Cyber Glossary
通过我们的 CyberGlossary 网络安全词汇了解有关网络安全主题的更多信息
概述
Fortinet 為其客戶提供跨越不斷擴大的攻擊面的智能、無縫保護,以及應對當今和未來不斷增長的無邊界網絡性能要求的能力。
Fortinet 產品包括針對網絡安全、安全基礎設施、物聯網、OT、端點安全和雲安全的最廣泛的安全保護。
網絡詞彙表——網絡安全教育資源。使用 Fortinet 不斷增長的庫來學習網絡安全核心主題中不斷發展的新概念
云安全
很大一部分業務依賴於雲存儲、通信或基礎設施。因此,保護您在雲中的系統和資產應該是首要任務。雲安全措施可防止滲透者影響或侵入您的基礎架構。它們還保護您存儲在雲中的數據,無論是其專有信息還是您的客戶的信息。完整的雲安全解決方案可控制誰有權訪問您的基於雲的流量。您可以限制外部人員以及組織內部人員的訪問權限。由於每項業務都是獨一無二的,因此有多種雲安全選項可滿足各種需求。其中許多可以定制調整以創建 100% 獨特的解決方案
趋势主题
保障云安全
SaaS Security Posture Management
Learn what SSPM is, its key features, and how it differs from CASB and CSPM. Discover how SSPM protects your network's resources and what it should include.
SOX Sarbanes-Oxley Act
Learn what the Sarbanes-Oxley Act (SOX) is, the requirements, and its benefits. Discover how the Fortinet Public Cloud Security service keeps you in compliance with SOX.
Serverless Computing
Serverless computing is a cloud architecture that allows organizations to get on-demand access to the resources they need. Discover how serverless computing works and how serverless security protects ...
Confidential computing
Learn what confidential computing is, how it works, and why it is a breakthrough technology. Discover how to use confidential computing to secure your cloud infrastructure.
SASE architecture
SASE architecture brings advanced protection to the farthest edge of the network, enabling users to connect securely from anywhere. Learn SASE architecture, its components, and its importance to enter ...
OpenStack
OpenStack enables businesses to deploy virtual resources on-demand and set up private cloud services within their data centers. Learn what else OpenStack is capable of, its main components, and why yo ...
CIEM
CIEM helps organizations manage user entitlements across their cloud environments. CIEM tools and CIEM best practices allow companies to manage cloud access risk and time-limited controls.
Hybrid IT
Hybrid IT enables enterprises to combine on-premises and cloud platforms. Discover hybrid IT infrastructure challenges and what you can do to counter them.
Security service edge sse
Security service edge (SSE) combines a range of tools to keep users safe when accessing cloud and web services. Learn the primary components that make up SSE and the benefits.
Software defined perimeter
Software-defined perimeter (SDP) is a method of concealing infrastructure that is connected to the internet, such as routers and servers, preventing external users from being able to see it. Explore w ...
Security as a service
Learn what Security-as-a-Service (SECaaS) is, its benefits, and some examples of the different kinds of SECaaS. SECaaS is an increasingly popular cloud-based data security solution.
Email encryption
Email encryption prevents messages from being read by unintended recipients. Learn how it secures emails and protects your organization from malicious actors.
Data breach
A data breach is an event that results in confidential, private, protected, or sensitive information being exposed to an unauthorized person. Learn how a data breach happens and ways to protect it.
Cloud Access Security Broker
A cloud access security broker (CASB) is software that exists between users and cloud applications. Learn how CASBs enforce security and compliance policies.
Platform as a service
A Platform-as-a-Service (PaaS) allows organizations to scale application development efficiently. Discover PaaS types, advantages & how to protect against advanced threats.
Cloud VPN
A cloud VPN enables users to securely access corporate applications and networks remotely—any time, anywhere. Discover how to enable safe remote working using cloud VPNs.
DevOps security
DevOps security is a philosophy that combines development, operations, and security. Learn how FortiAnalyzer can be integrated with your DevOps security infrastructure to protect your organization's a ...
VPC
A virtual private cloud (VPC) offers the benefits of a private cloud but with the resources and cost savings of the public cloud. Discover features and layers of VPC security.
Reverse proxy
A reverse proxy refers to a server positioned in front of web servers. Learn how reverse proxy differs from a forward proxy and how it can help improve security, safety, and performance.
SASE vs CASB
SASE and CASB help organizations protect cloud applications and resources. Discover the difference between SASE vs. CASB and which best fits your unique network needs.
What is web security
Learn what web security is, the technologies that power it, and the threats designed to break it. Discover how FortiGuard Labs with advanced threat detection methods provides real-time updates to stop ...
Cloud Security Posture Management
Cloud security posture management (CSPM) enables organizations to identify and automatically mitigate risks in their cloud environment. Discover how Fortinet cloud security solutions offer advanced fe ...
Web security threats
Web security threats are cybersecurity risks that damage devices, systems, and networks. Discover common web security issues and how to keep your data and users secure.
Public cloud security risks
A public cloud provides many business benefits, such as agility and cost-effective computing solutions. But it also leaves users vulnerable to public cloud security risks. Discover 10 public cloud sec ...
Hybrid Data Center
Learn what a hybrid data center is, its features, and its main benefits as it allows a company to achieve business agility, scale on-demand, and strike a balance between the flexibility of private clo ...
IoT edge
The IoT edge is where sensors and devices communicate real-time data to a network. Learn how IoT edge computing solves latency issues associated with the cloud.
Software as a service
Learn what Software-as-a-Service (SaaS) is, the different models, and their benefits and dangers. Discover how the Fortinet FortiCASB can make SaaS secure.
Sase
What is SASE? Secure Access Service Edge (SASE) combines networking and security functions in a cloud-native platform. Find out why Fortinet SASE is changing cybersecurity.
Edge computing
Learn what edge computing is, how it is used, its benefits, and some of its drawbacks. Discover how FortiNAC can secure IoT edge devices on your network.
Virtual cloud network
Learn what a virtual cloud network is, how it works, and its advantages. Discover how the FortiGate NGFW virtual appliance can protect your organization with cloud-native security.
Infrastructure as a service
Learn what Infrastructure-as-a-Service is, the different types, its advantages, and how to implement IaaS. Discover how the FortiGate NGFW can protect an IaaS by shielding virtual machines from cyberc ...
Proxy firewall
A proxy firewall is a secure form of firewall connection that protects network resources at the application layer. Discover how a proxy firewall can help ensure compliance, threat protection, and web ...
Cloud infrastructure
Cloud infrastructure is the collection of components and elements needed to provide cloud computing. Discover how cloud infrastructure works and how Fortinet protects your critical cloud environments ...
Data egress
Data Egress is the process of data leaving a network and being transferred to an external location. Discover the threats related to data egress and how Fortinet can help your organization keep your da ...
Hyperscale
Hyperscale is the ability of a system to scale and meet growing data demands. Learn how hyperscale data centers store and transfer data efficiently.
What is cloud native
Consider cloud native computing foundations to optimize scalability and rapid deployment of applications and internal workflows. Learn how Fortinet can help your organization deploy a secure, scalable ...
Proxy-server
A proxy server stands between your computer and the internet. Learn what is a proxy server and how a proxy server can protect your data and find out whether a proxy can meet your needs.
WAF 与防火墙
标准防火墙对于保持网络安全至关重要,但 Web 应用程序防火墙同样重要。了解更多关于 WAF和防火墙的区别。
What is Shadow IT?
Learn the meaning of Shadow IT along with its benefits and risks. How is it applied in a work environment? See how Fortinet’s application control can be a solution.
What is Hybrid Cloud
Learn what a hybrid cloud is, how it works, the different types of cloud environments, and their benefits. See how Fortinet's solution improves cloud safety.
What is site to site vpn
Learn about the key components of site-to-site VPN and how to implement it. Find out how Fortinet high-performance VPN tools can protect your network.
云安全
云安全漏洞代价高昂,并会导致声誉受损。了解什么是云安全,以及 Fortinet 如何保护您的设备和应用程序。
HTTP Proxy
An HTTP proxy server hides users’ IP addresses and helps to block and filter malicious traffic from networks. Discover HTTP proxy meaning and how to use an HTTP proxy.
相关资源
网络安全
任何与互联网相连接的应用都需要网络安全。这包括您用于日常工作的计算机和移动设备,以及需要访问互联网才能运行的应用程序。此外,网络安全可以保护服务器、路由器、接入端和交换机免受入侵程序和黑客的攻击,从而保护您的网络基础设施。完整的网络安全解决方案通常包含多层防护。这些防护层可以被配置为“相互支持”,并联合起来形成一个更坚实的屏障,以抵御互联网安全威胁。
网络安全常识
Exploit
Learn what an exploit is, how it works, and the different types of exploits. Discover how Fortinet exploit protection can help identify vulnerabilities and secure your organization against database ex ...
