{"id":241452,"date":"2023-04-19T13:57:46","date_gmt":"2023-04-19T10:57:46","guid":{"rendered":"https:\/\/shop.thekernel.ua\/?page_id=241452"},"modified":"2024-09-17T14:33:02","modified_gmt":"2024-09-17T11:33:02","slug":"cybersecurity-thesaurus","status":"publish","type":"page","link":"https:\/\/shop.thekernel.ua\/en\/cybersecurity-thesaurus","title":{"rendered":"Cybersecurity thesaurus"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/02\/Hero-1.jpg&#8221; background_size=&#8221;contain&#8221; filter_brightness=&#8221;104%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; header_font_size=&#8221;3.9em&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><b>Cybersecurity thesaurus<\/b><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f4f4f4&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">It is better to start building cyber protection at the site development stage, because then it will cost the business much more. But when starting to learn information related to cybersecurity, users are faced with a lot of new concepts. They are needed to understand the types of threats from attackers, the types of services that cybersecurity professionals can provide, technical protections, and more. For your convenience, we provide a thesaurus of the most common cybersecurity terms on this page.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.20.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; border_radii=&#8221;on|25px|25px|25px|25px&#8221; border_color_all=&#8221;#a1d640&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;70%&#8221; max_width=&#8221;1280px&#8221; animation_style=&#8221;fade&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\"><a href=\"#A\">A<\/a> <a href=\"#B\">B<\/a> <a href=\"#C\">C<\/a> <a href=\"#D\">D<\/a> <a href=\"#E\">E<\/a> <a href=\"#F\">F<\/a> <a href=\"#I\">I<\/a> <a href=\"#H\">H<\/a> <a href=\"#K\">K<\/a> <a href=\"#M\">M<\/a> <a href=\"#O\">O<\/a> <a href=\"#P\">P<\/a> <a href=\"#R\">R<\/a> <a href=\"#S\">S<\/a> <a href=\"#T\">T<\/a> <a href=\"#V\">V<\/a> <a href=\"#W\">W<\/a> <a href=\"#Z\">Z<\/a><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;A&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\">\u00a0\u0410<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Access management (management) <\/b><span style=\"font-weight: 400;\">is a set of technical and software security tools for regulating access to users according to their roles in the system and under certain conditions. With the help of the management system, administrators can track who and at what time, from which devices, accessed which functions. Access control policy is based on identification, authentication, and authorization methods. In this way, organizations verify the veracity of data provided by users and their rights to access certain privileges.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Account hijacking <\/b><span style=\"font-weight: 400;\">is when an account falls under the control of criminals. Commonly, the terms \u201ccredential theft,\u201d \u201caccount hacking,\u201d and \u201caccount hijacking\u201d are used interchangeably. But unlike password theft or account hacking, account hijacking is when fraudsters gain full control over someone else&#8217;s account in order to use all of its features and privileges to the maximum. And use not just for a one-time gain, such as stealing money.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">More information in the article: \u201c<\/span><\/i><a href=\"https:\/\/www.linkedin.com\/pulse\/%25D1%258F%25D0%25BA-yubikey-%25D0%25B4%25D0%25BE%25D0%25BF%25D0%25BE%25D0%25BC%25D0%25B0%25D0%25B3%25D0%25B0%25D1%2594-%25D0%25B7%25D0%25B0%25D0%25BF%25D0%25BE%25D0%25B1%25D1%2596%25D0%25B3%25D1%2582%25D0%25B8-%25D0%25B7%25D0%25B0%25D1%2585%25D0%25BE%25D0%25BF%25D0%25BB%25D0%25B5%25D0%25BD%25D0%25BD%25D1%258E-%25D0%25BE%25D0%25B1%25D0%25BB%25D1%2596%25D0%25BA%25D0%25BE%25D0%25B2%25D0%25B8%25D1%2585-%25D0%25B7%25D0%25B0%25D0%25BF%25D0%25B8%25D1%2581%25D1%2596%25D0%25B2-\/?trackingId=pWFpb3OFH43B7RueH4tH8w%3D%3D\"><i><span style=\"font-weight: 400;\">How YubiKey helps prevent account hijacking<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d.<\/span><\/i><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Authentication <\/b><span style=\"font-weight: 400;\">is a procedure for verifying the identity of a person with the ID provided by the system during registration. Identity verification is based on factors to confirm: a physical factor (phone, security key, etc.), a knowledge factor (password, passphrase) or a biometric factor (fingerprint, facial contours). The authentication procedure takes place after identification and before authorization. <\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">More information on the difference between authentication, identification, and authorization can be obtained from our article: \u201c<\/span><\/i><a href=\"https:\/\/www.linkedin.com\/pulse\/%25D1%2596%25D0%25B4%25D0%25B5%25D0%25BD%25D1%2582%25D0%25B8%25D1%2584%25D1%2596%25D0%25BA%25D0%25B0%25D1%2586%25D1%2596%25D1%258F-%25D0%25B0%25D0%25B2%25D1%2582%25D0%25B5%25D0%25BD%25D1%2582%25D0%25B8%25D1%2584%25D1%2596%25D0%25BA%25D0%25B0%25D1%2586%25D1%2596%25D1%258F-%25D1%2582%25D0%25B0-%25D0%25B0%25D0%25B2%25D1%2582%25D0%25BE%25D1%2580%25D0%25B8%25D0%25B7%25D0%25B0%25D1%2586%25D1%2596%25D1%258F-%25D1%258F%25D0%25BA-%25D0%25BD%25D0%25B5-%25D0%25BF%25D0%25B5%25D1%2580%25D0%25B5%25D0%25B4%25D0%25B0%25D1%2582%25D0%25B8-\/?trackingId=ovpfKNPbjSCYfMDoxXTHLw%3D%3D\"><i><span style=\"font-weight: 400;\">Identification, authentication, and authorization \u2013 how not to hand over access control to attackers<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d.<\/span><\/i><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Authentication programs <\/b><span style=\"font-weight: 400;\">are two-factor authentication programs that generate OTP passwords with a usage limit of up to 30 seconds. They are often located either on external devices (tokens) or in applications. The most famous authentication programs are Microsoft Authenticator, Google Authenticator, LastPass Authenticator, TOTP Authenticator. Using these programs greatly increases security by helping to further protect passwords.