Cyber Security notes for 2025 – Part 4

Further to my four Cyber Security notes here:

Below I am listing Part 4 with keywords to explore relevant to 2025:

  • Access Control
  • Advanced Persistent Threat (APT)
  • AI-driven Phishing
  • Allow-list / Block-list
  • Antivirus / Anti-Malware Software
  • Attack Surface
  • Attack Vector
  • Authentication
  • Authenticator App
  • Authorization
  • Availability
  • Backdoor
  • Backup & Recovery
  • Behavioral Biometrics
  • Biometric Authentication
  • Biometrics
  • Botnet
  • Browser Isolation
  • Cloud Security
  • Confidentiality
  • Cryptography / Encryption
  • Cyber Hygiene
  • Cyber Resilience
  • Data Breach
  • Data Privacy
  • Deepfake
  • Digital Footprint
  • Double Extortion (Ransomware)
  • Encryption
  • Endpoint Protection
  • Firewall
  • Identity Theft
  • Incident Response
  • Insider Threat
  • IoT (Internet of Things) Device
  • IoT Security
  • Malware (Malicious Software)
  • Multi-factor Authentication (MFA)
  • Multi-Factor Authentication (MFA) / Two-Factor Authentication (2FA)
  • Parental Controls
  • Patch Management
  • Patching / Software Update
  • Password Manager
  • Passwordless Authentication
  • Phishing
  • Privacy Settings
  • Quantum-safe Encryption
  • Ransomware
  • Safe Browsing
  • Secure Configuration
  • Security Control / Countermeasure
  • Security Key
  • Shoulder Surfing
  • SIM Swapping
  • Smishing / Vishing
  • Social Engineering
  • Spoofing
  • Threat Actor / Adversary
  • Virtual Private Network (VPN)
  • VPN (Virtual Private Network)
  • Vulnerability
  • WPA3 (Wi-Fi Protected Access 3)
  • Zero Trust
  • Zero Trust (Principle)
  • Zero-Day
  • Zero-Day Exploit

Note: Enhanced / compiled with help of AI / LLMs

By Neil Harwani

Interested in movies, music, history, computer science, software, engineering, management and technology

Leave a comment