SMB cybersecurity tools
Small and medium businesses (SMBs) are just as vulnerable to attacks as larger organizations. Learn the best cybersecurity tools and practices for protecting your small or medium-sized business.
Cybersecurity analytics
Learn what cybersecurity analytics is, why it is needed, and how to make it pay off for you. Cybersecurity analytics uses machine learning (ML) and behavioral analytics to monitor your network.
Fileless Malware
Fileless malware is "fileless" in that it requires no malicious application into a machine to infect it. Learn why it is difficult to detect and how to protect your organization from fileless malware ...
Bloatware
Bloatware is unwanted or hidden software included by the manufacturer when you purchase a device or computer. Learn the different types of bloatware and why they can be dangerous to your computer..
Account Takeover
Hackers taking over accounts can inflict extensive damage by exposing sensitive and personal information. Learn what an account takeover is, why scammers take over accounts, and how to protect your or ...
Cyber Insurance
Cyber insurance provides financial cover for businesses suffering from a cyberattack and protects organizations from the cost of internet-based threats. Explore cyber insurance, what it covers, and wh ...
What Is Cognitive Science
Cognitive science is the exploration of intelligence and the human mind. Discover what cognitive science is, its history, and how cognitive science cybersecurity can help your organization.
NIST Compliance
Learn what NIST (National Institute of Standards and Technology.) compliance is, what NIST does, who should comply, and why. Remaining in compliance helps protect not only the data but also the peopl ...
CVE
Common Vulnerabilities and Exposures (CVEs) are security threats that are included in a list or reference system of known risks. Discover the CVE vulnerability and exposure list.
What is deception technology
Deception technology is a strategy to attract cybercriminals away from an enterprise's true assets and divert them to a decoy or trap.. Understand how threat deception technology works and its benefi ...
Whaling attack
A whaling attack or whale phishing is a type of attack where a particularly important person in the organization is targeted. Explore how it is different from phishing and spear phishing & how we can ...
Election Security
Election security maintains public trust in governments, guarantees reliable votes, and protects all elements of election infrastructure. Learn what election security is and why protection of election ...
Identity theft
Identity theft means when someone takes someone else’s personal information without permission and then uses it for their own benefit. Discover identity theft effects, signs, & how to protect from att ...
Doxing
Learn what doxing is, how it works, its different uses, and ways to protect yourself. Doxing is a form of cyberbullying that uses sensitive or secret information, statements, or records for the harass ...
Watering hole attack
A watering hole attack is a form of cyberattack that targets groups of users by infecting websites that they commonly visit. Discover how watering hole attacks work and how Fortinet can protect your o ...
How to detect keylogger on phone
A keylogger, once installed on your device, records the keystrokes you make and sends them to a hacker. Learn how keyloggers work and how to detect them on different phone devices.
Cyber extortion
Learn what cyber extortion is, how it works, and the common types to be aware of. Discover the tools you can use to safeguard your organization from cyber extortionists.
Malvertising
Malvertising is malicious advertising used to direct a user to an unethical website where their data can be stolen. Learn what malvertising is, how it works and how to prevent it?
What is a QR Code
A quick response (QR) code is a barcode that appears in a square pattern and stores encoded data. Learn how QR codes are used and the risks associated with them.
Social Engineering
Social engineering attacks leverage human interaction and emotions to manipulate the target. Learn what social engineering is, its techniques, examples and how to protect against it.
What is fedramp
FedRAMP assures cloud service providers (CSPs) meet security protocols set by the U.S. government. Learn why FedRAMP Compliance is important and how it helps CSPs.
Smishing
Smishing or SMS phishing uses social engineering to trick someone into revealing private information. Know if you are being smished & how to protect enterprises from smishing attacks..
Mitre attck
Learn what MITRE ATT&CK is, its different elements, and how it can be used to analyze your network's security. Discover how FortiAI uses threat detection as well as MITRE ATT&CK investigation methods ...
Deepfake
Deepfake is a form of artificial intelligence that creates fake audio, images, and videos. Discover how deepfake technology works, how to spot deepfake content, and how to protect against this securit ...
Eavesdropping
Eavesdropping is a form of cyberattack that enables hackers to intercept, delete, or modify data that is transmitted between devices. Discover eavesdropping devices and the different attacks.
Mobile Device Management
Mobile device management (MDM) is security software that helps organizations secure, monitor, and manage employees' devices. Discover how MDM works and the different solutions.
Cyber warfare
Learn what cyber warfare is, the different kinds of cyber warfare, and the reasons behind it. Discover how a Fortinet Cyber Threat Assessment can get a complete profile of your organization’s potentia ...
Work from home cybersecurity risks
The increase in the number of home-based employees creates new remote work threats for businesses. Discover how to maintain security when employees work remotely with these work-from-home cybersecurit ...
Indicators of compromise
Learn what indicators of compromise (IOCs) are, how they work, and the most common types.
Recent cyber attacks
Cyber Attacks pose a major threat to businesses, governments, and internet users. Recent cyber attacks have resulted in hundreds of millions of user records stolen, organizations held to ransom, and d ...
What is hacktivism
Hacktivism is the act of hacking for politically or socially motivated purposes. Learn how hacktivism works, and how to protect from harmful attacks perpetrated by malicious actors.
Managed Detection and Response
Managed detection and response (MDR) is a service that helps organizations identify and react to threats. Learn what MDR is, its benefits, and what makes it different from managed security service pro ...
Rise of cybersecurity mesh
Cybersecurity mesh enables organizations to integrate disparate security solutions. Discover what a cybersecurity mesh approach is and the difference between cybersecurity mesh and zero trust.
Artificial Intelligence in Cybersecurity
Artificial intelligence (AI) in cybersecurity protects businesses against known and emerging cyber risks in a fast, scalable way that requires little to no human intervention. Discover the role of art ...
What is web security
Learn what web security is, the technologies that power it, and the threats designed to break it. Discover how FortiGuard Labs with advanced threat detection methods provides real-time updates to stop ...
Defense in depth
A defense-in-depth strategy leverages multiple security measures to protect an organization's assets. Learn about the different elements and layers of the defense in-depth mechanism.
Scareware
Scareware is a tactic cybercriminals use to scare people into downloading malware or visiting spoofed sites and can be spread via email.
Computer virus
A computer virus is a type of malware that spreads between computers and damages data and software. Explore the different types of computer viruses here.
Sextortion
Learn what sextortion is, how to protect yourself from it, and what to do if you are targeted. Discover how FortiMail can prevent email sextortion attacks.
SMB cyberattacks
Cyberattacks on small and medium businesses present a serious threat. Learn why SMB cyberattacks are such a big problem, the kinds of threats SMBs face, and how to protect your organization.
Fisma and fisma compliance
Learn what FISMA compliance is, why it was created, and how to stay in compliance. Discover how FortiSIEM can keep you in compliance with FISMA regulations and handle threats as they arise.
Definitions of Jargon
It is important not to confuse jargon with slang. ✓ Click to read more on cyber security terms & definitions of jargon (DOJ) from the experts at Fortinet.
What is adware
Learn what is adware, signs of infection, and how an ad blocker works. Learn how Fortinet antivirus solutions can help organizations block adware and stay protected.
Active defense
Active defense is the use of offensive tactics to slow down hackers and prevent cyberattacks. Discover what active cyber defense is and how the Fortinet suite of products can help your organization st ...
什么是网络攻击和网络攻击的种类
虽然网络攻击的种类有数十种不同类型,但以下是最常见的 20 种网络攻击示例。 学习网络攻击的类型以及如何最好地保护自己!
网络钓鱼
了解什么是网络钓鱼,以及犯罪者惯用的网络钓鱼和网络诈骗手段。了解更多,为日后更好的防范做准备!
Malware vs Virus vs Worm
Malware, viruses, and worms can be very destructive. Learn the differences between the three, the dangers of each, and what to do to protect your devices.
IoT Best Practices
Internet-of-Things (IoT) devices can be vulnerable to hacking and cyberattacks. Learn why this is so and the IoT security best practices you can implement to safeguard your devices, networks, and user ...
Types of Phishing Attacks
Phishing is a cyber threat that uses social engineering to trick people into providing sensitive information that could compromise an organization. Learn about the 19 different kinds of attacks.
Most Notorious Attacks in the History of Cyber Warfare
Cyber warfare weaponizes hacking skills to either launch attacks or prevents them from happening. Learn about the history of cyber warfare and the most notorious attacks ever recorded.