<\/span><\/p>\n<p><b>Authorization <\/b><span style=\"font-weight: 400;\">\u2014<\/span> <span style=\"font-weight: 400;\">managing the levels of access to a protected resource and granting authority to the user according to his role in the system (administrator, editor, author, reader, etc.).\u00a0<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;B&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\">\u00a0B<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>A backdoor (black entry) <\/b><span style=\"font-weight: 400;\">is a method of bypassing standard authentication procedures through unauthorized remote access using computer system vulnerabilities. Penetration can occur by hacking Back Orifice (a program for remote access on Microsoft Windows) and installing a rootkit (a program that hides the presence of malicious software on a computer).<\/span><\/p>\n<p><b>Brute force attacks <\/b><span style=\"font-weight: 400;\">are a hacking method that involves picking passwords using software. Programs go through all possible combinations, first of all checking words from dictionaries. The speed of selecting an 8-digit password is several minutes, and a 16-digit password is several weeks. The attack can also be done manually if the attacker has already hacked one account and is trying to see if the password will work for other accounts.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">About protection methods in our brochure: \u201c<\/span><\/i><a href=\"https:\/\/thekernel.ua\/wp-content\/uploads\/2023\/02\/10-%D0%BF%D0%BE%D1%88%D0%B8%D1%80%D0%B5%D0%BD%D0%B8%D1%85-%D1%82%D0%B8%D0%BF%D1%96%D0%B2-%D0%BA%D1%96%D0%B1%D0%B5%D1%80%D0%B0%D1%82%D0%B0%D0%BA.pdf\"><i><span style=\"font-weight: 400;\">10 Common Types of Cyberattacks<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d and in the article \u201c<a href=\"https:\/\/shop.thekernel.ua\/en\/how-the-yubikey-protects-against-brute-force-attacks-technicalities-of-attacks-and-key-encryption\">How YubiKey protects against brute-force attacks: technical features of attacks and encryption with a key<\/a>\u201d.<\/span><\/i><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Biometrics <\/b><span style=\"font-weight: 400;\">are means of identifying and authenticating a person based on their physical data. The most common biometric data: eye color, retina pattern, fingerprint, voice.<\/span><\/p>\n<p><b>BYOD (Bring your own device) <\/b><span style=\"font-weight: 400;\">is an IT policy in which employees are allowed or encouraged to use personal mobile devices.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;C&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\">\u00a0C<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Cookie theft <\/b><span style=\"font-weight: 400;\">is a method of stealing data from a browser in unprotected sessions while using a public Wi-Fi network. Users often save data (logins and passwords) in browsers, which is very convenient. This speeds up logging into accounts, but at the same time, attackers can take advantage of this availability by stealing information from the cookie if the user does not have two-factor authentication enabled.<\/span><\/p>\n<p><b>ClickJacking <\/b><span style=\"font-weight: 400;\">is a technology\/method of tricking the user into clicking a hidden (transparent) button. This leads to certain negative consequences, such as the downloading of malicious software or the theft of confidential information by attackers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To prevent information theft, it is recommended to use updated browsers that block embedded content on the site.<\/span><\/p>\n<p><b>Cloud storage <\/b><span style=\"font-weight: 400;\">is a dedicated volume of disk space on a remote server (or multiple servers) where users can store files (digital images, audio, video, documents, or website content), share them with other users, copy them, etc.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Providers of cloud systems and hosting companies are responsible for the uninterrupted operation of the provided physical environment, data storage and provide access to information under certain conditions (paid and free services, provision of access according to the role of participants, etc.).<\/span><\/p>\n<p><b>Cloud technologies <\/b><span style=\"font-weight: 400;\">are online services that have the necessary software in cloud storage that allows you to work with files (create, change their content) without the need to install programs on your own computer.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Examples of cloud technologies are Google Cloud \u2014 where it is possible to work with documents, presentations, smart maps, etc. \u2014 or Figma \u2014 which allows you to create the design of website or mobile application pages, banners, illustrations in the browser without the need to install Adobe Illustrator or Photoshop.\u00a0<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">More information in our article: <i>\u201c<\/i><a href=\"https:\/\/www.linkedin.com\/pulse\/%25D1%2585%25D0%25BC%25D0%25B0%25D1%2580%25D0%25BD%25D0%25B0-%25D0%25B1%25D0%25B5%25D0%25B7%25D0%25BF%25D0%25B5%25D0%25BA%25D0%25B0-%25D0%25B4%25D0%25BB%25D1%258F-%25D1%2583%25D0%25BA%25D1%2580%25D0%25B0%25D1%2597%25D0%25BD%25D1%2581%25D1%258C%25D0%25BA%25D0%25BE%25D0%25B3%25D0%25BE-%25D0%25B1%25D1%2596%25D0%25B7%25D0%25BD%25D0%25B5%25D1%2581%25D1%2583-%25D0%25BC%25D1%2596%25D1%2584-%25D1%2587%25D0%25B8-%25D1%2580%25D0%25B5%25D0%25B0%25D0%25BB%25D1%258C%25D0%25BD%25D1%2596%25D1%2581%25D1%2582%25D1%258C-\/?trackingId=3wrjLYUE4Rb7BLf8GLa4Mg%3D%3D\"><i>Cloud security for Ukrainian business<\/i><\/a><i>\u201d.<\/i><\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Cybersecurity <\/b><span style=\"font-weight: 400;\">is a set of measures and technological solutions that prevent the negative influence of attackers and protect networks and computers from cyberattacks. The following are among the protection methods:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Zero trust strategy.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regular updating of programs.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use of firewalls and antivirus.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regular updating of cybersecurity knowledge.