<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-GB">
	<id>https://act.gcai.dev/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Aye</id>
	<title>GCA ACT - User contributions [en-gb]</title>
	<link rel="self" type="application/atom+xml" href="https://act.gcai.dev/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Aye"/>
	<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php/Special:Contributions/Aye"/>
	<updated>2026-05-08T07:06:34Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.3</generator>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Network_Segmentation&amp;diff=6844</id>
		<title>Network Segmentation</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Network_Segmentation&amp;diff=6844"/>
		<updated>2023-10-28T22:53:41Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
[[File:ACT_Network_Segmentation_Icon.svg|frameless|40px|link=Network Segmentation]] &amp;lt;big&amp;gt;&#039;&#039;&#039;Introduction&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Network segmentation is a crucial strategy in the field of cybersecurity. It involves dividing a network into smaller, isolated segments or subnetworks to enhance security and limit the potential impact of a security breach. This technique is employed by both individuals and organizations to protect sensitive data, systems, and resources from unauthorized access and cyber threats.&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
[[File:Elephants.png|frameless|100px|right|link=Advanced_Protection]]&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Cybersecurity Tools&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
{{#categorytree:Network Devices|mode=pages|all}}&lt;br /&gt;
|}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Organizations&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Network segmentation is a vital cybersecurity strategy for organizations of all sizes in today&#039;s digital landscape. Each isolated segment can be equipped with its own security measures and access controls. This allows organizations mitigate the ever-evolving threats posed by cyberattacks, safeguard sensitive data, and maintain business continuity.&lt;br /&gt;
[[File:network_segmentation_organization.png|frameless|left|Traditional Network Segmentation]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Individuals&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Network segmentation is not just for large organizations; individuals can also use this cybersecurity strategy to enhance their online security and privacy. It involves dividing your home network into isolated segments to limit potential security risks and control access to your devices and data.&lt;br /&gt;
[[File:network_segmentation_individuals.png|frameless|left|Home Network Segmentation]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Organizational Benefits&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[File:security_icon.png|frameless|15px]] &#039;&#039;&#039;Enhanced Security&#039;&#039;&#039;: One of the primary benefits of network segmentation is improved security. By dividing a network into smaller segments, organizations can create barriers that prevent unauthorized access between segments. This makes it significantly more challenging for cybercriminals to move laterally within a network if they manage to breach one segment.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:recude_icon.jpg|frameless|15px]] &#039;&#039;&#039;Reduced Attack Surface&#039;&#039;&#039;: Network segmentation reduces the attack surface, which is the total area vulnerable to cyberattacks. By isolating different parts of the network, the potential attack vectors are minimized, making it harder for attackers to compromise critical systems.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:isolation_icon.png|frameless|15px]] &#039;&#039;&#039;Isolation of Sensitive Data&#039;&#039;&#039;: Organizations can isolate sensitive data, such as financial records or customer information, in dedicated segments. This ensures that even if one segment is breached, the sensitive data remains protected in another.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:regulation_icon.png|frameless|15px]] &#039;&#039;&#039;Compliance and Regulation&#039;&#039;&#039;: Many industry regulations and compliance standards require organizations to implement network segmentation as a security measure. Compliance with these standards is crucial for avoiding fines and legal repercussions.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:optimization_icon.png|frameless|15px]] &#039;&#039;&#039;Resource Optimization&#039;&#039;&#039;: Network segmentation allows for better resource allocation. For example, bandwidth-intensive applications can be isolated to specific segments to ensure that they do not impact the performance of other network segments.&lt;br /&gt;