What is cybersecurity
Cybersecurity is the process of protecting corporate applications, data, programs, networks, and systems from cyberattacks and unauthorized access. Discover how Fortinet can protect your organization ...
Vishing attack
Learn what vishing attacks are, how they are performed, and the most common forms. Discover how FortiMail can protect your organization from vishing attacks.
Pharming
Pharming is a type of online fraud that directs victims to spoofed websites in an attempt to steal their credentials and data. Discover what is pharming, the types of pharming attacks, and how the For ...
DNS Poisoning
Learn what DNS poisoning is, its risks, and ways to prevent it. Discover how FortiGuard Labs work to protect your organization with advanced threat intelligence.
POS Security
Point-of-sale security (POS security) creates safe environments for customers to make purchases and complete transactions. Discover POS security measures your organization needs to implement and how F ...
Cyber espionage
Learn what cyber espionage is, what forms it might take, and what information is targeted. Discover how Fortinet solutions can help an organization protect itself from cyber threats.
Information security
Learn what information security is, the goals of InfoSec, the different kinds, and the common InfoSec risks. Discover how FortiGate and FortiSIEM boost InfoSec.
Black hat security
Black Hat Security is a criminal hacking activity carried out by black hat hackers. Discover who black hat hackers are, how they damage corporate systems, and how Fortinet can help your organization s ...
Honey tokens
Learn what honey tokens are, the different types, and how they are different from honeypots. Discover how honey tokens work to identify cyber attackers.
网络安全统计数据
网络安全问题,例如数据泄露、黑客攻击和网络钓鱼,对各种规模的组织构成了越来越大的威胁。了解网络安全数据和网络安全知识,加强组织机构的安全防御至关重要。
佯装黑客攻击
了解什么是虚假黑客攻击、如何识别它以及如果您成为攻击的受害者应采取的措施。了解 FortiGuard 如何使用最新的威胁情报来识别合法攻击者并在他们破坏您的网络之前阻止他们。
ICS Security
Learn what ICS security is, how it works, the common ICS threats, and best practices. Discover how the Fortinet ICS/SCADA solution can help create a safer, more efficient, and more secure production p ...
Vulnerability Assessment
Vulnerability assessment is an evaluation method that enables organizations to review their systems for potential security weaknesses. Discover the types of vulnerability assessment, how vulnerability ...
Email Security
Email security includes the techniques and technologies that protect email accounts and communications. Learn how to guard against malware and phishing attacks.
Worm virus
Learn what a worm virus is, the different kinds of worms, and how they spread. Discover how the Fortinet antivirus solution protects you from all kinds of malware.
Whitehat security
Learn what white hat security is, the need for white hat security and how a white hat hacker helps secure your network. Discover how FortiWeb uses several sophisticated tools like parameters, HTTP met ...
Penetration testing
Penetration testing is a method for testing organizations, IT systems, networks, and web applications for potential security vulnerabilities. Learn about the types of pen testing and how it works.
Attack surface
The attack surface is the sum of all possible points where an unauthorized user can access a system. Learn how to keep an attack surface as small as possible.
What is canary in cybersecurity
Learn what is a canary in cybersecurity and how a canary token helps prevent breaches. Discover how FortiDeceptor fools attackers and protects your network.
Disaster recovery
Learn what is a disaster in cybersecurity, how it works, and the types of disaster recovery. Discover how the FortiGate NGFW uses AI to look deep inside the contents of a data packet to identify malw ...
什么是黑客攻击
黑客攻击是通过未经授权的访问来破坏数字设备和网络的行为。了解黑客的工作原理、不同类型的黑客技术,以及 Fortinet 如何保护您免受网络犯罪的侵害。
Microsegmentation
Microsegmentation isolates workloads to secure them individually. Learn how microsegmentation strengthens security within data centers and cloud environments.
What is URL Filtering
URL filtering is the process that restricts the websites and content that employees can access. Learn how URL filtering works, the benefits of using it, and how the Fortinet SWG solution can help in e ...
Identity and Access Management
What is IAM & Identity Access Management System? Learn why IAM is a critical component of your network security, what it is, examples, & more. ✓ Read here!
What is the Zero Trust Security Model
Zero trust architecture secures the network from the inside out. Learn how to shrink the attack surface and implement a zero trust model for your network.
Zero Day Attack
Zero day attacks are your network's unknown vulnerabilities. Discover how Zero Day Exploit Works and methods to defend against them.
What is Shadow IT?
Learn the meaning of Shadow IT along with its benefits and risks. How is it applied in a work environment? See how Fortinet’s application control can be a solution.
Incident Response
The cybersecurity industry agrees it is best to approach incident response with a six-step plan. Prepare for your next security incident by planning ahead.
Remote Access
Learn What is Remote Access and how secure remote access can strengthen data security. Protect the devices in your organization for remote access connections with FortiGate.
What is Port Scan
Port scan is a technique hackers use to discover weak points in a network. Discover port scanning techniques, the difference between port scanning vs. network scanning, & how to prevent port checker a ...
Spyware
Spyware is a common cyberattack technique that causes data breaches and serious corporate damage. Learn about types of spyware, problems caused by it, and how to protect your system from spyware.
What is Botnet
Learn what botnets are, why they are created, and the types of botnet cyber crimes and threats. Protect your organization against botnet attacks using Fortinet tools.
What is MSSP
MSSPs play an important role in IT cybersecurity. Learn about what MSSPs are, their benefits, and how they differ from MSPs.
Intrusion Detection System
Intrusion Detection System (IDS) monitors network traffic and searches for known threats and suspicious or malicious activity. Learn IDS, its benefits, and how IDS protects an organization’s network.
Email Spoofing
Email spoofing is a threat that involves sending email messages with a fake sender address. Learn how email spoofing works, the reasons behind and ways to avoid it.
Spear Phishing
Spear Phishing attacks are highly targeted, hugely effective, and difficult to prevent. Explore how Spear Phishing works and best practices for its prevention.
What is Cyber Attack
A Cyber Attack is how cybercriminals gain access to networks and systems. Discover common Cyber Attack Methods and how the Fortinet cybersecurity solution can help you prevent them.
What is UEBA
User and entity behavior analytics (UEBA) uses machine learning to detect anomalies in the behavior of users and devices connected to a corporate network.
What is Bluekeep
BlueKeep is a vulnerability in Windows operating systems (OS) that poses a potential risk to older OS. Discover how Fortinet can protect your business from BlueKeep vulnerability risks.
What is SOC
Learn what is a SOC security operations center and how it protects an organization from internal and external threats.
Cryptojacking
Learn how cryptojacking works and gains access to and abuses your computer's resources. Find out how the FortiGuard Antivirus filters out the threat and shield your network.
What is Bitcoin Mining
Bitcoin mining involves using a computer to solve difficult mathematical equations for the user to earn bitcoin. Learn how bitcoin mining works and its associated risks.
Man in the middle attack
A man-in-the-middle (MITM) attack occurs when criminals hijack web protocols to steal data. Discover how does a MITM attack works and how to protect endpoints.
Clickjacking
Find out what Clickjacking is and why Clickjacking occurs when a victim clicks on links thought to be legit but are actually malicious.
What is keyloggers
A keylogger is a form of malware used by hackers to locate usernames and passwords. Discover Keyloggers types, how to detect and protect your devices from keylogging.
Cyber threat intelligence
Cyber threat intelligence uses data and analysis gleaned from threat history to block and remediate cyber-attacks. Learn why cyber threat intelligence is vital to organizations.
What is PII
Learn what Personally Identifiable Information (PII) is, what qualifies as PII, and how hackers can abuse it.
什么是特洛伊木马病毒?”
特洛伊木马病毒是一种在合法应用程序和软件中伪装自己的恶意软件。了解特洛伊木马的工作原理以及 Fortinet 防病毒解决方案如何防止特洛伊木马攻击并保护用户免受最新间谍软件、威胁和病毒的侵害。
IoT 安全
物联网安全是保护物联网设备及其连接的网络的行为。IoT 物联网设备包括工业机器、智能电网、楼宇自动化和员工带入工作的个人设备。
Data Loss Prevention
What is Data loss prevention (DLP)? Learn how DLP Software can help in detecting and preventing data breaches and exfiltration of sensitive information.
BYOD
Bring your own device (BYOD) means when employees use personal devices to connect to the organization's network and access what they need. ✓ Know BYOD Pros, Cons, and Security issues.
What is Phishing
What is phishing? During a phishing attempt, an attacker might pose as one of your trusted contacts. Protect your data by learning how to spot and avoid phishing messages.
