Cybersecurity Basics #9 - Attack Attribution
Who did it? It's a powerful question and the answer to "What is attack attribution?"
Who did it? It's a powerful question and the answer to "What is attack attribution?"
Authentication and authorization are two critical concepts that are intertwined. Understanding the difference and their purpose is key to understanding cybersecurity.
Hackers and cybercriminals are all "malicious actors". While you may not know who is attacking a system, having a better understanding of common motivations is important.
Malicious software (malware) is an umbrella term that covers a number of different types of software designed to do bad things...but those specific categories don't mean to much day-to-day when it comes to defence...
Perspective is a tricky thing...maybe the hardest aspect of cybersecurity
What is a password? Why do we use them? Why are they so frustrating? ...some answers
Continuing the "basics" series, here's an easy way to understand the terms: vulnerability, exploit, threat, and risk
The basics starts with understanding the goal of security. It sounds simple but the goal is to make sure whatever you build works as you intend...and only as you intend!
A friend highlighted a real issue: there isn't enough material about basic cybersecurity that's easily relatable.
Connecting with others is critical but it can also pose a risk. It's important not to "leak" information needlessly. This is a practice know as operational security. It's critically important...and often ignored.
Security is there to ensure that the systems you build work only as intended. Part of that is realizing the potential for abuse and ensuring that the system and users can continue to work safely...there's a LOT of work to do.