|}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Organizational Impact&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[File:incident_response_icon.png|frameless|15px]] &#039;&#039;&#039;Improved Incident Response&#039;&#039;&#039;: In the event of a security incident, network segmentation helps contain the breach. This containment limits the damage caused and allows security teams to respond more effectively without affecting the entire network.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:data_exposure_icon.jpg|frameless|15px]] &#039;&#039;&#039;Minimized Data Exposure&#039;&#039;&#039;: If a breach occurs, the segmented structure minimizes the amount of data exposed, reducing the potential harm to an organization&#039;s reputation and financial well-being.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:access_control_icon.png|frameless|15px]] &#039;&#039;&#039;Better Access Control&#039;&#039;&#039;: Network segmentation enables granular control over who can access specific segments. This ensures that only authorized personnel have access to critical systems and resources.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:adaptability_icon.png|frameless|15px]] &#039;&#039;&#039;Adaptability&#039;&#039;&#039;: Organizations can adapt network segmentation to their specific needs. Segments can be created or modified as the organization&#039;s requirements evolve, allowing for a flexible and scalable security strategy.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:reduce_risk_icon.png|frameless|15px]] &#039;&#039;&#039;Reduced Risk&#039;&#039;&#039;: By proactively implementing network segmentation, organizations can significantly reduce the risk of a successful cyberattack. This helps protect sensitive information, maintain business continuity, and safeguard reputation.&lt;br /&gt;
|}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Individual Benefits&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[File:devoce_isolation_icon.png|frameless|15px]] &#039;&#039;&#039;Device Isolation&#039;&#039;&#039;: By segmenting your network, you can isolate different types of devices. For example, you can place your smart home devices (e.g., smart thermostats, cameras) in a separate segment from your personal computers and smartphones. This prevents a security breach on one type of device from compromising your entire network.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:guest_icon.png|frameless|15px]] &#039;&#039;&#039;Guest Network&#039;&#039;&#039;: Set up a separate guest network for visitors. This network can have limited access and be isolated from your main network, preventing guests from accidentally or intentionally accessing your sensitive data.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:iot_icon.png|frameless|15px]] &#039;&#039;&#039;IoT Security&#039;&#039;&#039;: With the proliferation of Internet of Things (IoT) devices, network segmentation is crucial. Isolating your IoT devices can protect your main network from potential vulnerabilities in these devices.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:parental_control_icon.png|frameless|15px]] &#039;&#039;&#039;Parental Control&#039;&#039;&#039;*: If you have children, network segmentation can help implement parental control measures. You can create a separate network segment for their devices and apply content filtering or time restrictions.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:security_testing_icon.png|frameless|15px]] &#039;&#039;&#039;Security Testing&#039;&#039;&#039;: Network segmentation allows you to test security measures on a limited scale without risking your entire network. You can experiment with different security configurations on one segment to assess their effectiveness.&lt;br /&gt;
|}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Individual Impact&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[File:enhanced_privacy_icon.png|frameless|15px]] &#039;&#039;&#039;Enhanced Privacy&#039;&#039;&#039;: Network segmentation provides better control over who can access your devices and data. Your personal devices and sensitive information are less exposed to potential threats.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:improved_security_icon.png|frameless|15px]] &#039;&#039;&#039;Improved Security&#039;&#039;&#039;: If one segment is compromised, the rest of your network remains protected. This containment can prevent the spread of malware and unauthorized access.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:network_management_icon.png|frameless|15px]] &#039;&#039;&#039;Efficient Network Management&#039;&#039;&#039;: Separating devices into segments makes it easier to manage your network and troubleshoot issues. You can identify and address problems in specific segments without affecting the entire network.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:peace_of_mind_icon.png|frameless|15px]] &#039;&#039;&#039;Peace of Mind&#039;&#039;&#039;: Knowing that your devices and data are compartmentalized can give you peace of mind, especially in an era of increasing cyber threats.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:customization_icon.png|frameless|15px]] &#039;&#039;&#039;Customization&#039;&#039;&#039;: Network segmentation allows you to customize security settings for each segment according to your specific needs and preferences.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implementing network segmentation at home may require some technical knowledge, but it can significantly improve your cybersecurity posture. It&#039;s an effective way to protect your devices, personal information, and privacy in an interconnected world.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Know_What_You_Have&amp;diff=6843</id>
		<title>Know What You Have</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Know_What_You_Have&amp;diff=6843"/>
		<updated>2023-10-28T22:02:19Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot;| &lt;br /&gt;
[[File:ACT_KnowWhat_YouHave_Icon.svg|frameless|40px|link=Know_What_You_Have]] &amp;lt;big&amp;gt;&#039;&#039;&#039;Cybersecurity Inventory&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
A cybersecurity inventory, also known as an asset inventory or digital asset inventory, is a comprehensive list of all the digital assets, devices, software, accounts, and data that an organization or individual possesses and relies on. The primary purpose of creating a cybersecurity inventory is to gain a clear understanding of what needs to be protected and to assess the associated risks.&lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