相关资源
端点防护
您的网络端点(计算机和移动设备)通常是攻击者的轻松入口。端点防护可以保护您的设备,无论恶意软件是由黑客直接安装还是毫无戒心的用户不情愿地安装的。端点防护解决方案首先是发现端点风险,然后监测和评估危险水平。一旦系统识别出威胁,它就可以自动遏制并消除威胁。这是通过专门为您的业务系统设计的自动化流程来完成的。端点防护还可能涉及通过消除或绕过会拉高风险水平的端点来降低您的网络暴露风险。
端点防护知识
What is a QR Code
A quick response (QR) code is a barcode that appears in a square pattern and stores encoded data. Learn how QR codes are used and the risks associated with them.
Types of endpoint security
Learn what devices are classified as endpoints and why they are critical to business. Discover the different types of endpoint security you can implement to protect your critical business assets.
What is Endpoint Security?
Endpoint security is the process of protecting a network's endpoints from malicious threats & cyberattacks. Discover what is an endpoint and why endpoint security is important.
Encryption
Encryption is a key component in data security. Learn how it works and find out more about the different types of encryption that are crucial to cybersecurity.
What is EDR
Learn how EDR security works and can improve endpoint protection for your organization. Safeguard your network's endpoints with the Fortinet FortiEDR solution.
XDR
XDR is an integrated threat detection and response solution. Learn how it compares to traditional solutions and whether XDR is right for your organization.
PGP Encryption
Pretty Good Privacy (PGP) is a security program that secures communication and encrypts files. Discover what PGP encryption is and how Fortinet helps you encrypt your data with PGP.
相关资源
网络准入控制
网络准入控制可确保构成您网络的所有设备和系统的可见性、控制和自动响应。可见性包括形成连接到您网络的每个设备的配置文件。当允许访问交换机、路由器和接入端等外部产品时,网络的多功能性就得到增强,而不会影响您 IT 基础设施的安全性和完整性。网络准入控制还可通过响应能力来保护您的系统。一旦有威胁出现,就可以自动消除。网络准入控制系统通过更改配置来确保关键组件和数据的安全,从而实现这一点。
网络准入控制问题
Dynamic Host Configuration Protocol
Dynamic Host Configuration Protocol (DHCP) dynamically assigns IP addresses to each device connecting to your network. Learn how it works, what it does, and why it is important.
How To Implement Zero Trust
Learn how to implement zero trust security and the steps you need to take. Understand why implementation involves a policy of never trusting and always verifying the authenticity and privileges of dev ...
Federated identity
Federated identity links a user’s online identity across multiple domains and networks. Learn how to manage federated identity and how it differs from SSO.
API security
API security is the practice of preventing attacks on application programming interfaces (APIs). See the biggest API threats and how to protect against them.
DMARC
DMARC is short for Domain-based Message Authentication, Reporting, and Conformance. DMARC is an email security protocol that verifies email senders by supporting email protocols like DNS, DKIM, and S ...
Bot
Learn what a bot is, the different types of bots, and how to detect bot traffic. Many bots are designed to cause harm or benefit their users at the expense of people, computers, or networks..
Certificate Management
Certificate management is the process of overseeing digital certificates to prevent network disruption. See the steps needed to manage SSL/TLS certificates.
OCSP
The Online Certificate Status Protocol (OCSP) is used to check the revocation status of digital certificates. Learn how OCSP is an improvement over CRL.
Cross site scripting
Cross-site scripting is a web security issue that enables cybercriminals to exploit a website or web application.
Rootkit
Rootkit is a type of malware that enables attackers to take control of machines and steal data. Learn about the types of rootkits and how to detect them.
SQL injection
An SQL injection (SQLi) attack exploits vulnerabilities in an application's code by inserting an SQL query into regular input or form fields. Learn more about SQLi attack prevention & mitigation.
Remote Desktop Protocol
Remote Desktop Protocol (RDP) enables a computer user to access another computer in a different location. Discover how RDP works and how to secure RDP traffic.
LDAP Authentication
LDAP is a software protocol used for authentication and communication in directory services. Discover how LDAP authentication works.
Network monitoring
Learn what network monitoring is, why it is needed, the different methods, and what each monitoring tool does. Reach why each component of a modern-day network increases the attack surface.
Static vs dynamic ip
One of the main differences between static vs. dynamic IP addresses is that static IPs stay the same while dynamic IPs change. A static IP address is better for enterprises that own websites and inter ...
Dynamic DNS
Dynamic DNS (DDNS) automatically detects and updates any changes in IP address. Learn what dynamic DNS is, how it differs from DNS, and the benefits of DDNS.
Latency
Latency is defined as a delay when a user takes an action on a network and when they get a response. Learn how latency works, and how it differs from bandwidth and throughput.
SSO
Single sign-on (SSO) enables users to log in to multiple applications and websites with one set of credentials. Learn how SSO works and how it can strengthen security.
零信任边缘
零信任边缘架构将本地和云中的网络和安全技术结合在一起,通过 ZTNA 在任何地方提供零信任。了解 Fortinet 的零信任边缘架构方法是什么?
Authentication Token
An authentication token is a secure device that allows access to protected resources. Learn how token-based authentication verifies user identity.
What is Network Traffic
Network traffic is the data moving across a computer network at any given time. Learn how monitoring traffic can improve network performance and security.
What is network access control
Network access control (NAC) in networking, also known as network admission control, restricts unauthorized users and devices from gaining access to a corporate network. Learn how FortiNAC can help yo ...
Does a Firewall Affect Internet Speed
Learn about how a firewall affects internet speed and why it may have an impact. Discover how FortiGate NGFWs provide throughput while protecting your network.
OSI Model
The OSI model provides a framework to allow different computer systems to communicate with each other. Learn more about the 7 Network layers of the OSI reference model.
Proxy server vs packet filtering firewall
Proxy servers and packet filtering firewalls protect networks. Discover the difference between a proxy server and a firewall and how to choose between them.
What is an open proxy
An open proxy is a type of proxy server that can be used by anyone who wants to connect to the internet. Discover their pros and cons, and how to detect and avoid them.
What is CIAM
Learn what Customer Identity and Access Management (CIAM) is, how it protects customer data, its benefits, and essential elements.
PST file
A PST file is a file format that Microsoft software uses to store data and items like calendar events, email messages, and contacts. Discover the advantages and security issues with PST files and how ...
What is firmware
Firmware is a microcode that allows hardware devices to operate effectively. Discover how firmware security prevents firmware attacks and protects Internet-of-Things (IoT) devices.
Digital Certificates
A digital certificate is an electronic password that authenticates and verifies a device or user. Discover what are digital certificates and how Fortinet helps organizations secure their internet traf ...
路由跟踪
了解路由追踪(路由跟踪) 是什么、它的用途以及如何运行路由追踪。了解 Fortinet 如何帮助您的网络。 在此处阅读有关路由追踪的更多信息!
How to Setup a Proxy Server
Proxy servers sit between a user's computer and the internet, protecting your network from threats. Learn how to set up a proxy server on different operating systems and what to consider when choosing ...
File transfer protocol ftp meaning
Learn why you need FTP, how to use it, and the security challenges of FTP. Discover how the Fortinet NGFW can provide an enhanced layer of security for sensitive data sent using FTP that would otherwi ...
Scada and scada systems
SCADA is a system used to monitor and analyze data, and control industrial processes. Securing SCADA systems is crucial and vital to the safe operations of industrial machines. Discover how SCADA work ...
API key
An application programming interface (API) key is a code used to identify an application or user and is used for authentication in computer applications. Discover what an API key is used for and how F ...
802.1x authentication
Learn what 802.1x authentication is, its main parts, how it works, and what you can do with it. Discover how with Fortinet NAC, users and devices can be authenticated, profiled, denied access, and res ...
Does a VPN Decrease Internet Speed
A virtual private network (VPN) encrypts data transmitted and received during online activity. But it can affect internet speed. Discover how Fortinet can help.
Centralized Management
Learn what central management is, why it is needed, and its benefits. Discover how FortiManager keeps your network secure with centralized, automated processes.
VPN routers
Learn what VPN routers are, why they are needed, the different types, and some of their disadvantages. Discover how FortiGate can provide you with a secure VPN.
Kerberos authentication
Kerberos has been around for decades and remains a credible security system. Learn about Kerberos authentication, how it works, and how the Fortinet FortiWeb can be configured for authentication deleg ...
Privileged Identity Management
Learn what privileged identity management (PIM) is, its uses, and the risks of unmanaged identities. Discover how Fortinet identity access management (IAM) services enhance security.
Oauth
OAuth allows unrelated websites and applications to share assets. Learn how OAuth enables users to grant access to their information without giving away their password.
Network access control list
Learn what a network access control list (ACL) is, its benefits, and the different types. Discover how FortiNAC provides you with access control and visibility.
