The term crypto mining refers to an activity of solving cryptographic equations through the use of computing hardware to gain cryptocurrencies such as Litecoin, Dogecoin, Bitcoin etc.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning! A new word will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD. #learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #cryptocurrency #crypto #dogecoin #bitcoin #Cryptojacking

InfoSecWOTD#18 RaaS ๐Ÿ’€๐Ÿ’ฐโ˜

Today’s #InfosecWOTD Day 18 is

#RaaS ๐Ÿ’€๐Ÿ’ฐโ˜

It stands for Ransomware as a Service. This type of cloud offering is illegal and works very similar to any other cloud services (anything as a service XaaS) and is used by bad actors to amplify the ransomware attacks.

RaaS is a subscription-based model which enables its customers or affiliates to use existing ransomware tools and other exploits to execute ransomware attacks.

In the recent months, a malicious group REvil has emerged very strong in conducting these RaaS based attacks and is behind the Kaseya VSA Attack. Read more here: https://unit42.paloaltonetworks.com/revil-threat-actors/

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning! A new word will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD#learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #RaaS #ransomwareattack #kaseya #kaseyavsa

InfoSecWOTD#17 Catfishing ๐Ÿฑ๐ŸŽฃ

Here is fun #InfosecWOTD Day 17 and it is

#catfishing ๐Ÿฑ๐ŸŽฃ

Catfishing and phishing has a lot of similarities. It is a form of social engineering attack where an individual aka the catfish, sets up a false personal profile on a social networking site such as LinkedIn for fraudulent or deceptive purposes.

You can apply very similar strategies to avoid becoming a victim of a catfishing attack.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning! A new word will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD#learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #Catfish #catfishing #phishingattacks

InfoSecWOTD#16 Backdoor ๐Ÿšช

#InfosecWOTD Day 16 is

#Backdoor ๐Ÿšช 

Backdoors in technology or devices is a secret or undocumented vulnerability in computer software or hardware which is sometimes intentionally maintained or put in place by developers and engineers to gain remote access.

As this is something undocumented in most cases, when found by certain individuals with malicious intent can be used to gain unauthorized remote access and exploitation of such devices/systems.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning! A new word* will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD#learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #APT #HACKERS #THREATS #backdoor

InfoSecWOTD#15 APT ๐Ÿ’€โš“

Today’s #infosec Word of the Day #15 is

#APT ๐Ÿ’€โš“

It stands for Advanced Persistent Threat. A threat actor who is acting for a organized crime operative such as a nation state or state sponsored criminal group.

They are typically well funded, use cutting edge technology and target high value companies to conduct cyber espionage, theft of intellectual property for financial gains.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning! A new word* will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD. #learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #APT #HACKERS #THREATS

InfoSecWOTD#14 NGFW ๐Ÿ”ฅ๐Ÿงฑ

Today’s #infosec Word of the Day #14 is

#NGFW ๐Ÿ”ฅ๐Ÿงฑ

In computer networking, It stands for Next-Generation Firewall (FW). There are many kinds of FWs. For example, a stateful firewall, monitors & detects states of all traffic(data) on a network to track & defend based on traffic patterns & flows. There are other types FWs and are commonly grouped as traditional FWs.

An NGFW provides capabilities beyond a traditional, stateful firewall. While a traditional firewall typically provides stateful inspection of incoming and outgoing network traffic, a next-generation firewall includes features like application awareness (whitelisting/blacklisting), intrusion detection & prevention, & cloud-delivered threat intelligence, & more.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation & keep #Learning!.

Are you looking for the previous word of the day? Just search #INFOSECWOTD. #learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #NGFW #Firewall #IPS #IDS #ApplicationWhitelisting #Network #CISCO #FORTINET #Checkpoint

InfoSecWOTD#13 Warm Site ๐ŸŒ“

Today’s #infosec Word of the Day #13 is

#WARMSite ๐ŸŒ“

It is summer in most parts of the world but a warm site is not what you think it is. A warm site is a middle ground between two disaster recovery options, A Hot site ๐ŸŒ• and a Cold site ๐ŸŒ‘, in your Disaster Recovery Planning (DRP).

A hot site is a backup facility that represents a mirrored copy of the primary production center. A cold site represents the same work area, recovery space, and infrastructure support as a hot site, but they donโ€™t function as a complete mirrored copy of the primary production center.

So the warm site is simply a backup facility with all of the primary production equipment without the actual data or information, a middle ground between hot and cold site.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!. A new word* will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD and you will be able to find them. #learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #Hotsite #warmsite #Coldsite #DRP

InfoSecWOTD#12 #DRP ๐Ÿ”‹ ๐Ÿ”Œ

Today’s #infosec Word of the Day #12 is

#DRP ๐Ÿ”‹ ๐Ÿ”Œ

DRP stands for Disaster Recovery Plan. It is simply a plan for any business to be able to access the various components of information computer technology after a disaster strikes. #INFOSECWOTD

#DRP is often misunderstood or not properly implemented and is often confused with BCP – Business Continuity Plan. Which is a more comprehensive plan to make sure business can continue business operations through different challenges such as a break in supply chain, disaster and anything that is considered a business interruption. #INFOSECWOTD

Want to learn more in depth? Check out my article on ICSBits blog here: https://lnkd.in/e74vRa3

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!. A new word* will be posted tomorrow.

Are you looking for the previous word of the day? Just do a search for #INFOSECWOTD and you will be able to find them.

#learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #BCP #DRP #DR #RiskAssessment

InfoSecWOTD#11 TPM โœ…๐Ÿ›ก

Today’s #infosec Word of the Day #11 is

#TPM โœ…๐Ÿ›ก

TPM stands for Trusted Platform Module. It is a little piece of hardware that sits on your motherboard that has just one important function which is to generate and store cryptographic keys which are then used to authenticate your device. It is also called a cryptoprocessor.

#TPM is trending in the NEWS lately because #Microsoft just announced that the new #Windows11 will only run on a device that has some form of TPM. Here is a good #theVerge article: https://lnkd.in/e7CRUXK

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!. A new word* will be posted tomorrow. Are you looking for the previous word of the day? Just do a search for #INFOSECWOTD and you will be able to find them.

#learning!#cybersecurityawareness #cybersecurity#ransomware #INFOSECWOTD #Windows11 #TPM