2. Threats: Threats to network security can come from internal or external sources. Internal threats refer to security breaches that occur within an organization, such as unauthorized access by employees, while external threats come from outside sources, such as hackers, cyber criminals, and nation-state actors.
3. Vulnerabilities: Vulnerabilities are weaknesses in a system that can be exploited by attackers to gain unauthorized access, steal data, or cause harm. Common Vulnerabilities and Exposures (CVE) is a list of standardized names for vulnerabilities that are maintained by the MITRE Corporation. Zero-day vulnerabilities are security vulnerabilities that are unknown to the vendor or the public, and are actively being exploited by attackers.
Exploits refer to a specific way in which a vulnerability or weakness in a system is used to carry out unauthorized actions or gain access to sensitive information. An exploit is often created by a hacker or attacker with malicious intent.
Least privilege is a security principle that involves granting users and processes only the minimum level of permissions and privileges necessary to perform their jobs. This reduces the potential for security breaches and helps to minimize the damage that can be caused if a breach does occur.
Role-based access is a security model that grants access to specific resources and functions based on a user's role within an organization. This helps to ensure that users only have access to the information and systems they need to perform their jobs and can reduce the risk of security breaches.
Zero Trust is a security approach that assumes that all network traffic is potentially dangerous and must be authenticated, authorized, and encrypted. It involves verifying the identity of all devices, users, and applications accessing a network, regardless of whether they are inside or outside the network perimeter. The goal of Zero Trust is to create a secure and resilient network environment that can withstand attacks and protect sensitive information.