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Team training.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Investment in a comprehensive solution.<\/span><\/li>\n<\/ul>\n<p><b>A cyber incident <\/b><span style=\"font-weight: 400;\">is a series of adverse events of an unintentional nature (natural, technical, technological or human) and\/or events that have signs of a possible cyberattack, which pose a threat to the security of electronic information resources, or create the possibility of a system malfunction (technical blocking of the system or unauthorized control of it resources).<\/span><\/p>\n<p><b>Cyberattacks (or hacker attacks) <\/b><span style=\"font-weight: 400;\">are attempts by attackers to gain unauthorized access to computer systems in order to steal, destroy, or modify data. Among the common methods of cyberattacks:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Brute Force attacks;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Zero-day attacks;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">DoS\/DDoS attacks;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">ClickJacking;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SQL injections;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cookie theft;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Phishing;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Malware: Trojans, viruses, ransomware, etc.<\/span><\/li>\n<\/ul>\n<p><b>Cyber threat indicators <\/b><span style=\"font-weight: 400;\">are metrics based on technical characteristics used to detect and respond to cyber threats.<\/span><\/p>\n<p><b>Cyber protection (computer security) <\/b><span style=\"font-weight: 400;\">is a set of engineering, technical, legal and organizational measures to prevent cyber incidents, protect information, detect cyberattacks and eliminate their consequences.<\/span><\/p>\n<p><b>A cyber threat <\/b><span style=\"font-weight: 400;\">is a potential malicious act aimed at breaching, stealing or damaging data. Cyber threats can also endanger important state interests in cyberspace and harm its facilities and actors. Today, cyber threats remain relevant:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Internal threats<\/b><span style=\"font-weight: 400;\"> \u2014 coming from remote workers who don&#8217;t follow corporate cybersecurity policies and use account data for both work and home use.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Ransomware or extortion software<\/b><span style=\"font-weight: 400;\"> \u2014 downloaded by victims with the participation of \u201cspecialists\u201d in social engineering. Damages to companies that were attacked in this way range from $1.5 million to $60 million \u2014 this is without taking into account the costs of restoring systems.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Attacks on supply chains<\/b><span style=\"font-weight: 400;\"> \u2014 Small and medium-sized businesses suffer greatly from information leaks that occur through services that provide business services. This especially applies to enterprises that have switched to remote work. Cybercriminals are especially interested in the infrastructure, education, and healthcare sectors.<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">We recommend that you take a closer look at this information in our article: \u201c<\/span><\/i><a href=\"https:\/\/thekernel.ua\/trendy-informatsiinoi-bezpeky-u-2022-2026-rokakh\/\"><i><span style=\"font-weight: 400;\">Trends of information security in 2022-2026<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d.<\/span><\/i><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;D&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\">\u00a0D<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>A digital signature <\/b><span style=\"font-weight: 400;\">is a set of data encrypted using effective cryptographic tools. A digital signature can be stored on security tokens or keys. With the help of a digital signature, you can carry out document circulation, or authorize on services that request confirmation of authorization using an electronic signature.<\/span><\/p>\n<p><b>DoS\/DDoS attacks <\/b><span style=\"font-weight: 400;\">are attacks aimed at blocking communication between a resource and users. By sending many requests, attackers try to cause the server to fail by overloading the resource. A cyberattack can be distributed among several computers, then it is called a DDoS attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the fight against DDoS attacks, cybersecurity experts who can conduct preliminary testing can help. It is also advisable to use cloud storage and technologies.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">More information in our article: \u201c<\/span><\/i><a href=\"https:\/\/www.linkedin.com\/pulse\/%25D1%2585%25D0%25BC%25D0%25B0%25D1%2580%25D0%25BD%25D0%25B0-%25D0%25B1%25D0%25B5%25D0%25B7%25D0%25BF%25D0%25B5%25D0%25BA%25D0%25B0-%25D0%25B4%25D0%25BB%25D1%258F-%25D1%2583%25D0%25BA%25D1%2580%25D0%25B0%25D1%2597%25D0%25BD%25D1%2581%25D1%258C%25D0%25BA%25D0%25BE%25D0%25B3%25D0%25BE-%25D0%25B1%25D1%2596%25D0%25B7%25D0%25BD%25D0%25B5%25D1%2581%25D1%2583-%25D0%25BC%25D1%2596%25D1%2584-%25D1%2587%25D0%25B8-%25D1%2580%25D0%25B5%25D0%25B0%25D0%25BB%25D1%258C%25D0%25BD%25D1%2596%25D1%2581%25D1%2582%25D1%258C-\/?trackingId=3wrjLYUE4Rb7BLf8GLa4Mg%3D%3D\"><i><span style=\"font-weight: 400;\">Cloud security for Ukrainian business<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d.<\/span><\/i><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>DNS spoofing <\/b><span style=\"font-weight: 400;\">is one of the forms of breaking into computer networks, a \u201cman-in-the-middle attack\u201d, based on farming, the procedure of redirecting the victim to a false IP address.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To perform this operation, an attacker uses vulnerabilities in the DNS server software. The latter often checks whether the domain name matches the IP address request. If it does not find the required IP address, it performs a request to another server recursively (by partially determining the object). To increase performance, the server caches (stores data for a certain time) the values of the IP addresses found. Thus, it actually allows the attacker to receive responses to the user&#8217;s requests for a certain amount of time (enough to carry out the attack).