BGP Border Gateway Protocol
Learn what Border Gateway Protocol (BGP) is, how it works, and its characteristics. Discover how FortiDDoS' support of BGP Flowspec protects your network and devices from DDoS attacks.
Internet fraud
Internet fraud involves using online services and software that have access to the internet to defraud or take advantage of victims. Discover common types of internet scams and how Fortinet can protec ...
Radius Protocol
RADIUS is a client/server security protocol that is used to authenticate and authorize remote user access. Learn how to manage identities for a remote network.
Login credentials
Login credentials, typically a username and password, authenticate a user logging into an online account. Learn how to create secure login credentials.
Firewall configuration
Proper firewall configuration ensures network access is blocked for unauthorized users. Take these steps to configure your firewall and protect your network.
OIDC
OpenID Connect (OIDC) is an authentication protocol that allows applications to verify the identity of users. Learn how OIDC supports OAuth with the use of ID tokens.
What is SAML vs. OATH
When considering an SSO protocol, SAML and OAuth both have advantages. Learn more about these open standards, including the security implications of each.
What is Privileged Access Management
Privileged access management (PAM) is a system that securely manages access to accounts with heightened permissions. Learn how IAM can strengthen PAM solutions.
What is ARP
Learn how ARP works, the types of ARP, and why it is necessary. Discover how the Fortinet NAC solution provides enhanced visibility across the network to keep up with the ever-evolving threat landscap ...
User-datagram-protocol-udp
Learn how UDP works and used in DDoS attacks. Discover how FortiDDoS's responsive and dynamic security solution can help guard your network with extremely low latency.
What is URL Filtering
URL filtering is the process that restricts the websites and content that employees can access. Learn how URL filtering works, the benefits of using it, and how the Fortinet SWG solution can help in e ...
How does vpn work
A VPN is an encrypted network that enables users to browse the web securely. Learn about VPN encryption and protocols and how Fortinet can help protect your users, devices, and networks.
什么是 WAN 聚合?
了解什么是 WAN 聚合以及它如何帮助提高 SD-WAN 吞吐量?了解 WAN 聚合如何提高性能并简化您的网络。
Identity and Access Management
What is IAM & Identity Access Management System? Learn why IAM is a critical component of your network security, what it is, examples, & more. ✓ Read here!
What is the Zero Trust Security Model
Zero trust architecture secures the network from the inside out. Learn how to shrink the attack surface and implement a zero trust model for your network.
Wireless Network
A wireless network, whether PAN, LAN, MAN, or WAN, helps users connect wirelessly with your network, the internet, and each other. Learn how FortiGate Integrated Wireless Management solutions keep you ...
What is DNS
Learn what a Domain Name System (DNS) is, including the different types of DNS servers and DNS caching.
What is DMZ
A demilitarized zone (DMZ) is a perimeter network that protects an organization’s internal local area network (LAN) from untrusted traffic. A DMZ ensures a private network or LAN remains secure.
Network Automation
Network Automation uses applications to complete daily management tasks. Learn Network Automation Definition and how it can improve network efficiency and performance.
Network Segmentation
Network segmentation splits up a network to achieve better traffic flow control. Learn how dividing your network can improve overall security and performance.
Zero Trust
Zero Trust architecture secures the network from the inside out. Learn how to shrink the attack surface and implement a Zero Trust model for your network.
Authentication vs authorization
Authentication and authorization are two key components of access control. Learn about the differences between the two and how the Fortinet IAM tool can enable secure access.
What is UEBA
User and entity behavior analytics (UEBA) uses machine learning to detect anomalies in the behavior of users and devices connected to a corporate network.
WAN
广域网 (WAN) 技术将不同位置的用户相互连接起来。浏览本指南了解为什么 WAN 对通信至关重要。
DDoS Attack
Distributed Denial-of-Service (DDoS) attacks can flood your servers and take down online services. Learn more about DDoS Meaning, attack types, and examples.
Ethernet Switching
Ethernet switches act like a hub for your LAN devices. Learn how switches can optimize your network and find out why integrated security features are essential.
BYOD
Bring your own device (BYOD) means when employees use personal devices to connect to the organization's network and access what they need. ✓ Know BYOD Pros, Cons, and Security issues.
相关资源
内网安全
无论其规模或服务范围如何,内网安全始终是功能性、高效性业务的核心。内网安全的保护范围非常广泛,适用于各种设备、流程和技术。在基本层面上,内网安全由配置和规则组成,这些配置和规则被部署到您网络上的设备和系统。这些规则确保您网络的完整性、隐私性和实用性,并涵盖使您的网络正常运行的硬件和软件。安全措施可以应用于单个设备或具有相同漏洞级别的组件组。您也可以选择采取保护措施的位置。
内网安全图标
Mobile Security
Billions of mobile devices are in use around the world, and criminals are increasingly leveraging them to victimize people. Learn what mobile security is, why it is important, and how to protect your ...
What is Branch Networking
Learn what branch networking is, how to secure branch networks and the challenges of branch networking. Discover how Fortinet's NGFW secures branch networks.
What is Perimeter Firewall
A perimeter firewall is a security device that defends the boundary between a private and public network. Learn how to monitor and control unwanted traffic.
Data Security
Data security protects digital information from corruption, damage, and theft. Discover how Fortinet protects your organization using various types of data security.
Multi-factor authentication
Multi-factor authentication (MFA) confirms a user’s identity by requiring multiple credentials to access an application, account, or VPN. Learn MFA, its challenges, & how it enhances network security ...
Hardware security module
A hardware security module (HSM) stores cryptographic keys, making sure they are private but readily available to authorized users. Learn the different HSM model types and how they are used.
Data governance
What Is Data Governance? Framework, Components, and Best Practices | Fortinet Meta Description: Data governance is a system that makes sure only authorized people can interact with specific data. Lea ...
SSL Certificate
SSL (secure sockets layer) certificate holds the data that browsers access when you are viewing and interacting with the page. Learn what an SSL certificate is, its types, and how it protects the webs ...
What Is Network Security?
Network security protects organizations' data, employees, and customers from various attacks. Discover the types of network security and how it can help secure your networks.
Security service edge sse
Security service edge (SSE) combines a range of tools to keep users safe when accessing cloud and web services. Learn the primary components that make up SSE and the benefits.
DNS leak
A Domain Name System (DNS) leak occurs when DNS requests are sent to an internet service provider (ISP) even when a virtual private network (VPN) is being used to encrypt browsing activity. Discover w ...
Public key infrastructure
Public key infrastructure (PKI) refers to tools used to create and manage public keys for encryption. Learn what PKI is, how it encrypts communications, and the challenges PKI solves.
What is https
HTTPS is the protocol used to securely send data from a web browser to a website. Learn why HTTPS is an important security feature and how you can implement it on your site.
Data breach
A data breach is an event that results in confidential, private, protected, or sensitive information being exposed to an unauthorized person. Learn how a data breach happens and ways to protect it.
What is fedramp
FedRAMP assures cloud service providers (CSPs) meet security protocols set by the U.S. government. Learn why FedRAMP Compliance is important and how it helps CSPs.
Network monitoring
Learn what network monitoring is, why it is needed, the different methods, and what each monitoring tool does. Reach why each component of a modern-day network increases the attack surface.
How does a firewall work
Learn how a firewall works, the different kinds of firewalls, and how they protect data. Discover how firewalls protect your network architecture and endpoints.
Message Authentication Code
Learn what Message Authentication Code (MAC) is, how it works, and the different types.
Web scraping
Learn what web scraping is, how it is used, and how companies and individuals can abuse it.
What is 5g
5G wireless technology delivers new user experiences and connects industries. Learn what 5G is, how it works, the possibilities & vulnerabilities opened up by 5G technology.
零信任边缘
零信任边缘架构将本地和云中的网络和安全技术结合在一起,通过 ZTNA 在任何地方提供零信任。了解 Fortinet 的零信任边缘架构方法是什么?
SAML
SAML allows identity providers to share credentials with service providers. Learn how it works, why it is important, and how the Fortinet IAM solution can protect your network.
Data integrity
Data integrity helps ensure the accuracy, completeness, consistency, and validity of corporate data. Discover data integrity types, risks, and how to secure data and data centers.
CSRF
Cross Site Request Forgery (CSRF) is an attack on a web application by end-users that have already granted them authentication. Learn how it works, and how hackers construct a CSRF attack.
Rise of cybersecurity mesh
Cybersecurity mesh enables organizations to integrate disparate security solutions. Discover what a cybersecurity mesh approach is and the difference between cybersecurity mesh and zero trust.
什么是网络安全网格
了解什么是网络安全网格,以及为什么需要它来应对现代网络威胁。探索实施方法及其优势。
What Does a Firewall Do?
