Skip to main content

174 docs tagged with "Security"

View all tags

AAA in AWS

Authentication, Authorization, and Access Control

Agreement Types

The different agreement types you'll encounter when working in Cybersecurity

AWS Config

Assess, audit, and evaluate configurations

AWS KMS

Create and control your cryptographic keys

CIA Triad

Confidentiality, Integrity, and Availability

Compliance

Adherence to laws, regulations, standards, and policies

Governance

Overall management of the organization's IT resources

HA and DR

High Availability and Disaster Recovery

Hashing

Converting data into fixed-size value using a function

IDS and IPS

Intrusion Detection and Intrusion Prevention

Logging

Centralizing and Investigating Logs

OWASP Top Ten

The OWASP Top 10 is a standard awareness document for developers and web application security.

RAID

Redundant Array of Independent Disks

SCAP

Security Content Automation Protocol

SIEM

Security Information and Event Management

SNMP

Simple Network Management Protocol

SOAR

Security Orchestration, Automation, and Response