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Such an attack can be mitigated by performing end-to-end verification after establishing a connection using digital signatures \u2014 Secure DNS (DNSSEC).<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;E&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\">\u00a0E<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Encryption <\/b><span style=\"font-weight: 400;\">is the transformation of data to hide information to prevent unauthorized access. For encryption, algorithmic (cryptographic) modification of data is used, which is performed in a character-by-character sequence. Encryption differs in methods: symmetric (the same key is used for encryption and decryption) and asymmetric (different keys are used for encryption and decryption).<\/span><\/p>\n<p><b>An external authenticator <\/b><span style=\"font-weight: 400;\">is a portable authenticator that resides outside the device on which authentication is to occur. An example of a portable authenticator could be a smartphone (relative to a computer), a smart card, or a hardware security key.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">More information in the article: \u201c<\/span><\/i><a href=\"https:\/\/shop.thekernel.ua\/shho-take-usb-token-ta-jak-jogo-vikoristovuvati\"><i><span style=\"font-weight: 400;\">What is a USB token<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d.<\/span><\/i><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;F&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\"><b>F<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>FIDO (Fast Identity Online) <\/b><span style=\"font-weight: 400;\">is a concept that means fast online identification (fast identity verification). It is essentially a technical specification (protocol\/standard) that allows users to log into accounts using biometric factors or a <\/span><a href=\"https:\/\/shop.thekernel.ua\/shho-take-usb-token-ta-jak-jogo-vikoristovuvati\"><span style=\"font-weight: 400;\">hardware security key<\/span><\/a><span style=\"font-weight: 400;\">. This method of identification can be used both instead of a password and for two-factor authentication.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The FIDO Alliance was established in February 2013 in the United States to develop authentication standards to reduce the reliance of Internet users on passwords.<\/span><\/p>\n<p><b>FIDO2 <\/b><span style=\"font-weight: 400;\">is an improved FIDO authentication standard that uses public key cryptography to make user authentication fast and secure. So the new YubiKey hardware security keys have FIDO2 protocol.<\/span><\/p>\n<p><b>A firewall <\/b><span style=\"font-weight: 400;\">is a software (or device) that acts as a filter between secure and unverified networks and protects against malicious and dangerous content. Firewalls can inspect both inbound and outbound traffic to prevent the risk of attackers stealing data or turning a user&#8217;s device into part of an attacker-controlled botnet.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;H&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\">\u00a0H<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>A hardware security key (USB token)<\/b><span style=\"font-weight: 400;\"> is a device for external authentication that is protected against reading and copying of information.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">More information in the article: \u201c<\/span><\/i><a href=\"https:\/\/shop.thekernel.ua\/shho-take-usb-token-ta-jak-jogo-vikoristovuvati\"><i><span style=\"font-weight: 400;\">What is a USB token<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d.<\/span><\/i><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>HSM (Hardware Security Module) <\/b><span style=\"font-weight: 400;\">is a hardware security module, a secure crypto-processor that provides encryption, decryption, and authentication for various applications. The module includes functions of protection against unauthorized access. In addition, strong authentication protects it. The module is physically isolated, just like smart cards or security keys, and has no operating system (which can be hacked) and is therefore virtually invulnerable to network attacks. <\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">More information on the page: \u201c<\/span><\/i><a href=\"https:\/\/shop.thekernel.ua\/yubihsm2\"><i><span style=\"font-weight: 400;\">YubiHSM 2<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d.<\/span><\/i><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;I&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\"><b>I<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Identity management, <\/b><span style=\"font-weight: 400;\">the procedure of recognizing a user in the system using the information he provided during registration and\/or an identifier. <\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">More about identification in the article: \u201c<\/span><\/i><a href=\"https:\/\/www.linkedin.com\/pulse\/%25D1%2596%25D0%25B4%25D0%25B5%25D0%25BD%25D1%2582%25D0%25B8%25D1%2584%25D1%2596%25D0%25BA%25D0%25B0%25D1%2586%25D1%2596%25D1%258F-%25D0%25B0%25D0%25B2%25D1%2582%25D0%25B5%25D0%25BD%25D1%2582%25D0%25B8%25D1%2584%25D1%2596%25D0%25BA%25D0%25B0%25D1%2586%25D1%2596%25D1%258F-%25D1%2582%25D0%25B0-%25D0%25B0%25D0%25B2%25D1%2582%25D0%25BE%25D1%2580%25D0%25B8%25D0%25B7%25D0%25B0%25D1%2586%25D1%2596%25D1%258F-%25D1%258F%25D0%25BA-%25D0%25BD%25D0%25B5-%25D0%25BF%25D0%25B5%25D1%2580%25D0%25B5%25D0%25B4%25D0%25B0%25D1%2582%25D0%25B8-\/?trackingId=ovpfKNPbjSCYfMDoxXTHLw%3D%3D\"><i><span style=\"font-weight: 400;\">Identification, authentication and authorization \u2013 how not to transfer access control to attackers<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d.<\/span><\/i><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Information security <\/b><span style=\"font-weight: 400;\">is a set of measures aimed at ensuring the protection of confidential information placed on electronic media from unauthorized access, use, disclosure, destruction, or modification.