Learn what a firewall does, the types of firewalls, and their limitations. Discover how the FortiGate next-generation firewall with advanced SSL inspection can interpret traffic, and decrypt and scan ...
Proxy server vs packet filtering firewall
Proxy servers and packet filtering firewalls protect networks. Discover the difference between a proxy server and a firewall and how to choose between them.
Firewall defined
Learn what a firewall is, why it is important, how it works, and firewall best practices. Learn how a firewall can ensure the data is harmless and prevent data from being stolen or compromised.
Thin Client
A thin client is a computer that uses resources inside a central server as opposed to a hard drive. Learn how thin clients are used, thin vs thick clients, and how to protect thin clients.
CIA triad
Learn what the CIA triad is, why you should use it, and when. Discover how the FortiSIEM solution enhances your information's confidentiality, integrity, and availability.
Krack attack
KRACK is short for Key Reinstallation Attack. Learn what KRACK attacks are and why they are so dreadful. During a hack, the attacker can access usernames, passwords, data, bank details, emails, and mo ...
What is caching?
A cache stores data in a local folder on a device. This can increase application or website performance and efficiency by speeding up load times the next time a user opens or visits an application or ...
Web security threats
Web security threats are cybersecurity risks that damage devices, systems, and networks. Discover common web security issues and how to keep your data and users secure.
Firewall design principles
Firewalls prevent malicious data from going in and out of your networks. Learn five firewall design principles, the benefits of each, and the firewall techniques that enable them.
Hybrid firewall advantages disadvantages
A hybrid firewall is made up of multiple firewalls and can be tweaked to enhance your system's security performance. Learn its advantages and disadvantages and what to consider when looking at hybrid ...
sd-wan vs vpn
Both SD-WAN and VPN help organizations increase the security and performance of their networks. Discover the difference between the two, their pros and cons, and which best fits your organization.
Attack vector
Cybersecurity attacks are launched using attack vectors. Hackers use many methods to take advantage of system weaknesses. ✓ Learn how to avoid them!
有状态防火墙与无状态防火墙
了解状态防火墙与无状态防火墙之间的区别,以及哪种防火墙适合您的业务。在此处了解更多信息。
How to Setup a Proxy Server
Proxy servers sit between a user's computer and the internet, protecting your network from threats. Learn how to set up a proxy server on different operating systems and what to consider when choosing ...
SD-WAN Architecture
Software-defined wide-area network (SD-WAN) architecture can perform a host of functions, but most notably, it simplifies the control and management of IT infrastructure. Discover how you can secure y ...
Fabric of security
Learn what a fabric of security is and the technologies that comprise it. Discover how the Fortinet Security Fabric prevents a variety of cyber threats.
Supply Chain Attacks
Learn what supply chain attacks are and how to counter them. Discover how the visibility and control offered by the Fortinet suite of solutions can guard your system.
Sase
What is SASE? Secure Access Service Edge (SASE) combines networking and security functions in a cloud-native platform. Find out why Fortinet SASE is changing cybersecurity.
Proxy vs VPN
When it comes to data privacy, which is better—a proxy server or a VPN? Learn the differences between proxy vs. VPN and which is best for your business. Learn how Fortinet solutions can safeguard your ...
Ping of death
The ping of death is a form of denial-of-service (DoS) attack that hackers use to crash or freeze computers, services, and systems. Discover how a ping of death command works and how Fortinet can prot ...
Edge computing
Learn what edge computing is, how it is used, its benefits, and some of its drawbacks. Discover how FortiNAC can secure IoT edge devices on your network.
Wardriving
Wardriving is a hacking method that involves scouring for unsecured wireless networks then gaining unauthorized access to steal data and commit illegal activity. Discover how wardriving attacks work a ...
Snort
SNORT is an open-source intrusion detection and prevention system that provides real-time network traffic analysis and data packet logging. Discover what is SNORT and how to import SNORT rules with Fo ...
Firewall as a service fwaas
Learn what Firewall as a Service (FWaaS) is, how it works, its advantages, and why companies need it. Discover how Fortinet's SASE service provides FWaaS with all the benefits of the FortiGate NGFW, i ...
VPN Blocker
Learn what VPN blockers are, why VPNs get blocked, and how to avoid them. Discover how Fortinet's advanced security solutions can help you bypass VPN blocks.
Enterprise security
Learn what enterprise security is, why it is important, best practices, and challenges. Discover how Fortinet FortiASIC can process content at an accelerated pace, enabling organizations to secure hug ...
Stateful firewall
A stateful firewall monitors the full state of network traffic streams. Learn how stateful inspection works and how it compares to a stateless firewall.
Radius Protocol
RADIUS is a client/server security protocol that is used to authenticate and authorize remote user access. Learn how to manage identities for a remote network.
Firewall configuration
Proper firewall configuration ensures network access is blocked for unauthorized users. Take these steps to configure your firewall and protect your network.
AAA security
Authentication, authorization, and accounting (AAA) is a security framework that controls network access. Learn how AAA protocols strengthen network security.
What is Network Edge
The network edge is where a device or a local network communicates with the internet. Learn how to improve security on the edge of interconnected networks.
Data center security
Learn all about data center security, security technologies, and associated vulnerabilities. Discover how, with the FortiGate deep packet inspection (DPI) capability, you can keep your data center saf ...
什么是黑客攻击
黑客攻击是通过未经授权的访问来破坏数字设备和网络的行为。了解黑客的工作原理、不同类型的黑客技术,以及 Fortinet 如何保护您免受网络犯罪的侵害。
Transparent Firewall
A transparent firewall is easily deployed, undetectable, and acts as a bridge between interfaces. Learn how to add security without re-architecting a network.
VPN 隧道分离
VPN 隧道分离允许流量同时通过 VPN 和本地网络进行路由。了解如何在节省宽带的同时加密数据。
什么是 SSL VPN?
了解如今 SSL VPN 为何被广泛使用,以及 Fortinet VPN 技术如何保护用户免受威胁,无论他们的设备或网络连接如何。
VPN 的好处
VPN 的好处大于缺点,并且可以显着增强您的业务的安全性。 了解 VPN 的作用与功能 以及 Fortinet 如何保障您的网络安全!
Public Wi-Fi Safety
Learn why using a public wi-fi network you become a soft target for hackers to find a way to get access to your device and private information. VPN Wi-Fi protects your data using encryption.
How does vpn work
A VPN is an encrypted network that enables users to browse the web securely. Learn about VPN encryption and protocols and how Fortinet can help protect your users, devices, and networks.
硬件防火墙优于软件防火墙
了解硬件防火墙与软件防火墙的区别,以及为什么您的网络需要防火墙。了解硬件和软件防火墙如何工作,这两种技术有何不同?了解为什么硬件防火墙是保护网络的正确选择。
SDN vs SD-WAN
SDN (software-defined networking) has a lot in common with SD-WAN, but the two aren't interchangeable. ✓ Learn more & decide which technology you need!
什么是防火墙
什么是网络防火墙?了解防火墙网络如何保护您的网络免受不需要的流量并阻止传入的恶意软件。
什么是入侵防御系统 (IPS)?
了解什么是网络安全中的 IPS,以及它如何超越旧检测系统的简单智能。了解 IPS 入侵防御系统的工作原理以及为什么它对您的业务至关重要。
DIY-vs-Managed SD WAN
Looking for an SD-WAN solution? Remember to consider your deployment method. Learn more and decide whether DIY or managed SD-WAN is right for your business.
QoS - 服务质量
了解网络服务质量 (QoS) 的含义,以及哪些工具和技术有助于使用 Fortinet 管理流量。即刻联系我们了解更多。
Wireless Security Tips
Wireless network security should be a business priority. These 10 tips on how to secure your Wi-Fi can help create a safer and more secure internet experience.
Data-Center
Data centers are the physical homes of the computer systems that power our daily lives. Learn more about the essential role these facilities play for business.
MPLS
Multiprotocol Label Switching (MPLS) is designed to get packets of data to their destinations quickly and efficiently. Learn more about what is MPLS in networking and how it works.
What is Port Scan
Port scan is a technique hackers use to discover weak points in a network. Discover port scanning techniques, the difference between port scanning vs. network scanning, & how to prevent port checker a ...
Intrusion Detection System
Intrusion Detection System (IDS) monitors network traffic and searches for known threats and suspicious or malicious activity. Learn IDS, its benefits, and how IDS protects an organization’s network.
Failover
Understand why network architects create failover systems to enhance reliability. Whenever there is an interruption of operations, the costs, both in terms of time and frustration, can have a negative ...
What is Packet Loss
When accessing the internet or any network, small units of data called packets are sent and received. When one or more of these packets fails to reach its intended destination, this is called packet l ...
