Skip to main content

306 docs tagged with "Cybersecurity"

View all tags

ACL Plugin

Using Access Control List (ACL) Plugin in Kong

Agreement Types

The different agreement types you'll encounter when working in Cybersecurity

AppArmor

Linux security module for application access control.

CIA Triad

Confidentiality, Integrity, and Availability

Compliance

Adherence to laws, regulations, standards, and policies

Governance

Overall management of the organization's IT resources

HA and DR

High Availability and Disaster Recovery

Hashing

Converting data into fixed-size value using a function

IDS and IPS

Intrusion Detection and Intrusion Prevention

Logging

Centralizing and Investigating Logs

Overview

Below are some common attacks which I've noted down for the CompTIA and CISSP exams:

OWASP Top Ten

The OWASP Top 10 is a standard awareness document for developers and web application security.

Pods

The building blocks of Kubernetes

RAID

Redundant Array of Independent Disks

SCAP

Security Content Automation Protocol

Seccomp

Filter system calls to enhance application security

Secrets

Storing sensitive information

SIEM

Security Information and Event Management

SNMP

Simple Network Management Protocol

SOAR

Security Orchestration, Automation, and Response

VLANs

Learn the basics of Networking