| Word of the Day | | Daily updates on the latest technology terms | May 6, 2020 | | zero trust | Zero trust is a cybersecurity strategy that assumes all users, devices and transactions are already compromised. The zero trust model requires strict identity and device verification, regardless of the user's location in relation to the network perimeter. A network that implements the zero trust model is referred to as a zero trust network. The traditional approach to network security is known as the castle-and-moat model. The focus of this concept is that gaining access to a network from the outside is difficult, but once inside the firewall, users are automatically trusted. While there are various technologies and principles that can be used to enforce zero trust security, the basic fundamentals include the following: - Microsegmentation -- Security perimeters and network components are broken into smaller segments, each of which has its own access requirements.
- Least-privileged access -- Users are only granted access to what they need to do their job effectively.
- Risk management analytics -- All network traffic is logged and inspected for suspicious activity. Continue reading...
| | | "Zero trust is not a single product, nor is it a single approach or technique. It is a mindset, a decision. It is an organization saying, 'Network security is a priority' and then putting its resources behind that statement." - Jack Burbank | Related Terms You Should Know ATT&CK The Mitre ATT&CK framework will help you earn who will be coming after you, based on your business, and how they will do it. Spring Security AJava developers require a comprehensive understanding of the Spring Security architecture's capabilities and implementation. Office 365 IT pros should not assume that Microsoft has embedded security effectively and appropriately in its suite of cloud services. user behavior analytics (UBA) To improve cybersecurity for remote workstaff, companies are tapping into user behavior analytics and exploiting features built into data loss prevention software. If you answer nine of 10 threat intelligence questions correctly, you'll not only be up to date on the latest cybersecurity issues -- you'll receive CPE credit as well. Take the quiz Thank you for reading! For feedback about any of our definitions or to suggest a new definition (or learning resource) please contact us at: editor@whatIs.com | FOLLOW US | | About This E-Newsletter The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.
Click to: Unsubscribe. You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com. © 2020 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners. Privacy Policy | Partners List | | |
No comments:
Post a Comment