- Encryption: The process of converting information into a code to prevent unauthorized access, ensuring data confidentiality and integrity.
- Firewall: A security barrier that monitors and controls incoming and outgoing network traffic, typically acting as a barrier between trusted internal networks and untrusted external networks.
- Phishing: A cyber attack method where attackers impersonate legitimate entities to deceive individuals into revealing sensitive information such as passwords or financial details.
- Two-Factor Authentication (2FA): A security process that requires users to provide two different authentication factors (e.g., password and a unique code sent to a mobile device) to access a system or account.
- Zero-Day Vulnerability: A security flaw in software or hardware that is unknown to the vendor or developers, making it exploitable by attackers before a fix or patch is available.
- Incident Response: A structured approach to addressing and managing the aftermath of a security breach or cyber attack aimed at limiting damage and restoring normal operations.
- Compliance: Adherence to legal, industry, or organizational standards and regulations related to security and privacy, ensuring that systems and practices meet specified requirements.
- Patch Management: The process of acquiring, testing, and installing updates (patches) for software or firmware to address security vulnerabilities and improve functionality.