Honeypots
Honeypots → Decoy systems designed to attract attackers and study their behavior. Example: a fake Secure Shell (SSH) server that logs intrusion attempts.
Honeynets
Honeynets → A network of multiple honeypots that simulate an entire environment to lure and analyze attacker activity. Example: a fake enterprise subnet with bogus credentials.
Risks
Risks → The potential for loss or damage when a threat exploits a vulnerability.
Vulnerabilities
Vulnerabilities → Weaknesses in hardware, software, or procedures that can be exploited by a threat.
Exploits
Exploits → Specific methods or tools used by attackers to take advantage of vulnerabilities.
Threats
Threats → Any event or actor with the potential to cause harm to systems or data.
CIA Triad
Confidentiality, Integrity, Availability (CIA) Triad → A foundational security model that ensures data is protected, accurate, and accessible.
Confidentiality in CIA Triad
Confidentiality → Ensures that information is only accessible to authorized users; maintained through encryption and access controls.
Integrity in CIA Triad
Integrity → Ensures that data is accurate and unaltered through hashing and version control.
Availability in CIA Triad
Availability → Ensures systems and data are accessible when needed, maintained through redundancy, backups, and failover systems.