[[File:Rhinos.png|frameless|100px|right|link=Basic_Protection]]&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Cybersecurity Tools&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
{{#categorytree:Know What You Have - Create an Inventory|mode=pages|all}}&lt;br /&gt;
|}&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Identify Your Devices and Accounts&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Start by listing all the devices and accounts you use in your digital life. This may include:&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:computer_icon.svg|frameless|15px]] Computers (desktops, laptops)&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:mobile_icon.svg|frameless|15px]] Mobile devices (smartphones, tablets)&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:server_icon.svg|frameless|15px]] Servers&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:house-signal_icon.svg|frameless|15px]] IoT devices (smart thermostats, cameras)&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:hashtag_icon.svg|frameless|15px]] Online accounts (email, social media, financial)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Make sure to keep this list up-to-date as you acquire new devices or create new accounts.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Identify Your Applications&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
List all the software applications and online services you use. This can include:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:windows_icon.svg|frameless|15px]] Operating systems&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:excel_icon.svg|frameless|15px]] Productivity software (Microsoft Office, Google Workspace)&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:chrome.svg|frameless|15px]] Web browsers&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:cloud_icon.svg|frameless|15px]] Cloud storage services&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:envelope_icon.svg|frameless|15px]] Communication apps (email, messaging)&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:snowflake_icon.svg|frameless|15px]] Specialized software for work or hobbies&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Understanding the applications you rely on is essential for assessing their security.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Identify Your Risks&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Identifying your cybersecurity risks is a crucial part of the inventory process. Consider the following aspects:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:skuill_icon.svg|frameless|15px]] &#039;&#039;&#039;Threats&#039;&#039;&#039;: What are the potential threats to your devices, accounts, and data? These could include malware, phishing attacks, data breaches, and physical theft.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:door-open_icon.svg|frameless|15px]] &#039;&#039;&#039;Vulnerabilities&#039;&#039;&#039;: What weaknesses exist in your devices, software, or practices that could be exploited by cybercriminals? These might include outdated software, weak passwords, or lack of security updates.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:house_icon.svg|frameless|15px]] &#039;&#039;&#039;Assets&#039;&#039;&#039;: What digital assets are most critical to you? This can include sensitive personal information, financial data, intellectual property, or even sentimental data like family photos.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:house-chimney-crack_icon.svg|frameless|15px]] &#039;&#039;&#039;Consequences&#039;&#039;&#039;: What would be the impact of a cybersecurity breach or data loss? Consider the financial, personal, and reputational consequences.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
By identifying these risks, you can take targeted steps to mitigate them and improve your overall cybersecurity posture.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; | &lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Conclusion&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Creating and maintaining a cybersecurity inventory is a proactive approach to protecting your digital life. Regularly reviewing and updating this inventory will help you stay aware of potential risks and take appropriate security measures. Remember that cybersecurity is an ongoing process, and staying informed about the latest threats and best practices is essential to maintaining your digital security.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Malware&amp;diff=6842</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Malware&amp;diff=6842"/>
		<updated>2023-10-28T21:56:32Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot;| &lt;br /&gt;
[[File:ACT_Malware_Icon.svg|frameless|40px|link=Malware]] &amp;lt;big&amp;gt;&#039;&#039;&#039;Introduction&#039;&#039;&#039;&amp;lt;/big&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Malware, short for &#039;&#039;&#039;malicious software&#039;&#039;&#039;, is a broad term encompassing various types of harmful software programs designed to infiltrate, damage, or gain unauthorized access to computer systems, networks, and devices. Malware is a pervasive threat in the digital age, with cybercriminals constantly evolving their tactics to compromise the security and privacy of individuals, organizations, and governments.&lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
