Security Trybe(@SecurityTrybe) 's Twitter Profileg
Security Trybe

@SecurityTrybe

A Platform For Cyber Security| Networking | Tech| Education|IG-https://t.co/iWeuXqOxRk

ID:1495166759862784000

calendar_today19-02-2022 22:43:39

17,1K Tweets

165,8K Followers

106 Following

Follow People
Yousuf Khan Afroz (‏‏عفوا)(@YAfroz) 's Twitter Profile Photo

Security Trybe Zero Trust Architecture (ZTA) is a security framework that assumes all users and devices, inside or outside an organization, are potential threats. It requires verification and authentication for every access request, enforcing LPA and encryption.

account_circle
Danielle w(@Dwscipio) 's Twitter Profile Photo

DNS-Domain Name System, the system that allows users to type in a uniform resource locator(URL) like Google or localhost instead of ip addresses to reach a website.

account_circle
Naomi(@thegirlGodmade) 's Twitter Profile Photo

Security Trybe MFA- it's more than one way of authorizing a person. Just making sure you are who you say you are. Using passwords, Google authenticator, sms messages etc for authenicating to a platform instead of the traditional username and password only.

account_circle
Naomi(@thegirlGodmade) 's Twitter Profile Photo

Security Trybe SIEM is used by SOC Analysts for monitoring and detection. They store logs from various devices or sources for viewing, correlation, normalization from a central pane of glass. Instead of monitoring one by one from various devices, incident response can be done easily from the…

account_circle
Naomi(@thegirlGodmade) 's Twitter Profile Photo

Security Trybe IDS and IPS are similar. IPS detects and blocks malicious activity while IDS will only alert you upon detection.

account_circle
Naomi(@thegirlGodmade) 's Twitter Profile Photo

Security Trybe CIA - Confidentiality is the protection of your data from 'public knowledge'. Integrity is keeping your data from being altered or modified.
Availability is the act of making sure your data is not stolen or leaked and is always available upon need of demand.

account_circle
Solo Tech Guide⚡️(@SoloTechGuide) 's Twitter Profile Photo

In simple terms, a SIEM (Security Information and Event Management) is like a digital detective for your computer network.

It collects clues (logs and event data) from various devices and systems, then analyzes these clues to identify any suspicious activities, much like a…

account_circle
Lefasefare is POWER(@KelechiNwagba) 's Twitter Profile Photo

Security Trybe PIIs are personal identifiable informations eg FullName, phone number, email address, IP address etc.

These are informations to infer an individual's identity.

We also have SPII.

account_circle
sotoo_senpai(@sotoo_senpai) 's Twitter Profile Photo

Security Trybe 🔐 CIA in Cybersecurity:

- C: Confidentiality keeps secrets safe with encryption.

- I: Integrity ensures data is accurate and tamper-proof.

- A: Availability keeps systems up and running, no matter what.

Defend your digital kingdom with the CIA triad!

account_circle
Security Trybe(@SecurityTrybe) 's Twitter Profile Photo

🚨 If you are looking for FREE E-Books

PDF Drive (pdfdrive.com)
This website is truly one of the best for all kinds of ebooks.

You can get different kinds of Cybersecurity Books there 🫵

account_circle