
Security Solutions
Endpoint Security
-
Antivirus and Antimalware
-
Data Loss Prevention (DLP)
-
Endpoint Detection and Response (EDR)
-
Mobile Device Management (MDM)
-
Patch Management
-
Encryption
-
Device Control
-
Threat Intelligence Integration
Data Security
-
Encryption (At rest and in transit)
-
Backup and Recovery
-
Data Masking
-
Data Integrity Verification
-
Data Loss Prevention (DLP)
-
Tokenization
-
Data Minimization
-
Access Controls
Application Security
-
Secure Code Review
-
Web Application Firewall
-
API Security
-
Runtime Application Self-Protection
-
Software Composition Analysis
-
Secure Software Development Life Cycle
-
Static Application Security Testing (SAST)
-
Dynamic Application Security Testing (DAST)
Network Security
-
Intrusion Detection System (IDS)
-
Intrusion Prevention System (IPS)
-
Network Access Control (NAC)
-
Network Segmentation
-
Secure Sockets Layer (SSL) / Transport Layer Security (TLS)
-
Virtual Private Network (VPN)
-
Firewalls
-
Traffic Analysis and Anomaly Detection
Cloud Security
-
Cloud Access Security Broker (CASB)
-
Data Encryption
-
Identity and Access Management (IAM)
-
Security Posture Management
-
Shared Responsibility Model
-
Continuous Compliance Monitoring
-
Cloud Identity Federation
-
Cloud Security Audits
API Security
-
Authentication and Authorization
-
Threat Detection and Monitoring
-
API Gateway
-
Input Validation
-
Rate Limiting
-
API Keys and Tokens
-
Encryption (At Rest and in Transit)
-
Secure Development Practices
IOT Security
-
Device Authentication
-
Anomaly Detection
-
Network Segmentation
-
Vulnerability Management
-
Secure Firmware Updates
-
Device Lifecycle Management
-
Encryption for IOT Data
-
Secure Boot
Attacks and Exploits with OSI Layers
OSI/ISO Model Layers 1-7
Attacks and Exploits
Function
Examples
Application
Interface to end user, interaction directly with
Software application
Phishing and email compromise, Password cracking,
Buffer Overflow / SQL Injection
Software App Layer
Directory Services, email, network management,
File transfer, web pages, database access
FTP, HTP, WWW, SMTP, TELNET, DNS,
TFTP, NFS
Presentation
Formats data to be presented between
Application-layer entities
Injection attacks, File inclusion vulnerabilities,
Cross site scripting, Cross site request forgery
Syntax / Semantics Layer
Data representation, compression, encryption / decryption
Formatting
ASCII, PDF, HTML, DOCX, AVI,
SOCKETS ASCII
Network
Ensures integrity of data transmission
Port Scanning,
DNS Poisioning
Lateral Movement
End to End Reliable Connection
Data Segmentation, Reliability, Multiplexing,
Connection oriented, Flow control, Sequencing,
Error checking
SQL, SIP, RTP,
RPC- named pipes
Transport
Determine how data gets from one host to another
IP Spoofing
Manipulating routing tables
DDos Flooding
Routing
Packets, Subnetting, Logical IP addressing,
Path determination, Connectionless
IP, ARP, IPSec, ICMP, OSPF, BGP
Session
Manage connection between local and remote application
Session hijacking, Access control bypass,
Adversary in the middle
Application Session Management
Session establishment / teardown
File transfer checkpoints
Interactive login
SQL, SIP, RTP,
RPC- named pipes
Data Link
Defines format of data on the network
MAC and ARP spoofing
Gateway ID Check
Rogue APS
Switching
Frame traffic contro, CRC checking,
Encapsulates packets, MAC addresses
Ethernet, Wifi, MAC / LLC
4G/5G/6G/LoRaWan
Physical
Transmits raw bit stream over physical medium
Device Tampering, Physical Disruption, Traffic Eavesdropping
Cabling/Network Interface
Manages Physical Connections
Interpretations of bit stream into electrical signals
Rs-232, RJ45, Ethernet, Wifi
Cloud Security Layers
Network Security
Data Security
Application Security
Endpoint Security
Cloud Security
Perimeter Security
Physical Security
-
Access Control Systems
-
Intrusion Detection System
-
Security Lighting
-
Biometric Identification
-
GPS Tracking
-
Firewall
-
VPN
-
Security Gateway
-
DDoS Protection
-
Threat Modelling
-
Design Review
-
Secure Coding
-
Static Analysis
-
Log Management
-
Threat Hunting
-
Penetration Testing
-
Vulnerability Scanning
-
Bug Boundaries
-
Data Encryption
-
Identity and Access Management
-
Security Compliance
-
Data Loss Prevention
-
Incident Response and Forensics
-
Vendor Security
-
Anti Virus
-
Anti Malware
-
App Whitening
-
HIDC
-
Encryption
-
Data Loss Prevention
-
Email and Security
-
Cloud Access Security
-
User Behavior Analytics