[[File:stalking-hyenas.png|frameless|100px|right|link=Top_Threats]]&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Cybersecurity Tools&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
{{#categorytree:Antivirus &amp;amp; Anti-malware Software|mode=pages|all}}&lt;br /&gt;
|}&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Types of Malware&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Virus_Icon.svg|frameless|15px]] &#039;&#039;&#039;Viruses&#039;&#039;&#039;: Self-replicating programs that attach themselves to legitimate files or software. When the infected file is executed, the virus spreads to other files and can cause a range of damage, from data corruption to system crashes.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:worms_icon.svg|frameless|15px]] &#039;&#039;&#039;Worms&#039;&#039;&#039;: Standalone malware programs that spread across networks and devices by exploiting vulnerabilities. Unlike viruses, worms do not need to attach to files to propagate. They can rapidly infect numerous devices, leading to network congestion and data theft.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:horse_icon.svg|frameless|15px]] &#039;&#039;&#039;Trojans&#039;&#039;&#039;: Named after the Trojan Horse from Greek mythology, are deceptive malware programs that appear to be legitimate software but carry hidden malicious payloads. Once installed, they can steal sensitive data, grant remote access to attackers, or perform other malicious actions.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:lock_icon.svg|frameless|15px]] &#039;&#039;&#039;Ransomware&#039;&#039;&#039;: A type of malware that encrypts a victim&#039;s data and demands a ransom in exchange for the decryption key. Paying the ransom is discouraged, as it does not guarantee the return of data and encourages further criminal activity.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:spy_icon.svg|frameless|15px]] &#039;&#039;&#039;Spyware&#039;&#039;&#039;: Secretly collects user information and transmits it to malicious actors. This can include browsing habits, login credentials, and personal data. Spyware is often used for espionage or identity theft.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:ad_icon.svg|frameless|15px]] &#039;&#039;&#039;Adware&#039;&#039;&#039;: Displays unwanted advertisements, often in the form of pop-ups or banners, to generate revenue for the malware&#039;s creators. While not as destructive as other malware types, adware can be highly annoying and intrusive.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Distribution and Infection&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Malware can infect systems through various means: &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:fish_icon.svg|frameless|15px]] &#039;&#039;&#039;Phishing&#039;&#039;&#039;: Cybercriminals send deceptive emails or messages with malicious attachments or links, tricking users into downloading malware. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:download_icon.svg|frameless|15px]] &#039;&#039;&#039;Drive-by Downloads&#039;&#039;&#039;: Visiting compromised websites can automatically download malware onto a user&#039;s device without their consent or knowledge.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:virus_v2_icon.svg|frameless|15px]] &#039;&#039;&#039;Infected Software&#039;&#039;&#039;: Downloading software from untrusted sources can lead to malware infection if the software is compromised. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:usb_icon.svg|frameless|15px]] &#039;&#039;&#039;Removable Media&#039;&#039;&#039;: Malware can spread through infected USB drives or external storage devices when plugged into a computer. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Impact and Prevention&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
The consequences of malware infections can be severe, including data loss, financial theft, and damage to a victim&#039;s reputation. To mitigate the risk of malware, individuals and organizations should implement the following preventive measures:&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:shield_virus_icon.svg|frameless|15px]] &#039;&#039;&#039;Antivirus Software&#039;&#039;&#039;: Install reputable antivirus and anti-malware programs to detect and remove malicious software. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:wrench_icon.svg|frameless|15px]] &#039;&#039;&#039;Regular Updates&#039;&#039;&#039;: Keep operating systems, software, and security patches up to date to fix known vulnerabilities. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:hand_icon.svg|frameless|15px]] &#039;&#039;&#039;Firewalls&#039;&#039;&#039;: Use firewalls to monitor and control incoming and outgoing network traffic. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:user_graduate_icon.svg|frameless|15px]] &#039;&#039;&#039;User Education&#039;&#039;&#039;: Educate users about safe online practices, such as not clicking on suspicious links or downloading files from unknown sources. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:database_icon.svg|frameless|15px]] &#039;&#039;&#039;Backup Data&#039;&#039;&#039;: Regularly back up important data to prevent data loss in case of a ransomware attack. &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; | &lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Conclusion&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Malware continues to pose a significant threat to the digital world. Understanding the various types of malware and implementing robust cybersecurity measures is essential to protect against these malicious programs. Staying vigilant and proactive in the fight against malware is crucial in today&#039;s interconnected and vulnerable digital landscape.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Malware&amp;diff=6838</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Malware&amp;diff=6838"/>