WAN
广域网 (WAN) 技术将不同位置的用户相互连接起来。浏览本指南了解为什么 WAN 对通信至关重要。
What is site to site vpn
Learn about the key components of site-to-site VPN and how to implement it. Find out how Fortinet high-performance VPN tools can protect your network.
What is Cryptography
Cryptography is the process of hiding or coding information so only the intended recipient can read a message. Discover how cryptography works and the potential risks it poses.
VPN
A VPN secures your identity as you send data over the Internet. ✓ See how to establish a virtual private network connection with this Fortinet guide.
VPN 安全吗
VPN 安全性可以保障安全浏览互联网和确保隐私。你的VPN安全吗?了解安全 VPN 的工作原理及其安全性。
Benefits of firewall
Data protection is a core benefit of firewalls. Learn how NGFWs go further and provide versatile, updated advantages to keep your information secure.
Data Loss Prevention
What is Data loss prevention (DLP)? Learn how DLP Software can help in detecting and preventing data breaches and exfiltration of sensitive information.
SD-WAN Explained
SD-WAN enables digital transformation by simplifying operations, improving threat performance, & reducing costs. Learn more about SD WAN delivers built-in security plus high-speed networking capabili ...
相关资源
勒索软件攻击和防御
勒索软件是一种恶意软件,它会阻止用户访问计算机系统,直到他们向攻击者支付赎金。勒索软件不断增加:2021 年,全球有 68.5% 的组织遭受勒索软件的攻击。
没有任何迹象表明勒索软件攻击会减缓。2022 年 4 月,能源公司 Oil India 遭到攻击,黑客要求以 750 万美元换回其 IT 系统的控制权。Oil 公司没有立即支付赎金,而是向当地和国际官员寻求援助——在此期间遭受了巨大的经济损失。
为什么企业需要防范勒索软件?
组织需要采取防护措施来让自己免受勒索软件的侵害,因为如果没有这些防护,网络犯罪分子就会劫持您的系统,使您的运营陷入停顿,直到您支付赎金或使用广泛的缓解策略来收回您的数据。
用户可从本节中学到什么?
在本节中,您将学习:
- 不同类型的勒索软件攻击
- 勒索软件方面的最新趋势,包括网络犯罪分子使用的策略和工具
- 保障 IT 系统所需的勒索软件安全防护
- 如何解决已侵入您系统的勒索软件
- 如何对待勒索软件赎金,包括是否支付以及如何避免支付的问题
==========================================================================================================================
How to prevent ransomware
Learn about how to protect and prevent ransomware, how to respond to a ransomware attack, and when you should pay (and not pay) the ransom.
Recent ransomware settlements
Ransomware attacks are on the rise, and so are the number of organizations paying settlement fees. Discover recent ransomware settlement events and how to prevent attacks.
Wannacry ransomware attack
WannaCry is a ransomware attack that exploits a vulnerability in Windows computers. Discover how the WannaCry ransomware attack works and how Fortinet security solutions can block the attack.
Ransomware
Ransomware is a specific type of malware that holds data hostage in exchange for a ransom. Learn how it works and ways to prevent ransomware attacks.
趋势主题
网络安全管理
网络安全管理是致力于预防、检测、评估、监控和响应网络安全威胁和事件的实践和团队。机构可以在称为安全运营中心或 SOC 的专用于网络安全管理的设施中建立这种监控和防御能力。 浏览我们关于网络安全管理的文章集。
网络安全管理问题
IT Security Policy
An IT security policy is a set of rules and procedures that enable employees to safely access digital assets. Learn the different components of an IT security policy and the best practices to adopt.
Critical infrastructure protection
Critical infrastructure protection (CIP) is the process of securing vital infrastructures, whether physical or virtual, across the region. Discover what sectors are covered by CIP and how it can help ...
Data classification
Data classification makes the process easy to find, retrieve, secure, & optimize data. Explore best practices compliance for data classification, and how it helps to identify & secure enterprise-criti ...
IT operations
IT operations (ITOps) consists of the services and processes that an IT department runs within an organization. Learn IT operations, its key elements, and the four types of security threats associated ...
Data Security
Data security protects digital information from corruption, damage, and theft. Discover how Fortinet protects your organization using various types of data security.
What is COBIT
Learn what COBIT is and how it benefits an organization's IT systems. Discover how the Fortinet Security Fabric can help make the implementation of COBIT standards easier.
DMARC
DMARC is short for Domain-based Message Authentication, Reporting, and Conformance. DMARC is an email security protocol that verifies email senders by supporting email protocols like DNS, DKIM, and S ...
Role based access control
Find out what role-based access control (RBAC) is and how it increases security while saving time and resources. Discover the best practices and advantages of RBAC.
Swatting
Swatting is an action of making hoax phone calls to report serious crimes to emergency services, which results in SWAT teams responding to an address. Discover its examples and how to prevent it.
Email encryption
Email encryption prevents messages from being read by unintended recipients. Learn how it secures emails and protects your organization from malicious actors.
Data Deduplication
Data deduplication is the process of removal of duplicate data in a way that maintains the integrity of the system, and functioning of applications. Explore data deduplication types, how it works & is ...
OWASP
The Open Web Application Security Project (OWASP) is a nonprofit organization dedicated to improving software security. Discover The OWASP Top 10, which is an awareness document for web applications.
Email security best practices
Email is one of the biggest cybersecurity threats facing organizations of all sizes. Discover email security best practices and the solutions that can keep your emails secure.
Endpoint security for mobile devices
Endpoint security for mobile devices has never been more critical as more employees embrace remote working. Discover the benefits of endpoint security and which mobile device security types provide ad ...
DKIM record
DomainKeys Identified Mail (DKIM) is an open technical standard that authenticates and verifies sent and received emails. Discover how DKIM works and what is a DKIM record.
CSRF
Cross Site Request Forgery (CSRF) is an attack on a web application by end-users that have already granted them authentication. Learn how it works, and how hackers construct a CSRF attack.
TCP IP Model vs OSI Model
TCP/IP and OSI are communication models that determine how systems connect and how data can be transmitted between them. Learn about the differences and how to choose between them.
Content Filtering
Content filtering screens and blocks access to emails and websites containing malicious or illegal information. Discover how to filter malicious content with comprehensive security solutions from Fort ...
Access Control
What is access control? Learn about a security process that enables organizations to manage access to corporate data and resources. ✓ Click to read more!
CIA triad
Learn what the CIA triad is, why you should use it, and when. Discover how the FortiSIEM solution enhances your information's confidentiality, integrity, and availability.
Enterprise architecture
Learn what enterprise architecture is, its various benefits, and the different frameworks used to execute it. More on the direct benefits and advantages of EA.
Compliance automation
Compliance automation is the use of technology to ensure systems meet regulatory requirements. Learn how to mitigate risks by automating compliance processes.
OT Security Best Practices
Operational technology is software and hardware that controls business devices, processes, and events. Learn five best practices for operational technology (OT) security and which tools provide the mo ...
IT vs OT Cybersecurity
Cybersecurity is essential to protecting both operational technology (OT) and information technology (OT). Discover the differences and similarities between IT vs. OT cybersecurity.
Phishing email analysis
Learn five different ways to spot phishing scams, the kind of data that is at risk, and how to create awareness. Discover the security tools most effective at fighting phishing.
Malware vs Virus vs Worm
Malware, viruses, and worms can be very destructive. Learn the differences between the three, the dangers of each, and what to do to protect your devices.
Distributed firewall
Distributed firewalls protect your entire network against cyberattacks. Discover how a distributed firewall architecture works and how Fortinet keeps your network secure.
Buffer overflow
Buffer overflow is a software coding error that enables hackers to exploit vulnerabilities, steal data, and gain unauthorized access to corporate systems. Discover what is a buffer overflow attack and ...
Information security
Learn what information security is, the goals of InfoSec, the different kinds, and the common InfoSec risks. Discover how FortiGate and FortiSIEM boost InfoSec.
Operational security
Operational security (OPSEC) is a security and risk management process that prevents sensitive information from getting into the wrong hands. Discover where OPSEC came from and how Fortinet can prote ...
Digital rights management drm
Digital rights management (DRM) is the use of technology to control and manage access to copyrighted material. DRM aims to protect the rights of copyright holders and prevent content from unauthorized ...
What is SIEM?
Learn how SIEM technology supports threat detection, compliance & security incidents through the collection & analysis of security events & contextual data sources.
XDR
XDR is an integrated threat detection and response solution. Learn how it compares to traditional solutions and whether XDR is right for your organization.
