Cyber Security

Cyber Security is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Snippet from Wikipedia: Computer security

Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

The field has become of significance due to the expanded reliance on computer systems, the Internet, and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to the complexity of information systems, both in terms of political usage and technology. Its primary goal is to ensure the system's dependability, integrity, and data privacy.

## ToDo ##

  • FIXME
  • Access Management
  • Active Directory Bridge
  • Active Directory Management
  • Active Directory Recovery
  • Anti-Malware Tools
  • ATP (Advanced Threat Protection)
  • Attack Surface Management (ASM)
  • Authorization Software
  • Automotive Cyber Security
  • Blockchain as a Service
  • Bot Management
  • Breach and Attack Simulation (BAS)
  • Certificate Management Software
  • Cloud Access Security Brokers (CASB)
  • Cloud and Data Center Security
  • Cloud Resource Access Management
  • Cloud Security Posture Management (CSPM)
  • Cloud-Native Application Protection Platforms (CNAPP)
  • Container Security
  • Customer Identity and Access Management
  • CWPP (Cloud Workload Protection Platforms)
  • Cyber Asset Attack Surface Management (CAASM)
  • Cybersecurity Skills Training Platforms
  • Data Loss Prevention (DLP)
  • Digital Asset Custody Services
  • Digital Asset Security Platforms
  • Digital Risk Protection
  • Directory Servers
  • Distributed Denial of Service (DDOS) Protection
  • DSPM- Data Security Posture Management
  • EDR (Endpoint Detection and Response)
  • Endpoint Compliance
  • Endpoint Encryption
  • Enterprise Blockchains
  • Enterprise Infrastructure VPN
  • Enterprise Password Managers
  • EPP (Endpoint Protection for Business)
  • Extended Detection and Response (XDR)
  • Firewall Security Management
  • Firewalls
  • Fraud Detection and Prevention
  • Identity and Access Management as a Service (IDaaS) (IAMaaS)
  • Identity Management (IM)
  • Information Security and Risk Consulting Services
  • Intrusion Detection and Prevention Software (IDPS)
  • IoT Security
  • IT Vendor Risk Management
  • Mainframe Security
  • Managed Detection and Response (MDR)
  • Managed Security Services
  • Microsegmentation Software
  • Mobile Data Protection
  • Mobile Identity
  • Mobile Threat Defense
  • Network Access Control (NAC)
  • Network Detection and Response (NDR)
  • Operational Technology (OT) Security
  • Penetration Testing Services
  • Privileged Access Management (PAM)
  • SaaS Security Posture Management (SSPM)
  • Secure Access Service Edge (SASE)
  • Security Awareness Training
  • Security Incident Response
  • Security Information and Event Management (SIEM)
  • Security Orchestration Automation and Response (SOAR)
  • Session Border Controllers (SBC)
  • Single Sign-On (SSO)
  • SOC as a Service
  • SSL VPN
  • SSL/TLS Decryption
  • Threat Deception Platforms
  • Threat Intelligence Platforms
  • Unified Threat Management (UTM)
  • User Activity Monitoring
  • User Behavior Analytics - UEBA
  • Virtualization Security
  • Vulnerability Management
  • Web Application Firewall (WAF)
  • Web Content Filtering
  • ZTNA
  • ZTNA as a Service
  • method/cyber_security.txt
  • Last modified: 2022/08/17 14:44
  • by Henrik Yllemo