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">More information about information security measures in our article: \u201c<\/span><\/i><a href=\"https:\/\/thekernel.ua\/trendy-informatsiinoi-bezpeky-u-2022-2026-rokakh\/\"><i><span style=\"font-weight: 400;\">Information security trends in 2022-2026<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d.<\/span><\/i><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Information protection <\/b><span style=\"font-weight: 400;\">is a set of software and non-software methods that ensure the integrity, availability, and confidentiality of information.\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Integrity means the impossibility of modification of the data stored in the user&#8217;s profile by third parties.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Privacy is ensuring that unauthorized third parties cannot gain access to user account data.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Availability refers to the protection of information and the possibility of its use by an authorized user.<\/span><\/li>\n<\/ul>\n<p><b>An identifier <\/b><span style=\"font-weight: 400;\">is a unique number, code name, or other attribute that helps distinguish an object from others. The identifier or ID is assigned to the user upon registration in the system along with the role he will perform.<\/span><\/p>\n<p><b>Identification <\/b><span style=\"font-weight: 400;\">\u2014<\/span> <span style=\"font-weight: 400;\">the process of recognizing a user using an identifier. <\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">More information in the article:<\/span><\/i> <i><span style=\"font-weight: 400;\">\u201c<\/span><\/i><a href=\"https:\/\/www.linkedin.com\/pulse\/%25D1%2596%25D0%25B4%25D0%25B5%25D0%25BD%25D1%2582%25D0%25B8%25D1%2584%25D1%2596%25D0%25BA%25D0%25B0%25D1%2586%25D1%2596%25D1%258F-%25D0%25B0%25D0%25B2%25D1%2582%25D0%25B5%25D0%25BD%25D1%2582%25D0%25B8%25D1%2584%25D1%2596%25D0%25BA%25D0%25B0%25D1%2586%25D1%2596%25D1%258F-%25D1%2582%25D0%25B0-%25D0%25B0%25D0%25B2%25D1%2582%25D0%25BE%25D1%2580%25D0%25B8%25D0%25B7%25D0%25B0%25D1%2586%25D1%2596%25D1%258F-%25D1%258F%25D0%25BA-%25D0%25BD%25D0%25B5-%25D0%25BF%25D0%25B5%25D1%2580%25D0%25B5%25D0%25B4%25D0%25B0%25D1%2582%25D0%25B8-\/?trackingId=ovpfKNPbjSCYfMDoxXTHLw%3D%3D\"><i><span style=\"font-weight: 400;\">Identification, authentication and authorization \u2013 how not to transfer access control to attackers<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d.<\/span><\/i><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;K&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\">\u00a0K<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Keyloggers <\/b><span style=\"font-weight: 400;\">are software (or hardware devices) that record every user activity (keystrokes or mouse movements) and are used to steal sensitive data, passwords, PIN codes, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To prevent account hacking, it is recommended to enable <\/span><a href=\"https:\/\/shop.thekernel.ua\/dvofaktorna-avtentyfikatsiia\"><span style=\"font-weight: 400;\">two-factor authentication<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;M&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\">\u00a0M<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Malware (malicious software) <\/b><span style=\"font-weight: 400;\">\u2014 this term combines the names of various programs that can cause damage to personal devices or facilitate their capture and use by attackers: viruses, ransomware, spyware, trojans, rootkits, etc.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">To protect against malicious software, antivirus programs and <\/span><\/i><a href=\"https:\/\/shop.thekernel.ua\/en\/how-to-protect-yourself-and-colleagues-from-convincing-specialists-in-social-engineering\"><i><span style=\"font-weight: 400;\">methods of protection against social engineering \u201cspecialists\u201d<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> who promote their spread are used.<\/span><\/i><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Multifactor authentication (MFA) <\/b><span style=\"font-weight: 400;\">is an advanced authentication procedure that requires more than one authentication factor.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">Details in our article: \u201c<\/span><\/i><a href=\"https:\/\/shop.thekernel.ua\/shcho-take-bahatofaktorna-avtentyfikatsiia-ta-koly-dotsilno-ii-vykorystovuvaty\"><i><span style=\"font-weight: 400;\">What is multifactor authentication<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d.<\/span><\/i><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;O&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\">\u00a0O<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>OTP passwords <\/b><span style=\"font-weight: 400;\">are one-time passwords that are valid only for one authentication session. For reliability, they may be limited to when they can be used. Such passwords can be provided in SMS, in a push message on the phone, in authenticator programs, in tokens or in password managers. This feature is also supported by some series of <\/span><a href=\"https:\/\/shop.thekernel.ua\/porivnjati-yubikey\"><span style=\"font-weight: 400;\">YubiKey security keys<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;P&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\">\u00a0P<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Passwordless authentication <\/b><span style=\"font-weight: 400;\">\u2014 any authentication method other than password authentication: biometrics, authentication programs, security key. Passwordless authentication is quickly gaining popularity because passwords are the weak link in account protection. Google and Microsoft have announced the transition to passwordless authentication in 2023.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">More information in our articles: \u201c<\/span><\/i><a href=\"https:\/\/shop.thekernel.ua\/bezparolnyj-svit-tse-realno\"><i><span style=\"font-weight: 400;\">Passwordless world is real<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d and \u201c<\/span><\/i><a href=\"https:\/\/shop.thekernel.ua\/sposoby-bezparolnoho-vkhodu-v-os-windows\"><i><span style=\"font-weight: 400;\">Ways to configure passwordless login in Windows<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d.