Cyber Security

Security Breach

Any incident that results in unauthorized access to computer data, applications, networks or devices.

ACAS

Stands for Assured Compliance Assessment Solution. An integrated software solution that provides automated network vulnerability scanning, configuration assessment, and network discovery. Consists of a suite of COTS applications. It is mandated for the Department of Defense (DoD) use by various U.S. Cyber Command task orders.

Access Control List

A set of rules that specify precise standards for destinations and protocols allowed or forbidden. It is used to filter traffic in networks as required by the security policy.

APT

A type of cyber attack in which the attacker gains ongoing access to the system to mine highly sensitive data. The attacker remains undetected for an extended period of time.

Antivirus

(of software) originally designed to detect and remove viruses from computers, can also protect against a wide variety of threats, including other types of malicious software, such as keyloggers, browser hijackers, Trojan horses, worms, rootkits, spyware, adware, botnets and ransomware.

Anti-Malware

Software tools and programs designed to prevent, detect and remove malicious software, or malware, on IT systems, from infecting computer systems or electronic devices.

Anti Spam Firewall

A software or hardware appliance-based firewall. It is used to keep spam and malware from entering a system.

ArcSight

Provides big data security analytics and intelligence software for security information and event management (SIEM) and log management solutions. ArcSight ESM collects, correlates, and reports on security event information.

Authentication

A process of determining and confirming user´s identity. Ensures whether someone or something is who or what it declares itself to be.

CCNA

Stands for Cisco Certified Network Associate. An associate-level Cisco career certification.

CCNP

Stands for Cisco Certified Network Professional. A professional-level Cisco Career Certification.

CEH

Stands for Certified Ethical Hacker. A certification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system. It is issued by the organization EC-Council.

Check Point Firewall

The Check Point Firewall is part of the Software Blade architecture that supplies "next-generation" firewall features, including: VPN and mobile device connectivity, identity and computer awareness, Internet access and filtering, application control, intrusion and threat prevention, data loss prevention.

CISA

Stands for Certified Information Systems Auditor. Issued by ISACA for the people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected. It demonstrates that an individual is is able to assess vulnerabilities, report on compliance and institute controls within the enterprise.

Cisco

Cisco is an American multinational technology conglomerate. Cisco develops, manufactures and sells networking hardware, software, telecommunications equipment and other high-technology services and products.

Cisco ASA

The ASA in Cisco ASA stands for Adaptive Security Appliance. In brief, Cisco ASA is a security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities.

Cisco Certifications

A list of the Certifications offered by Cisco Systems. They offer five levels of network certification: Entry, Associate, Professional, Expert, and Architect.

Cisco Certified CyberOps Associate

An associate-level Cisco career certification.

Cisco ISE

Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company's routers and switches.

Cisco switches

Cisco switches are switches produced by Cisco Systems, Inc.

Cisco Technologies

Cisco provides IT products and services across five major technology areas: Networking (including Ethernet, optical, wireless and mobility), Security, Collaboration (including voice, video, and data), Data Center, and the Internet of Things.

CISM

Stands for Certified Information Security Manager. Issued by ISACA. Demonstrates that an individual is able to manage, design, and oversee and assess an enterprise’s information security.

CISSP

Stands for Certified Information Systems Security Professional. Independent information security certification issued by the International Information System Security Certification Consortium, also known as (ISC)². Demonstrates that an individual is able to effectively design, implement and manage a best-in-class cybersecurity program.

Cloud Security

A set of policies, controls, procedures, and technologies that ensure the protection of cloud-based systems, data, applications, and infrastructures.

Computer Forensics

Determines and reveals technical criminal evidence to provide a conclusive description of cyber crime activities. May also be used in civil proceedings. It refers only to the investigation of computers.

Development by Synergize.digital

Sign up for updates
straight to your inbox