		<updated>2023-10-28T21:22:06Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot;| &lt;br /&gt;
[[File:ACT_Malware_Icon.svg|frameless|40px|link=Malware]] &amp;lt;big&amp;gt;&#039;&#039;&#039;Introduction&#039;&#039;&#039;&amp;lt;/big&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Malware, short for &#039;&#039;&#039;malicious software&#039;&#039;&#039;, is a broad term encompassing various types of harmful software programs designed to infiltrate, damage, or gain unauthorized access to computer systems, networks, and devices. Malware is a pervasive threat in the digital age, with cybercriminals constantly evolving their tactics to compromise the security and privacy of individuals, organizations, and governments.&lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
[[File:stalking-hyenas.png|frameless|100px|right|link=Top_Threats]]&lt;br /&gt;
{{#categorytree:Antivirus &amp;amp; Anti-malware Software||hideroot|mode=all}}&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Types of Malware&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Virus_Icon.svg|frameless|15px]] &#039;&#039;&#039;Viruses&#039;&#039;&#039;: Self-replicating programs that attach themselves to legitimate files or software. When the infected file is executed, the virus spreads to other files and can cause a range of damage, from data corruption to system crashes.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:worms_icon.svg|frameless|15px]] &#039;&#039;&#039;Worms&#039;&#039;&#039;: Standalone malware programs that spread across networks and devices by exploiting vulnerabilities. Unlike viruses, worms do not need to attach to files to propagate. They can rapidly infect numerous devices, leading to network congestion and data theft.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:horse_icon.svg|frameless|15px]] &#039;&#039;&#039;Trojans&#039;&#039;&#039;: Named after the Trojan Horse from Greek mythology, are deceptive malware programs that appear to be legitimate software but carry hidden malicious payloads. Once installed, they can steal sensitive data, grant remote access to attackers, or perform other malicious actions.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:lock_icon.svg|frameless|15px]] &#039;&#039;&#039;Ransomware&#039;&#039;&#039;: A type of malware that encrypts a victim&#039;s data and demands a ransom in exchange for the decryption key. Paying the ransom is discouraged, as it does not guarantee the return of data and encourages further criminal activity.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:spy_icon.svg|frameless|15px]] &#039;&#039;&#039;Spyware&#039;&#039;&#039;: Secretly collects user information and transmits it to malicious actors. This can include browsing habits, login credentials, and personal data. Spyware is often used for espionage or identity theft.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:ad_icon.svg|frameless|15px]] &#039;&#039;&#039;Adware&#039;&#039;&#039;: Displays unwanted advertisements, often in the form of pop-ups or banners, to generate revenue for the malware&#039;s creators. While not as destructive as other malware types, adware can be highly annoying and intrusive.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Distribution and Infection&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Malware can infect systems through various means: &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:fish_icon.svg|frameless|15px]] &#039;&#039;&#039;Phishing&#039;&#039;&#039;: Cybercriminals send deceptive emails or messages with malicious attachments or links, tricking users into downloading malware. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:download_icon.svg|frameless|15px]] &#039;&#039;&#039;Drive-by Downloads&#039;&#039;&#039;: Visiting compromised websites can automatically download malware onto a user&#039;s device without their consent or knowledge.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:virus_v2_icon.svg|frameless|15px]] &#039;&#039;&#039;Infected Software&#039;&#039;&#039;: Downloading software from untrusted sources can lead to malware infection if the software is compromised. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:usb_icon.svg|frameless|15px]] &#039;&#039;&#039;Removable Media&#039;&#039;&#039;: Malware can spread through infected USB drives or external storage devices when plugged into a computer. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Impact and Prevention&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
The consequences of malware infections can be severe, including data loss, financial theft, and damage to a victim&#039;s reputation. To mitigate the risk of malware, individuals and organizations should implement the following preventive measures:&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:shield_virus_icon.svg|frameless|15px]] &#039;&#039;&#039;Antivirus Software&#039;&#039;&#039;: Install reputable antivirus and anti-malware programs to detect and remove malicious software. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:wrench_icon.svg|frameless|15px]] &#039;&#039;&#039;Regular Updates&#039;&#039;&#039;: Keep operating systems, software, and security patches up to date to fix known vulnerabilities. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:hand_icon.svg|frameless|15px]] &#039;&#039;&#039;Firewalls&#039;&#039;&#039;: Use firewalls to monitor and control incoming and outgoing network traffic. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:user_graduate_icon.svg|frameless|15px]] &#039;&#039;&#039;User Education&#039;&#039;&#039;: Educate users about safe online practices, such as not clicking on suspicious links or downloading files from unknown sources. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:database_icon.svg|frameless|15px]] &#039;&#039;&#039;Backup Data&#039;&#039;&#039;: Regularly back up important data to prevent data loss in case of a ransomware attack. &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; | &lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Conclusion&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Malware continues to pose a significant threat to the digital world. Understanding the various types of malware and implementing robust cybersecurity measures is essential to protect against these malicious programs. Staying vigilant and proactive in the fight against malware is crucial in today&#039;s interconnected and vulnerable digital landscape.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Malware&amp;diff=6837</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Malware&amp;diff=6837"/>
		<updated>2023-10-28T21:14:18Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot;| &lt;br /&gt;
[[File:ACT_Malware_Icon.svg|frameless|40px|link=Malware]] &amp;lt;big&amp;gt;&#039;&#039;&#039;Introduction&#039;&#039;&#039;&amp;lt;/big&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Malware, short for &#039;&#039;&#039;malicious software&#039;&#039;&#039;, is a broad term encompassing various types of harmful software programs designed to infiltrate, damage, or gain unauthorized access to computer systems, networks, and devices. Malware is a pervasive threat in the digital age, with cybercriminals constantly evolving their tactics to compromise the security and privacy of individuals, organizations, and governments.&lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
[[File:stalking-hyenas.png|frameless|100px|right|link=Top_Threats]]&lt;br /&gt;
[[Category:Antivirus &amp;amp; Anti-malware Software]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Types of Malware&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Virus_Icon.svg|frameless|15px]] &#039;&#039;&#039;Viruses&#039;&#039;&#039;: Self-replicating programs that attach themselves to legitimate files or software. When the infected file is executed, the virus spreads to other files and can cause a range of damage, from data corruption to system crashes.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:worms_icon.svg|frameless|15px]] &#039;&#039;&#039;Worms&#039;&#039;&#039;: Standalone malware programs that spread across networks and devices by exploiting vulnerabilities. Unlike viruses, worms do not need to attach to files to propagate. They can rapidly infect numerous devices, leading to network congestion and data theft.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:horse_icon.svg|frameless|15px]] &#039;&#039;&#039;Trojans&#039;&#039;&#039;: Named after the Trojan Horse from Greek mythology, are deceptive malware programs that appear to be legitimate software but carry hidden malicious payloads. Once installed, they can steal sensitive data, grant remote access to attackers, or perform other malicious actions.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:lock_icon.svg|frameless|15px]] &#039;&#039;&#039;Ransomware&#039;&#039;&#039;: A type of malware that encrypts a victim&#039;s data and demands a ransom in exchange for the decryption key. Paying the ransom is discouraged, as it does not guarantee the return of data and encourages further criminal activity.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:spy_icon.svg|frameless|15px]] &#039;&#039;&#039;Spyware&#039;&#039;&#039;: Secretly collects user information and transmits it to malicious actors. This can include browsing habits, login credentials, and personal data. Spyware is often used for espionage or identity theft.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:ad_icon.svg|frameless|15px]] &#039;&#039;&#039;Adware&#039;&#039;&#039;: Displays unwanted advertisements, often in the form of pop-ups or banners, to generate revenue for the malware&#039;s creators. While not as destructive as other malware types, adware can be highly annoying and intrusive.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Distribution and Infection&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Malware can infect systems through various means: &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:fish_icon.svg|frameless|15px]] &#039;&#039;&#039;Phishing&#039;&#039;&#039;: Cybercriminals send deceptive emails or messages with malicious attachments or links, tricking users into downloading malware. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:download_icon.svg|frameless|15px]] &#039;&#039;&#039;Drive-by Downloads&#039;&#039;&#039;: Visiting compromised websites can automatically download malware onto a user&#039;s device without their consent or knowledge.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:virus_v2_icon.svg|frameless|15px]] &#039;&#039;&#039;Infected Software&#039;&#039;&#039;: Downloading software from untrusted sources can lead to malware infection if the software is compromised. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:usb_icon.svg|frameless|15px]] &#039;&#039;&#039;Removable Media&#039;&#039;&#039;: Malware can spread through infected USB drives or external storage devices when plugged into a computer. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Impact and Prevention&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