<\/span><\/i><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Password managers <\/b><span style=\"font-weight: 400;\">are services that provide password storage services and other additional services: automatic entry of logins and passwords during an authorization session, connection of two-factor authentication based on temporary passwords, shared access by family members or employees with certain powers, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Password managers are much more reliable and convenient than various media (disk, flash drive, etc.) from which fraudsters can steal information. To use them, it is enough to remember a single password instead of a dozen others. Password managers can also be further protected with external identifiers, such as hardware security keys.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">On this page, you will find <\/span><a href=\"https:\/\/shop.thekernel.ua\/sumisni-z-yubikey\/menedzhery-paroliv\"><span style=\"font-weight: 400;\">password managers that are compatible with the security key<\/span><\/a><span style=\"font-weight: 400;\">, sold in our <\/span><a href=\"https:\/\/shop.thekernel.ua\/shop\"><span style=\"font-weight: 400;\">online store<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Penetration testing <\/b><span style=\"font-weight: 400;\">\u2014 imitation of a cyberattack by \u201cwhite hackers\u201d. This method is used to identify and remediate vulnerabilities in a web application or server that can be exploited by real attackers.<\/span><\/p>\n<p><b>Phishing <\/b><span style=\"font-weight: 400;\">is a type of fraud, one of the methods of social engineering, aimed at stealing data from unwary users through fake sites, or forcing them to pay for goods or services that customers will not actually receive. For example, in this way, fraudsters offer to \u201cbuy goods 5 times cheaper\u201d, to confirm personal data \u201cto avoid blocking financial accounts\u201d or to receive \u201cwinnings (apartment, car) in shares\u201d after \u201cpaying tax\u201d.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To be protected from phishing, you need to be informed and use security keys (since fraudsters can also ask users\/employees for OTP passwords and PIN codes).<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">More information in our articles: \u201c<\/span><a href=\"https:\/\/shop.thekernel.ua\/iak-kliuch-bezpeky-yubikey-zakhyshchaie-vid-fishynhovykh-atak\"><span style=\"font-weight: 400;\">How the YubiKey security key protects against phishing attacks<\/span><\/a><span style=\"font-weight: 400;\">\u201d and \u201c<\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/how-to-protect-yourself-and-colleagues-from-convincing-specialists-in-social-engineering\"><span style=\"font-weight: 400;\">How to protect yourself and colleagues from convincing social engineering \u00abspecialists\u00bb<\/span><\/a><span style=\"font-weight: 400;\">\u201d.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Public key infrastructure (PKI) <\/b><span style=\"font-weight: 400;\">is a set of rules and policies, technical and material means for creating and managing digital certificates created to identify individuals or companies and protect electronic communication, online banking, payments on the Internet, etc.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">Our partners offer PKI deployment services. More information on the<\/span><\/i><a href=\"https:\/\/thekernel.ua\/pointsharp\/\"><i><span style=\"font-weight: 400;\"> \u201cPointsharp\u201d page.<\/span><\/i><\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;R&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\">\u00a0R<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Ransomware <\/b><span style=\"font-weight: 400;\">is malicious software used by attackers to lock down a device (or encrypt the content of information stored on it) in order to demand a monetary reward in exchange for being able to regain access to the device.<\/span><\/p>\n<p><b>A rootkit <\/b><span style=\"font-weight: 400;\">is a set of programs that hide the presence of an intruder or malicious software on a computer. This is a kernel module that a hacker often installs on a computer after hacking it and obtaining super administrator rights. The rootkit \u201csweeps the traces\u201d of its presence and the intrusion of scanners, keyloggers, and Trojan programs. It also hides the activities of the attacker, which allows him to gain a foothold in the system and continue to monitor the victim.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">How to prevent hacking is described in the article: \u201c<\/span><\/i><a href=\"https:\/\/www.linkedin.com\/pulse\/%25D1%258F%25D0%25BA-yubikey-%25D0%25B4%25D0%25BE%25D0%25BF%25D0%25BE%25D0%25BC%25D0%25B0%25D0%25B3%25D0%25B0%25D1%2594-%25D0%25B7%25D0%25B0%25D0%25BF%25D0%25BE%25D0%25B1%25D1%2596%25D0%25B3%25D1%2582%25D0%25B8-%25D0%25B7%25D0%25B0%25D1%2585%25D0%25BE%25D0%25BF%25D0%25BB%25D0%25B5%25D0%25BD%25D0%25BD%25D1%258E-%25D0%25BE%25D0%25B1%25D0%25BB%25D1%2596%25D0%25BA%25D0%25BE%25D0%25B2%25D0%25B8%25D1%2585-%25D0%25B7%25D0%25B0%25D0%25BF%25D0%25B8%25D1%2581%25D1%2596%25D0%25B2-\/?trackingId=pWFpb3OFH43B7RueH4tH8w%3D%3D\"><i><span style=\"font-weight: 400;\">How YubiKey helps prevent account hijacking<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d.<\/span><\/i><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;S&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\"><b>S<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Single sign-on <\/b><span style=\"font-weight: 400;\">is the use of one set of credentials to access multiple applications. It can be login through social networks, mail services or applications in operating systems. For example, Google and Microsoft are actively working on this solution. Google allows you to use many services (register and log in to them) if you activate your profile in a browser or on a smartphone. Microsoft offers single sign-on through Windows Hello apps for home use or Azure AD for business.