Author: DKALYA

InfoSecWOTD#16 Backdoor 🚪

#InfosecWOTD Day 16 is

#Backdoor 🚪 

Backdoors in technology or devices is a secret or undocumented vulnerability in computer software or hardware which is sometimes intentionally maintained or put in place by developers and engineers to gain remote access.

As this is something undocumented in most cases, when found by certain individuals with malicious intent can be used to gain unauthorized remote access and exploitation of such devices/systems.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning! A new word* will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD#learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #APT #HACKERS #THREATS #backdoor

InfoSecWOTD#15 APT 💀⚓

Today’s #infosec Word of the Day #15 is

#APT 💀⚓

It stands for Advanced Persistent Threat. A threat actor who is acting for a organized crime operative such as a nation state or state sponsored criminal group.

They are typically well funded, use cutting edge technology and target high value companies to conduct cyber espionage, theft of intellectual property for financial gains.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning! A new word* will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD. #learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #APT #HACKERS #THREATS

InfoSecWOTD#14 NGFW 🔥🧱

Today’s #infosec Word of the Day #14 is

#NGFW 🔥🧱

In computer networking, It stands for Next-Generation Firewall (FW). There are many kinds of FWs. For example, a stateful firewall, monitors & detects states of all traffic(data) on a network to track & defend based on traffic patterns & flows. There are other types FWs and are commonly grouped as traditional FWs.

An NGFW provides capabilities beyond a traditional, stateful firewall. While a traditional firewall typically provides stateful inspection of incoming and outgoing network traffic, a next-generation firewall includes features like application awareness (whitelisting/blacklisting), intrusion detection & prevention, & cloud-delivered threat intelligence, & more.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation & keep #Learning!.

Are you looking for the previous word of the day? Just search #INFOSECWOTD. #learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #NGFW #Firewall #IPS #IDS #ApplicationWhitelisting #Network #CISCO #FORTINET #Checkpoint

InfoSecWOTD#13 Warm Site 🌓

Today’s #infosec Word of the Day #13 is

#WARMSite 🌓

It is summer in most parts of the world but a warm site is not what you think it is. A warm site is a middle ground between two disaster recovery options, A Hot site 🌕 and a Cold site 🌑, in your Disaster Recovery Planning (DRP).

A hot site is a backup facility that represents a mirrored copy of the primary production center. A cold site represents the same work area, recovery space, and infrastructure support as a hot site, but they don’t function as a complete mirrored copy of the primary production center.

So the warm site is simply a backup facility with all of the primary production equipment without the actual data or information, a middle ground between hot and cold site.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!. A new word* will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD and you will be able to find them. #learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #Hotsite #warmsite #Coldsite #DRP

InfoSecWOTD#12 #DRP 🔋 🔌

Today’s #infosec Word of the Day #12 is

#DRP 🔋 🔌

DRP stands for Disaster Recovery Plan. It is simply a plan for any business to be able to access the various components of information computer technology after a disaster strikes. #INFOSECWOTD

#DRP is often misunderstood or not properly implemented and is often confused with BCP – Business Continuity Plan. Which is a more comprehensive plan to make sure business can continue business operations through different challenges such as a break in supply chain, disaster and anything that is considered a business interruption. #INFOSECWOTD

Want to learn more in depth? Check out my article on ICSBits blog here: https://lnkd.in/e74vRa3

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!. A new word* will be posted tomorrow.

Are you looking for the previous word of the day? Just do a search for #INFOSECWOTD and you will be able to find them.

#learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #BCP #DRP #DR #RiskAssessment

InfoSecWOTD#11 TPM ✅🛡

Today’s #infosec Word of the Day #11 is

#TPM ✅🛡

TPM stands for Trusted Platform Module. It is a little piece of hardware that sits on your motherboard that has just one important function which is to generate and store cryptographic keys which are then used to authenticate your device. It is also called a cryptoprocessor.

#TPM is trending in the NEWS lately because #Microsoft just announced that the new #Windows11 will only run on a device that has some form of TPM. Here is a good #theVerge article: https://lnkd.in/e7CRUXK

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!. A new word* will be posted tomorrow. Are you looking for the previous word of the day? Just do a search for #INFOSECWOTD and you will be able to find them.

#learning!#cybersecurityawareness #cybersecurity#ransomware #INFOSECWOTD #Windows11 #TPM

InfoSecWOTD#10 PII 🧍

Today’s #infosec Word of the Day #10 is

#PII 🧍

PII stands for Personally identifiable information. Any data that can identify an individual directly or indirectly. Some of the examples are name, address, social security number, telephone number, email address, etc.,

The loss of PII can result in substantial harm to individuals, including identity theft or other fraudulent use of the information. Recent leak of 700 million users of LinkedIn is an example. LinkedIn users should use caution when clicking on emails and be aware of social engineering attacks as this leak greatly increases the risks to especially LinkedIn users.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!

A new word* will be posted tomorrow. Are you looking for previous word of the day? Just do a search for #INFOSECWOTD and you will be able to find them.

#learning!#cybersecurityawareness #cybersecurity #smurfattack #ddosattacks #DDos #PII #privacy

InfoSecWOTD#9 Smurfattack 😈

Today’s #infosec Word of the Day #9 is

#Smurfattack 😈

Smurf attack is a type of Distributed Denial of Service attack (DDoS). The name Smurf comes from the exploit / tool that was used which is called Smurf and it exploits vulnerabilities of the Internet Protocol (IP) and Internet Control Message Protocols (ICMP).

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!

A new word* will be posted tomorrow. Are you looking for previous word of the day? Just do a search for #INFOSECWOTD and you will be able to find them.

#learning!#cybersecurityawareness #cybersecurity #smurfattack #ddosattacks #DDos

InfoSecWOTD#8 RansomCloud 💀☁️

Today’s #infosec Word of the Day #8 is

#RansomCloud 💀☁️

RansomCloud is Ransomware that targets your cloud data. Basically. it works similar to a ransomware attack but will get system level access to your cloud environment through various means, one of them is #phishing. Once it has access to the cloud infrastructure, it runs its process of scanning and encryption of data (emails, Databases etc.) over the cloud.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!. A new word* will be posted tomorrow. Are you looking for previous word of the day? Just do a search for #INFOSECWOTD and you will be able to find them.

#learning!#ransomcloud #cybersecurityawareness #cybersecurity #phising #ransomware #INFOSECWOTD

InfoSecWOTD#7 OT Cybersecurity 🧿

Today’s #infosec Word of the Day #7 is

#otcybersecurity 🧿

OT security / OT cybersecurity is the protection of the OT systems and assets from cybersecurity incidents due to the increased connectivity between cyber and physical realms.

Operational Technology (OT) is the use of hardware and software to achieve industrial process automation. Essentially, OT helps in detecting or causing a change in the process through the direct monitoring and/or control of physical devices.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!. A new word* will be posted tomorrow. Are you looking for previous word of the day? Just do a search for #INFOSECWOTD and you will be able to find them.

#threatassessment #cybersecurityawareness #cybersecurity #blueteam #penetrationtesting #INFOSECWOTD