0% found this document useful (0 votes)
66 views13 pages

Understanding Cybersecurity

Uploaded by

Nandini Sonekar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views13 pages

Understanding Cybersecurity

Uploaded by

Nandini Sonekar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

UNDERSTANDING

CYBERSECURITY
An Overview of Domains and Tools
Introduction to Cybersecurity

■ Cybersecurity is the practice of protecting systems, networks, and programs from digital
attacks.
■ Importance:
- Prevents data breaches
- Protects sensitive information
- Ensures business continuity
- Maintains privacy
Cybersecurity Domains

1. Network Security
2. Information Security
3. Application Security
4. Endpoint Security
5. Cloud Security
6. Identity and Access Management (IAM)
7. Security Operations
8. Incident Response
Domains Of
Cybersecurity
And Tools Used
For Them
Network Security

■ Definition: Measures taken to protect the integrity, confidentiality, and accessibility of


networks.
■ Tools:
Cis, Palo Alto Networks Next-Generation Firewall, Fortinet FortiGate
1. Firewalls -
2. Intrusion Detection Systems (IDS)- Snort, suricata, Solar winds security manager
3. Intrusion Prevention Systems (IPS)- McAfee network secueity platform, IBM ips, Check
point IPS
4. Virtual Private Networks (VPN)- Nord VPN, Cisco AnyConnect, OpenVPN
5. Network Access Control (NAC)- Cisco identity service engine, Aruba clearPass,
ForeScout Counter ACT
Information Security

■ Definition: Protection of information and data from unauthorized access, disclosure, alteration, and
destruction.
■ Tools:
1. Data Encryption Software- Vera Crypt, BitLocker, AxCrypt
2. Data Loss Prevention (DLP) Systems- Symantec Data Loss Prevention, McAfee Total Protection for Data
Loss Prevention, Digital Guardian
3. Identity Management Software- Okta Identity Management, Microsoft Azure Active Directory, IBM
Security Identity Governance and Intelligence
4. Security Information and Event Management (SIEM) Systems- Splunk Enterprise Security, IBM qRadar,
LogRhythm NextGen SIEM
5. Backup and Recovery Tools- Veeam Backup & Replication, Acronis Cyber Backup, Commvault Backup
& Recovery
Application Security

■ Definition: Measures to protect applications from threats and vulnerabilities throughout their
lifecycle.
■ Tools:
1. Web Application Firewalls (WAF)- Imperva WAF, Akamai Kona Site Defender, AWS WAF
2. Static Application Security Testing (SAST)- Checkmarx, Veracode, Fortify Static Code Analyzer
3. Dynamic Application Security Testing (DAST)- OWASP ZAP (Zed Attack Proxy), Burp Suite,
Acunetix
4. Runtime Application Self-Protection (RASP)- Contrast Security, Imperva RASP, Signal
Sciences RASP
5. Vulnerability Scanners- Nessus, QualysGuard, OpenVAS
Endpoint Security

■ Definition: Protection of endpoint devices like desktops, laptops, and mobile devices from
cyber threats.
■ Tools:
1. Antivirus Software- Norton Antivirus, McAfee Total Protection, Bitdefender Antivirus
2. Endpoint Detection and Response (EDR)- CrowdStrike Falcon, Carbon Black, SentinelOne
3. Mobile Device Management (MDM)- VMware AirWatch, Microsoft Intune, MobileIron
4. Endpoint Encryption- Symantec Endpoint Encryption, McAfee Complete Data Protection,
Sophos SafeGuard
5. Patch Management Tools- SolarWinds Patch Manager, Ivanti Patch for Windows,
ManageEngine Patch Manager Plus
Cloud Security

■ Definition: Protection of data, applications, and services that operate in the cloud.
■ Tools:
1. Cloud Access Security Brokers (CASB)- Microsoft Cloud App Security, McAfee
MVISION Cloud, NetsCloud
2. Cloud Security Posture Management (CSPM)- Prisma Cloud, AWS Security Hub,
Microsoft Azure Security Center
3. Cloud Workload Protection Platforms (CWPP)- Trend Micro Deep Security, Symantec
Cloud Workload Protection, Aqua Security
4. Identity and Access Management (IAM)- Okta, Ping Identity, OneLogin
5. Encryption Tools- Thales CipherTrust, IBM Guardium, Boxcryptor
Identity and Access Management (IAM)

■ Definition: Framework of policies and technologies to ensure that the right individuals
access the right resources.
■ Tools:
1. Single Sign-On (SSO)- OneLogin SSO, Ping Identity SSO, Okta SSO
2. Multi-Factor Authentication (MFA)- Duo security, Google Authenticator, Authy
3. Privileged Access Management (PAM)- CyberArk, BeyondTrust, Thycotic Secret Server
4. Identity Governance and Administration (IGA)- SailPoint IdentityIQ, RSA Identity
Governance and Lifecycle, Oracle Identity Governance
5. Biometric Authentication Systems- Face ID(Apple), Windows Hello(Microsoft), Bio Key
Security Operations

■ Definition: Ongoing activities to monitor and protect organizational assets.


■ Tools:
1. Security Information and Event Management (SIEM)- Splunk, ArkSight, LogRythym
2. Threat Intelligence Platforms- Recorded Future, ThreatConnect, Anomali
3. Security Orchestration, Automation, and Response (SOAR)- Palo Alto Networks
Cortex XSOAR, IBM Resilent, Siemplify
4. Log Management Tools - SolarWinds Log & Event Manager, GrayLog, LogDNA
5. Network Traffic Analysis (NTA) Tools- ExtraHop, DarkTrace, Vectra AI
Incident Response

■ Definition: Methodologies for detecting, responding to, and recovering from


cybersecurity incidents.
■ Tools:
1. Incident Response Platforms- IBM Resilient, D3 Security, Palo Alto Networks Cortex
XSOAR
2. Forensic Tools- EnCase, FTK (Forensic Toolkit), Slueth Kit
3. Threat Hunting Tools- CrowdStrike Falcon, Carbon Black Response, RSA Witness
4. Communication Tools- Slack, Teams, Zoom
5. Case Management Systems- JIRA, ServiceNow, RemedyForce

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy