A security concept restricting user access to only necessary resources to minimize risk.
A technique used by attackers to move within a network after gaining initial access.
Malicious code triggered by specific conditions to execute unauthorized actions.
The process of examining log files to detect anomalies, threats, or performance issues.
A security method encrypting data at the communication link level to protect transmissions.
A framework in the Linux kernel that enforces security policies.
A vulnerability allowing attackers to execute files on a server via manipulated input.
A cyberattack where malicious data is inserted into logs to mislead analysis or enable exploits.
A defense-in-depth approach using multiple security controls at different layers.
Measures to protect load balancers from threats like DDoS attacks and misconfigurations.
A critical flaw in Log4j allowing remote code execution on affected systems.
A ransomware strain that encrypts files and demands payment for decryption.
A password-cracking method using precomputed hash values for rapid decryption.
The process of linking and analyzing logs from different sources to detect threats.
A security principle limiting a system component's permissions to essential functions.
Cryptographic algorithms optimized for resource-constrained environments like IoT devices.
The act of modifying log files to erase traces of malicious activity or bypass detection.
The practice of analyzing a system’s volatile memory and processes without shutting it down.
A disk encryption standard for Linux providing strong security and key management.
Malicious scripts written in Lua, often used for automation and exploiting vulnerabilities.