The practice of protecting internet-connected systems such as hardware, software and data from cyberthreats
Started in 1971 when Bob Thomas, a computer programmer with BBN, created and deployed a virus that served as a security test
Application security, Cloud security, Critical infrastructure security, Data security, Endpoint security, IoT security, Mobile security, Network security
The process of developing, adding, and testing security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification
Controls technologies used to secure applications, in cloud environments. To provide storage protection against internal and external threats.
Essential to the proper functioning of a society's economy, national public health or safety, security, or any combination of the above
The process of safe guarding digital information throughout its entire life cycle to protect it from corruption, theft, or unauthorized access
The process of protecting devices like workstations, servers, and other devices (that can accept a security client) from malicious threats and cyberattacks
The practice of securing IoT devices and the network these devices use
Mobile device security refers to being free from danger or risk of an asset loss or data loss by using mobile computers and communication hardware
The protection of the underlying networking infrastructure from unauthorized access, misuse, or theft
Using strong passwords, updating your software, thinking before you click on suspicious links, and turning on multi-factor authentication
Wrong way to use cybersecurity is to make an weak password.
- Transparent content negotiation for the request results in a circular reference. - FIX: Resolve content negotiation issue
Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database.
Social engineering and scam where attackers deceive people into revealing sensitive information
They give the attacker the ability to capture and manipulate sensitive personal information
An attack meant to shut down a machine or network, making it inaccessible to its intended users
- The request has been accepted for processing, but the processing has not been completed. - No fix needed.
- The server successfully processed the request, but is returning information from another source. - No fix needed.
- The server successfully processed the request, but there is no content to return. - No fix needed.
- The server successfully processed the request, but requires the requester to reset the document view. - No fix needed.
- The server is delivering only part of the resource due to a range header sent by the client.** - No fix needed
- The requested resource has multiple choices and the user agent can select one. - FIX: Select one choice.
- The requested resource has been permanently moved to a new location. - FIX: Update URL.
- The requested resource resides temporarily under a different URL. - FIX: Redirect to temporary location.
- The response to the request can be found under a different URL and should be retrieved using a GET method. - FIX: Retrieve resource from new location.
- Indicates that the resource has not been modified since the version specified by the request headers If-Modified-Since or If-None-Match.** - FIX: Cache resource
- The requested resource must be accessed through the proxy given by the Location field.** - FIX: Access resource through proxy
- Unauthorized: Logon failed. - FIX: Verify user credentials and server configuration.
- Unauthorized: Logon failed due to server configuration. - FIX: Review server configuration.
- Unauthorized due to ACL on resource. - FIX: Adjust resource permissions.
- Authorization failed by filter. - FIX: Adjust authorization filters.
- Authorization failed by ISAPI/CGI application. - FIX: Review application configuration.
- Access denied by URL authorization policy on the Web server. - FIX: Adjust URL authorization policies.
- Execute access forbidden. - FIX: Adjust execution permissions.
- Read access forbidden. - FIX: Adjust read permissions.
- Write access forbidden. - FIX: Adjust write permissions.
- SSL required. - FIX: Enable SSL.
- SSL 128 required. - FIX: Enable SSL 128.
- IP address rejected. - FIX: Whitelist IP addresses.
- Client certificate required. - FIX: Provide client certificate.
- Site access denied. - FIX: Adjust site access permissions.
- Too many users. - FIX: Increase server capacity.
- Invalid configuration. - FIX: Review server configuration.
- Site Not Found. - FIX: Verify site existence and URL.
- ISAPI or CGI restriction. - FIX: Adjust ISAPI/CGI restrictions.
- MIME type restriction. - FIX: Adjust MIME type settings.
- No handler configured. - FIX: Configure handler.
- Denied by request filtering configuration. - FIX: Adjust request filtering settings.
- Verb denied. - FIX: Adjust verb permissions.
- File extension denied. - FIX: Adjust file extension permissions.
- Hidden namespace. - FIX: Verify namespace existence.