Further to my four Cyber Security notes here:
- Information security tips while working with digital sources and internet | LinkedIn
- Security tips for Google Drive & Android | LinkedIn
- Facebook Privacy & Security tips | LinkedIn
- Post on patterns, anti-patterns & randomness in Cyber Security | LinkedIn
Below I am listing Part 4 with keywords to explore relevant to 2025:
- Access Control
- Advanced Persistent Threat (APT)
- AI-driven Phishing
- Allow-list / Block-list
- Antivirus / Anti-Malware Software
- Attack Surface
- Attack Vector
- Authentication
- Authenticator App
- Authorization
- Availability
- Backdoor
- Backup & Recovery
- Behavioral Biometrics
- Biometric Authentication
- Biometrics
- Botnet
- Browser Isolation
- Cloud Security
- Confidentiality
- Cryptography / Encryption
- Cyber Hygiene
- Cyber Resilience
- Data Breach
- Data Privacy
- Deepfake
- Digital Footprint
- Double Extortion (Ransomware)
- Encryption
- Endpoint Protection
- Firewall
- Identity Theft
- Incident Response
- Insider Threat
- IoT (Internet of Things) Device
- IoT Security
- Malware (Malicious Software)
- Multi-factor Authentication (MFA)
- Multi-Factor Authentication (MFA) / Two-Factor Authentication (2FA)
- Parental Controls
- Patch Management
- Patching / Software Update
- Password Manager
- Passwordless Authentication
- Phishing
- Privacy Settings
- Quantum-safe Encryption
- Ransomware
- Safe Browsing
- Secure Configuration
- Security Control / Countermeasure
- Security Key
- Shoulder Surfing
- SIM Swapping
- Smishing / Vishing
- Social Engineering
- Spoofing
- Threat Actor / Adversary
- Virtual Private Network (VPN)
- VPN (Virtual Private Network)
- Vulnerability
- WPA3 (Wi-Fi Protected Access 3)
- Zero Trust
- Zero Trust (Principle)
- Zero-Day
- Zero-Day Exploit
Note: Enhanced / compiled with help of AI / LLMs
- Email me: Neil@HarwaniSytems.in
- Website: www.HarwaniSystems.in
- Blog: www.TechAndTrain.com/blog
- LinkedIn: Neil Harwani | LinkedIn