<\/span><\/p>\n<p><b>A smart card <\/b><span style=\"font-weight: 400;\">is a plastic card that contains a chip (a microcircuit, the size of a SIM card) with minimal software for cryptographic operations and a small amount of memory. Smart cards together with external authenticators are used to identify, authenticate or authorize trusted persons or users who have access to certain services. Examples of smart cards are student tickets, hotel room key cards, SIM cards of mobile operators, bank cards.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To read information on smart cards, separate devices are required.<\/span><\/p>\n<p><b>PIV (personal identity verification) smart card <\/b><span style=\"font-weight: 400;\">is a smart card that is used for identity verification (for example, pass cards at enterprises or in government structures).<\/span><\/p>\n<p><b>Smart card CCID (integrated circuit card interface device) <\/b><span style=\"font-weight: 400;\">is an interface device with an integrated circuit that allows connection via USB and does not require readers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some YubiKey security keys support PIV and CCID smart card protocols. <\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">More information in our material: \u201c<\/span><\/i><a href=\"https:\/\/shop.thekernel.ua\/rezhym-smart-kartky-yubikey-bez-dodatkovoho-obladnannia\"><i><span style=\"font-weight: 400;\">Yubikey smart card mode without additional equipment<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d.<\/span><\/i><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Social engineering <\/b><span style=\"font-weight: 400;\">is a science that studies human behavior and the factors that influence it. Also, this term is used to describe a number of methods developed by fraudsters to force the victim to reveal confidential information, or to install malicious software that facilitates the capture of a computer or local network.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">More information in our article: <\/span><\/i><span style=\"font-weight: 400;\">\u201c<\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/how-to-protect-yourself-and-colleagues-from-convincing-specialists-in-social-engineering\"><span style=\"font-weight: 400;\">How to protect yourself and colleagues from persuasive social engineering \u201cspecialists<\/span><\/a><span style=\"font-weight: 400;\">\u201d.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>SQL injection <\/b><span style=\"font-weight: 400;\">is the oldest, most common and most dangerous attack, which involves the use of vulnerabilities in input forms on websites and the introduction of malicious code to penetrate and manipulate the database. In this way, attackers can gain access to the company&#8217;s trade secrets or destroy data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To protect against a potential attack, cybersecurity experts recommend periodically testing databases for vulnerabilities.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;T&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\"><b>T<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Trojan programs (Trojans) <\/b><span style=\"font-weight: 400;\">are malicious software that enters a computer under the guise of legitimate content. It can be distributed through public files (photo, audio, video) or free (pre-cracked) programs that do not have a license to use.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can protect yourself from Trojans with the help of antivirus programs, as well as a ban on the use of software products and content without a license, both at home and in the office.<\/span><\/p>\n<p><b>Two-factor authentication (2FA or U2F) <\/b><span style=\"font-weight: 400;\">is an identity verification procedure that uses two different authentication factors: for example, one based on a password and the other biometric.<\/span><\/p>\n<p><b>Two-step authentication <\/b><span style=\"font-weight: 400;\">is an identity verification procedure using two authentication steps that follow each other. Unlike two-factor authentication, two-step authentication prevents you from going to the next step if the previous one has not been passed. Thus, if the first stage is passed successfully, the attacker can know that he has chosen the password correctly.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">More information in the article: \u201c<\/span><\/i><a href=\"https:\/\/shop.thekernel.ua\/shcho-take-dvoetapna-avtentyfikatsiia\"><i><span style=\"font-weight: 400;\">What is two-step authentication<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d.<\/span><\/i><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;\u0425&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text module_id=&#8221;V&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\"><b>V<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>A virus (computer virus) <\/b><span style=\"font-weight: 400;\">is a malicious program that can create and distribute copies of itself. It interferes with the operation of the computer or helps an attacker take control of it. Not all malware is a virus, but quite often the words are mistakenly used interchangeably. Firewalls and antivirus programs are used to fight viruses.<\/span><\/p>\n<p><b>VPN (virtual private network) <\/b><span style=\"font-weight: 400;\">is a technology that protects computers from tracking while providing the user with the opportunity to be a full member of a remote network and use its services without restrictions. This is done by creating a VPN tunnel, i.e., a virtual secure network on top of other, less trusted networks. The VPN tunnel allows:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Change your virtual location by connecting to a server in another country and changing your computer&#8217;s IP.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hide search history.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use the Internet without restrictions.<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;\u0426&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text module_id=&#8221;W&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\">\u00a0W<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>WebAuthn<\/b> <b>(web authentication) <\/b><span style=\"font-weight: 400;\">is a network standard that provides fast and passwordless user authentication by replacing passwords with security keys. The standard was developed by the World Wide Web Consortium (W3C) and the FIDO Alliance.