Cybersecurity 101

In today’s digital world, cybersecurity is essential. At WatchGuard, we break down key cybersecurity topics with clear explanations, practical examples, and proven best practices. Whether you want to learn about network security, endpoint protection, identity management, or cyber threats—start your journey with Cybersecurity 101.

I

Identity Fabric

A unified architectural framework that integrates disparate identity and access management tools to act as a single unified system, giving organizations a centralized approach for managing digital identities in complex IT environments.

Identity-Based Attacks

Attacks that focus on stealing or guessing valid user credentials to bypass security perimeters. Once attackers obtain legitimate credentials, they appear as authorized users and can move through systems without triggering many security alerts.

IdP

Stands for Identity Provider. Acts as a central authority to verify users and grant secure access to applications, often through single sign-on (SSO) and multi-factor authentication (MFA). By creating, maintaining, and managing digital identities, it protects against unauthorized access by centralizing identity management and enforcing strong authentication.

Indicator of Attack (IoAs)

A proactive, real-time behavioral indicator, like suspicious admin activity, abnormal user behavior, or privilege escalation, that reveals an attack is in progress.

Indicator of Compromise (IoCs)

A digital clue that helps security teams detect, investigate, and respond to malicious activity that has already taken place on a network or endpoint. Clues include a suspicious IP address, file hash, or unusual inbound and outbound network traffic.

Initial Access Broker (IAB)

A cybercriminal who specializes in gaining unauthorized access to computer networks and systems, then selling that access to other criminals. IABs are part of the Ransomware-as-a-Service economy.

IntelligentAV

A WatchGuard security service that automates malware discovery and classifies current and future threats in mere seconds with AI-powered intelligence.