Understanding Cybersecurity
Understanding Cybersecurity
CYBERSECURITY
An Overview of Domains and Tools
Introduction to Cybersecurity
■ Cybersecurity is the practice of protecting systems, networks, and programs from digital
attacks.
■ Importance:
- Prevents data breaches
- Protects sensitive information
- Ensures business continuity
- Maintains privacy
Cybersecurity Domains
1. Network Security
2. Information Security
3. Application Security
4. Endpoint Security
5. Cloud Security
6. Identity and Access Management (IAM)
7. Security Operations
8. Incident Response
Domains Of
Cybersecurity
And Tools Used
For Them
Network Security
■ Definition: Protection of information and data from unauthorized access, disclosure, alteration, and
destruction.
■ Tools:
1. Data Encryption Software- Vera Crypt, BitLocker, AxCrypt
2. Data Loss Prevention (DLP) Systems- Symantec Data Loss Prevention, McAfee Total Protection for Data
Loss Prevention, Digital Guardian
3. Identity Management Software- Okta Identity Management, Microsoft Azure Active Directory, IBM
Security Identity Governance and Intelligence
4. Security Information and Event Management (SIEM) Systems- Splunk Enterprise Security, IBM qRadar,
LogRhythm NextGen SIEM
5. Backup and Recovery Tools- Veeam Backup & Replication, Acronis Cyber Backup, Commvault Backup
& Recovery
Application Security
■ Definition: Measures to protect applications from threats and vulnerabilities throughout their
lifecycle.
■ Tools:
1. Web Application Firewalls (WAF)- Imperva WAF, Akamai Kona Site Defender, AWS WAF
2. Static Application Security Testing (SAST)- Checkmarx, Veracode, Fortify Static Code Analyzer
3. Dynamic Application Security Testing (DAST)- OWASP ZAP (Zed Attack Proxy), Burp Suite,
Acunetix
4. Runtime Application Self-Protection (RASP)- Contrast Security, Imperva RASP, Signal
Sciences RASP
5. Vulnerability Scanners- Nessus, QualysGuard, OpenVAS
Endpoint Security
■ Definition: Protection of endpoint devices like desktops, laptops, and mobile devices from
cyber threats.
■ Tools:
1. Antivirus Software- Norton Antivirus, McAfee Total Protection, Bitdefender Antivirus
2. Endpoint Detection and Response (EDR)- CrowdStrike Falcon, Carbon Black, SentinelOne
3. Mobile Device Management (MDM)- VMware AirWatch, Microsoft Intune, MobileIron
4. Endpoint Encryption- Symantec Endpoint Encryption, McAfee Complete Data Protection,
Sophos SafeGuard
5. Patch Management Tools- SolarWinds Patch Manager, Ivanti Patch for Windows,
ManageEngine Patch Manager Plus
Cloud Security
■ Definition: Protection of data, applications, and services that operate in the cloud.
■ Tools:
1. Cloud Access Security Brokers (CASB)- Microsoft Cloud App Security, McAfee
MVISION Cloud, NetsCloud
2. Cloud Security Posture Management (CSPM)- Prisma Cloud, AWS Security Hub,
Microsoft Azure Security Center
3. Cloud Workload Protection Platforms (CWPP)- Trend Micro Deep Security, Symantec
Cloud Workload Protection, Aqua Security
4. Identity and Access Management (IAM)- Okta, Ping Identity, OneLogin
5. Encryption Tools- Thales CipherTrust, IBM Guardium, Boxcryptor
Identity and Access Management (IAM)
■ Definition: Framework of policies and technologies to ensure that the right individuals
access the right resources.
■ Tools:
1. Single Sign-On (SSO)- OneLogin SSO, Ping Identity SSO, Okta SSO
2. Multi-Factor Authentication (MFA)- Duo security, Google Authenticator, Authy
3. Privileged Access Management (PAM)- CyberArk, BeyondTrust, Thycotic Secret Server
4. Identity Governance and Administration (IGA)- SailPoint IdentityIQ, RSA Identity
Governance and Lifecycle, Oracle Identity Governance
5. Biometric Authentication Systems- Face ID(Apple), Windows Hello(Microsoft), Bio Key
Security Operations