Related Resources
网络威胁检测
不仅黑客和数据窃贼变得更加老练,而且 DDoS 防护等威胁防护也更加复杂。高级威胁防护系统提供安全解决方案,保护网络上的所有设备免受恶意软件的侵害,并防止敏感数据被随意访问。这是通过专注于不同的攻击表面并采取防护措施来实现的。这意味着要保护网络中的各个元素,例如终端设备、服务器和路由器。此外,在软件层面,您网络中的电子邮件网关和中央管理控制台可以免受各种网络威胁。每家公司的设置在复杂性和规模上各不相同,您的威胁检测和防护解决方案可以根据您的需求进行定制。
威胁防护问题
Code Scanning
Learn what code scanning is, how it finds vulnerabilities, and the different code scanning approaches. Discover how code scanning can benefit your organization.
Heuristic Analysis
Heuristic analysis inspects commands or instructions in applications to detect malicious activity. Learn how it works and how it can help protect your system.
What is Machine Learning?
Machine learning enables computers to learn without someone having to program them. Read an introduction to machine learning, types, and its role in cybersecurity.
TCP-IP
Learn the meaning of Transmission Control Protocol (TCP) models that enable applications and devices. Understand the benefits of using TCP Protocol.
Spam filters
Learn what spam filters are and how they can help you. ✓ Discover how Fortinet can protect your critical data from being compromised in a breach.
Insider Threats
An insider threat is a security risk originating from an employee or authorized user. Learn the different insider threat types and how to protect your organization against them.
What is Honeypot
Learn what is a honeypot and are designed to look like attractive targets, and get deployed to allow IT, teams, to monitor the system’s security responses and to redirect the attacker away from their ...
What is pci compliance
The Payment Card Industry Data Security Standard (PCI DSS) compliance helps secure credit card transactions. Discover how to become PCI DSS compliant and maintain the status.
Captcha
CAPTCHA enables websites to validate visitors and prevent bots from accessing sites. Discover the different types of CAPTCHA code and how to configure CAPTCHA with Fortinet.
Threat Modeling
Threat modeling identifies and communicates information about the threats that may impact a particular system or network. Learn what threat modeling is and its techniques.
Indicators of compromise
Learn what indicators of compromise (IOCs) are, how they work, and the most common types.
Advanced threat protection atp
Learn what advanced threat protection is, the common ATP tactics, and how to defend against them. Discover how the Fortinet NGFW can filter all incoming and outgoing traffic and detect advanced threat ...
Fault tolerance
Fault tolerance ensures systems continue to operate as usual despite failures or malfunctions. Discover how fault-tolerant systems work, the difference between fault tolerance vs. high availability, a ...
DDoS Protection
DDoS protection is a security solution that detects and defends against denial-of-service threats. Create a DDoS protection plan to mitigate network attacks.
Phishing email analysis
Learn five different ways to spot phishing scams, the kind of data that is at risk, and how to create awareness. Discover the security tools most effective at fighting phishing.
Active defense
Active defense is the use of offensive tactics to slow down hackers and prevent cyberattacks. Discover what active cyber defense is and how the Fortinet suite of products can help your organization st ...
Implement ddos mitigation strategy
A DDoS mitigation strategy is necessary to protect organizations from potentially devastating DDoS attacks. Learn the steps to DDoS mitigation and what to look for in a mitigation provider.
IoT Device Vulnerabilities
Internet-of-Things (IoT) device vulnerabilities can lead to data theft and sophisticated cyberattacks. Discover the top IoT vulnerabilities and how to best protect your network and devices.
IoT Best Practices
Internet-of-Things (IoT) devices can be vulnerable to hacking and cyberattacks. Learn why this is so and the IoT security best practices you can implement to safeguard your devices, networks, and user ...
POS Security
Point-of-sale security (POS security) creates safe environments for customers to make purchases and complete transactions. Discover POS security measures your organization needs to implement and how F ...
Black hat security
Black Hat Security is a criminal hacking activity carried out by black hat hackers. Discover who black hat hackers are, how they damage corporate systems, and how Fortinet can help your organization s ...
Protecting Customer Information
Learn how companies protect consumer information to strengthen the organization. Discover how the Fortinet next-generation firewalls (NGFWs) and SD-WAN can help.
Devsecops
DevSecOps means integrating security at every phase of the software development lifecycle. Learn how development teams can deliver secure code more quickly.
Smurf Attack
A smurf attack is a form of DDoS attack that overwhelms networks and servers with Internet Control Message Protocol (ICMP) echo requests. Discover what is a DDoS smurf attack and how the FortiDDoS sol ...
Email Security
Email security includes the techniques and technologies that protect email accounts and communications. Learn how to guard against malware and phishing attacks.
DoS vs DDoS
DoS 和 DDoS 攻击用流量淹没服务器,试图使其瘫痪。了解 DoS 和 DDoS 的区别以及如何防范它们。
Whitehat security
Learn what white hat security is, the need for white hat security and how a white hat hacker helps secure your network. Discover how FortiWeb uses several sophisticated tools like parameters, HTTP met ...
What is Splunk
Splunk helps correlate, capture, and index real-time data, from which it creates alerts, dashboards, and graphs. Discover how the FortiGate App for Splunk visualizes data, logs events, and improves de ...
What is TTL
Learn what time to live (TTL) is and how it impacts your website. Discover how Fortinet tools like FortiGSLB can improve the overall experience of your online customers.
互联网控制消息协议
ICMP 协议是网络中的设备用来传达数据传输问题的协议。了解 ICMP 的工作原理,ICMP协议的作用以及如何在 DDoS 攻击中使用它。
Zero Day Attack
Zero day attacks are your network's unknown vulnerabilities. Discover how Zero Day Exploit Works and methods to defend against them.
Advanced Persistent Threat
Advanced persistent threats (APTs) hide in your network undetected, and as attacks evolve, businesses of all sizes are at risk. Learn how to combat APT.
双重身份验证
双因素认证为用户登录增加了额外的安全层。了解 2FA 的工作原理以及 Fortinet 解决方案如何帮助确保用户只能访问他们需要访问的系统和资源。
What is Botnet
Learn what botnets are, why they are created, and the types of botnet cyber crimes and threats. Protect your organization against botnet attacks using Fortinet tools.
What is Sandboxing
Learn what is a sandbox, why it's important, and how to create a sandbox environment to protect your network. Fortinet's sandbox software provides enhanced safety and protection against zero-day threa ...
Spear Phishing
Spear Phishing attacks are highly targeted, hugely effective, and difficult to prevent. Explore how Spear Phishing works and best practices for its prevention.
What is Cyber Attack
A Cyber Attack is how cybercriminals gain access to networks and systems. Discover common Cyber Attack Methods and how the Fortinet cybersecurity solution can help you prevent them.
Data Exfiltration
Data exfiltration is the theft or unauthorized removal or movement of any data from a device. Discover the different data exfiltration types and how Fortinet solutions can prevent data exfiltration th ...
Malware
Malware, or malicious software, refers to cyberattacks such as viruses, spyware, and ransomware. Learn how to recognize and combat malware on your network.
DDoS Attack
Distributed Denial-of-Service (DDoS) attacks can flood your servers and take down online services. Learn more about DDoS Meaning, attack types, and examples.
Brute force attack
A brute force attack is a trial-and-error method to crack passwords and encryption keys. Discover how attackers launch a brute force attack and the impact on business-critical applications.
Man in the middle attack
A man-in-the-middle (MITM) attack occurs when criminals hijack web protocols to steal data. Discover how does a MITM attack works and how to protect endpoints.
SOAR
Learn more about the Security Orchestration, Automation, and Response (SOAR) platform. How does SOAR differ from SIEM and what are the benefits of implementing it?
统一威胁管理
了解使用统一威胁管理解决方案的功能和优势,了解到底UTM是什么。了解具有反恶意软件功能的 Fortinet UTM 如何帮助扫描网络流量中的可疑文件并阻止它们,从而保护敏感数据。
What is SIEM?
Learn how SIEM technology supports threat detection, compliance & security incidents through the collection & analysis of security events & contextual data sources.
IoT
The Internet of Things (IoT) is defined as a network of physical objects that are connected to the internet using software, sensors, and other technologies. Learn what IoT means and its benefits.
What Is an IP Address
Learn what is an IP address and as a unique number identifies any device that connects to the internet. Discover how IP addresses work and what IP addresses are available.
IoT 安全
物联网安全是保护物联网设备及其连接的网络的行为。IoT 物联网设备包括工业机器、智能电网、楼宇自动化和员工带入工作的个人设备。
What is Phishing
What is phishing? During a phishing attempt, an attacker might pose as one of your trusted contacts. Protect your data by learning how to spot and avoid phishing messages.
PGP Encryption
Pretty Good Privacy (PGP) is a security program that secures communication and encrypts files. Discover what PGP encryption is and how Fortinet helps you encrypt your data with PGP.