Cyber Security
Cyber Security is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
- Snippet from Wikipedia: Computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is the protection of computer software, systems and networks from threats that can lead to unauthorized information disclosure, theft or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.
The significance of the field stems from the expanded reliance on computer systems, the Internet, and wireless network standards. Its importance is further amplified by the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity has emerged as one of the most significant new challenges facing the contemporary world, due to both the complexity of information systems and the societies they support. Security is particularly crucial for systems that govern large-scale systems with far-reaching physical effects, such as power distribution, elections, and finance.
Although many aspects of computer security involve digital security, such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering. IT security is not a perfect subset of information security, therefore does not completely align into the security convergence schema.
Related:
External links:
## ToDo ##
- Access Management
- Active Directory Bridge
- Active Directory Management
- Active Directory Recovery
- Anti-Malware Tools
- ATP (Advanced Threat Protection)
- Attack Surface Management (ASM)
- Authorization Software
- Automotive Cyber Security
- Blockchain as a Service
- Bot Management
- Breach and Attack Simulation (BAS)
- Certificate Management Software
- Cloud Access Security Brokers (CASB)
- Cloud and Data Center Security
- Cloud Resource Access Management
- Cloud Security Posture Management (CSPM)
- Cloud-Native Application Protection Platforms (CNAPP)
- Container Security
- Customer Identity and Access Management
- CWPP (Cloud Workload Protection Platforms)
- Cyber Asset Attack Surface Management (CAASM)
- Cybersecurity Skills Training Platforms
- Data Loss Prevention (DLP)
- Digital Asset Custody Services
- Digital Asset Security Platforms
- Digital Risk Protection
- Directory Servers
- Distributed Denial of Service (DDOS) Protection
- DSPM- Data Security Posture Management
- EDR (Endpoint Detection and Response)
- Endpoint Compliance
- Endpoint Encryption
- Enterprise Blockchains
- Enterprise Infrastructure VPN
- Enterprise Password Managers
- EPP (Endpoint Protection for Business)
- Extended Detection and Response (XDR)
- Firewall Security Management
- Firewalls
- Fraud Detection and Prevention
- Identity and Access Management as a Service (IDaaS) (IAMaaS)
- Identity Management (IM)
- Information Security and Risk Consulting Services
- Intrusion Detection and Prevention Software (IDPS)
- IoT Security
- IT Vendor Risk Management
- Mainframe Security
- Managed Detection and Response (MDR)
- Managed Security Services
- Microsegmentation Software
- Mobile Data Protection
- Mobile Identity
- Mobile Threat Defense
- Network Access Control (NAC)
- Network Detection and Response (NDR)
- Operational Technology (OT) Security
- Penetration Testing Services
- Privileged Access Management (PAM)
- SaaS Security Posture Management (SSPM)
- Secure Access Service Edge (SASE)
- Security Awareness Training
- Security Incident Response
- Security Information and Event Management (SIEM)
- Security Orchestration Automation and Response (SOAR)
- Session Border Controllers (SBC)
- Single Sign-On (SSO)
- SOC as a Service
- SSL VPN
- SSL/TLS Decryption
- Threat Deception Platforms
- Threat Intelligence Platforms
- Unified Threat Management (UTM)
- User Activity Monitoring
- User Behavior Analytics - UEBA
- Virtualization Security
- Vulnerability Management
- Web Application Firewall (WAF)
- Web Content Filtering
- ZTNA
- ZTNA as a Service
- SOC