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In order to use security keys on selected services without restrictions, it is important to use browsers that support the WebAuthn API protocol. The latter allows: creating accounts with registration of security keys and signing requests from the server with them.<\/span><\/p>\n<p><b>Worms <\/b><span style=\"font-weight: 400;\">\u2014<\/span> <span style=\"font-weight: 400;\">are viruses that exploit Windows zero-day vulnerabilities. It intercepts and modifies the information flow, providing opportunities for attackers to spy and disrupt the operation of automatic control systems. The worm (dubbed win32\/Stuxnet) was first discovered in 2010 on user computers and in industrial systems that manage automated work processes.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;0.4px&#8221; background_color=&#8221;#f2f2f2&#8243; custom_padding=&#8221;1%|2%|1%|2%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><i><span style=\"font-weight: 400;\">You can protect yourself from worms with the help of antivirus programs and precautionary measures, which we described in the article: \u201c<\/span><\/i><a href=\"https:\/\/shop.thekernel.ua\/en\/how-to-protect-yourself-and-colleagues-from-convincing-specialists-in-social-engineering\"><i><span style=\"font-weight: 400;\">How to protect yourself and colleagues from persuasive social engineering \u201cspecialists<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u201d.<\/span><\/i><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;\u0428&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text module_id=&#8221;Z&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; text_font_size=&#8221;1.1em&#8221; header_2_text_color=&#8221;#9aca3c&#8221; header_2_font_size=&#8221;4em&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\">\u00a0Z<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Zero-day vulnerabilities<\/b><span style=\"font-weight: 400;\"> are vulnerabilities that are not yet known to developers of new software. Since 0 days were allocated for their elimination, the vulnerability was called a \u201czero-day vulnerability\u201d, accordingly, attacks by hackers looking for such vulnerabilities were called \u201czero-day attacks\u201d. It is almost impossible to defend against them, because an updated release with bug fixes is usually released after the attack has been carried out.<\/span><\/p>\n<p><b>Zero trust <\/b><span style=\"font-weight: 400;\">is a model of information protection that works on the principle of mistrusting even legitimate users of the system. It provides for the verification of any request for information by additional means (for example, through additional authentication). This model also provides for the provision of minimum privileges for users, according to their roles in the system, and the timely disabling of the accounts of dismissed employees or workers who have been granted temporary access.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; text_letter_spacing=&#8221;0.5px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">We plan to supplement this page with new concepts and explanatory notes. So bookmark it and check back periodically for updates. You can also subscribe to our pages in social networks, where we publish new articles.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you have any questions about our cybersecurity services or proposals for cooperation, <\/span><a href=\"https:\/\/shop.thekernel.ua\/kontakti\"><span style=\"font-weight: 400;\">write to us<\/span><\/a><span style=\"font-weight: 400;\">!<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1 style=\"text-align: center;\">Need advice from security experts?<\/h1>\n<p style=\"text-align: center;\">Use the form below to send us an application. We will respond to your request shortly.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2021\/12\/yubikey-bio-c-fido-ip68.jpeg&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_contact_form submit_button_text=&#8221;Send&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; _unique_id=&#8221;d684f423-efc0-49df-8889-f5ec3c23945a&#8221; title_text_color=&#8221;#7CDA24&#8243; captcha_text_color=&#8221;#a4d323&#8243; custom_button=&#8221;on&#8221; button_text_color=&#8221;#8eba1f&#8221; button_font=&#8221;Roboto||||||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_contact_field field_id=&#8221;Name&#8221; field_title=&#8221;Name&#8221; _builder_version=&#8221;4.20.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Email&#8221; field_title=&#8221;Email&#8221; field_type=&#8221;email&#8221; _builder_version=&#8221;4.20.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Message&#8221; field_title=&#8221;Message&#8221; field_type=&#8221;text&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.20.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity thesaurusIt is better to start building cyber protection at the site development stage, because then it will cost the business much more. But when starting to learn information related to cybersecurity, users are faced with a lot of new concepts. They are needed to understand the types of threats from attackers, the types of [&hellip;]<\/p>\n","protected":false},"author":55,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"A comprehensive glossary of cybersecurity terms to help you better understand the field. Stay informed about the latest digital threats.","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-241452","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/pages\/241452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/comments?post=241452"}],"version-history":[{"count":14,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/pages\/241452\/revisions"}],"predecessor-version":[{"id":290022,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/pages\/241452\/revisions\/290022"}],"wp:attachment":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media?parent=241452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}