Navigating the Complexities of Zero-Day Vulnerabilities: Comprehensive Strategies for Cybersecurity Defense and Risk Management - Pentestmag

Navigating the Complexities of Zero-Day Vulnerabilities: Comprehensive Strategies for Cybersecurity Defense and Risk Management

Jun 26, 2024

Cyber Security means the practice of protecting computer systems, networks, and sensitive data from unauthorized access or malicious attacks.

It can be divided into 7 key sub-domains.

Network Security

Network security ensures that users with proper authorization have secure access to network resources while preventing unauthorized access

Cloud Security

Data, cloud infrastructure, and cloud-based services are all secured by cloud security for an organization. Users are responsible for protecting their stored data, while the cloud provider is responsible for the security of the services they offer.

Endpoint Security

Endpoint security shields endpoint devices and servers as well as their users, from malicious attacks like phishing, ransomware, and other cyber threats.

Mobile Security

Mobile security safeguards personal data stored on mobile devices from theft, viruses, malicious apps, and threats associated with instant messaging.

IoT Security

IoT security is essential for preventing data breaches, as Internet of Things (IoT) devices  exchange data over the Internet, which can be vulnerable to interception if not properly secured.

Application Security

Application security prevents bot attacks and unauthorized interactions with applications and APIs, ensuring they are not compromised.

Information Security

Information security protects an organization’s sensitive business information and data assets from unauthorized access.

1.2.  What is a Cyber-attack?

The goal of a cyberattack is to gain unauthorized access to an individual's or a corporation's computers or network to steal, alter, or delete data. Cyberattacks can be prepared by individuals or groups for criminal, political, or personal reasons.

Some of the common types of....

July 2, 2024

Author

Lochana Dissanayake | Thulani Kalatuwawa | Sachith Fernando |Lochana Koralage: (IIT Professional Development Unit Sri lanka)
Latest Articles
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023