Cyber Security

Cyber Security is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Snippet from Wikipedia: Computer security

Computer security, cybersecurity, digital security, or information technology security (IT security) is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

The field is significant due to the expanded reliance on computer systems, the Internet, and wireless network standards such as Bluetooth and Wi-Fi. It is also significant due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity is one of the most significant challenges of the contemporary world, due to both the complexity of information systems and the societies they support. Security is of especially high importance for systems that govern large-scale systems with far-reaching physical effects, such as power distribution, elections, and finance.

While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.

## ToDo ##

  • FIXME
  • Access Management
  • Active Directory Bridge
  • Active Directory Management
  • Active Directory Recovery
  • Anti-Malware Tools
  • ATP (Advanced Threat Protection)
  • Attack Surface Management (ASM)
  • Authorization Software
  • Automotive Cyber Security
  • Blockchain as a Service
  • Bot Management
  • Breach and Attack Simulation (BAS)
  • Certificate Management Software
  • Cloud Access Security Brokers (CASB)
  • Cloud and Data Center Security
  • Cloud Resource Access Management
  • Cloud Security Posture Management (CSPM)
  • Cloud-Native Application Protection Platforms (CNAPP)
  • Container Security
  • Customer Identity and Access Management
  • CWPP (Cloud Workload Protection Platforms)
  • Cyber Asset Attack Surface Management (CAASM)
  • Cybersecurity Skills Training Platforms
  • Data Loss Prevention (DLP)
  • Digital Asset Custody Services
  • Digital Asset Security Platforms
  • Digital Risk Protection
  • Directory Servers
  • Distributed Denial of Service (DDOS) Protection
  • DSPM- Data Security Posture Management
  • EDR (Endpoint Detection and Response)
  • Endpoint Compliance
  • Endpoint Encryption
  • Enterprise Blockchains
  • Enterprise Infrastructure VPN
  • Enterprise Password Managers
  • EPP (Endpoint Protection for Business)
  • Extended Detection and Response (XDR)
  • Firewall Security Management
  • Firewalls
  • Fraud Detection and Prevention
  • Identity and Access Management as a Service (IDaaS) (IAMaaS)
  • Identity Management (IM)
  • Information Security and Risk Consulting Services
  • Intrusion Detection and Prevention Software (IDPS)
  • IoT Security
  • IT Vendor Risk Management
  • Mainframe Security
  • Managed Detection and Response (MDR)
  • Managed Security Services
  • Microsegmentation Software
  • Mobile Data Protection
  • Mobile Identity
  • Mobile Threat Defense
  • Network Access Control (NAC)
  • Network Detection and Response (NDR)
  • Operational Technology (OT) Security
  • Penetration Testing Services
  • Privileged Access Management (PAM)
  • SaaS Security Posture Management (SSPM)
  • Secure Access Service Edge (SASE)
  • Security Awareness Training
  • Security Incident Response
  • Security Information and Event Management (SIEM)
  • Security Orchestration Automation and Response (SOAR)
  • Session Border Controllers (SBC)
  • Single Sign-On (SSO)
  • SOC as a Service
  • SSL VPN
  • SSL/TLS Decryption
  • Threat Deception Platforms
  • Threat Intelligence Platforms
  • Unified Threat Management (UTM)
  • User Activity Monitoring
  • User Behavior Analytics - UEBA
  • Virtualization Security
  • Vulnerability Management
  • Web Application Firewall (WAF)
  • Web Content Filtering
  • ZTNA
  • ZTNA as a Service
  • SOC
  • method/cyber_security.txt
  • Last modified: 2023/08/22 08:09
  • by Henrik Yllemo