The consequences of malware infections can be severe, including data loss, financial theft, and damage to a victim&#039;s reputation. To mitigate the risk of malware, individuals and organizations should implement the following preventive measures:&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:shield_virus_icon.svg|frameless|15px]] &#039;&#039;&#039;Antivirus Software&#039;&#039;&#039;: Install reputable antivirus and anti-malware programs to detect and remove malicious software. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:wrench_icon.svg|frameless|15px]] &#039;&#039;&#039;Regular Updates&#039;&#039;&#039;: Keep operating systems, software, and security patches up to date to fix known vulnerabilities. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:hand_icon.svg|frameless|15px]] &#039;&#039;&#039;Firewalls&#039;&#039;&#039;: Use firewalls to monitor and control incoming and outgoing network traffic. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:user_graduate_icon.svg|frameless|15px]] &#039;&#039;&#039;User Education&#039;&#039;&#039;: Educate users about safe online practices, such as not clicking on suspicious links or downloading files from unknown sources. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:database_icon.svg|frameless|15px]] &#039;&#039;&#039;Backup Data&#039;&#039;&#039;: Regularly back up important data to prevent data loss in case of a ransomware attack. &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; | &lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Conclusion&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Malware continues to pose a significant threat to the digital world. Understanding the various types of malware and implementing robust cybersecurity measures is essential to protect against these malicious programs. Staying vigilant and proactive in the fight against malware is crucial in today&#039;s interconnected and vulnerable digital landscape.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Young_Adults_(18_-_25_yo)&amp;diff=6836</id>
		<title>Young Adults (18 - 25 yo)</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Young_Adults_(18_-_25_yo)&amp;diff=6836"/>
		<updated>2023-10-28T21:05:40Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;width: 40%&amp;quot;| {{#categorytree:Young Adults (18 - 25 yo)|hideroot|mode=pages}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;width: 60%&amp;quot;|&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
Young adults, specifically those aged 18 to 25, have distinct cybersecurity needs and concerns as they navigate the digital landscape. In this era of advanced connectivity, it becomes imperative for young adults to proactively address their online safety. By comprehending and adopting cybersecurity protocols, they can mitigate potential hazards and cultivate a resilient and secure digital environment.&lt;br /&gt;
&lt;br /&gt;
=== Online Environment ===&lt;br /&gt;
&lt;br /&gt;
Young adults need to be aware of cybersecurity risks and take steps to protect themselves online. This includes safeguarding their personal information, ensuring safe online experiences, protecting against cyber threats, and securing devices and networks.&lt;br /&gt;
&lt;br /&gt;
Specifically, young adults should:&lt;br /&gt;
&lt;br /&gt;
*Be cautious about sharing sensitive information online and be aware of the privacy settings on social media platforms.&lt;br /&gt;
*Be mindful of interacting with strangers online and avoid sharing personal details with individuals they don’t know. Recognize and report inappropriate content.&lt;br /&gt;
*Be familiar with common cyber threats such as phishing attempts and social engineering and learn how to identify them. Create strong passwords for their accounts, enable two-factor authentication, and regularly update their software and apps.&lt;br /&gt;
*Set up strong passwords for their devices, ensure that their Wi-Fi networks are secure, and keep their devices up to date with the latest security patches.&lt;br /&gt;
&lt;br /&gt;
=== Protection Needs ===&lt;br /&gt;
&lt;br /&gt;
Here are some key protection needs for young adults online:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Privacy Protection&#039;&#039;&#039;: Young adults need to be aware of the importance of protecting their privacy online. This includes understanding how their online activities can be tracked and used, and taking steps to minimize their exposure. For example, they should use strong passwords and two-factor authentication and be careful about what information they share on social media.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Data Security&#039;&#039;&#039;: Take steps to protect one&#039;s data from unauthorized access. This includes using encrypted messaging apps and services, and storing sensitive files in encrypted and password-protected containers. Additionally, there are many malicious links online that can include malware or ransomware. Do not click on links from an untrusted source. These links can always be double-checked by using link checker tools, such as [https://www.urlvoid.com/ URLVoid]&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Social Engineering&#039;&#039;&#039;: Social engineering is a type of cyberattack that uses psychological manipulation to trick people into revealing confidential information or performing actions that could compromise their security. Social engineers use a variety of techniques, such as phishing emails, baiting attacks, quid pro quo attacks, and pretexting attacks. To protect yourself from social engineering attacks, be wary of unsolicited messages, don&#039;t click on links or open attachments unless you are sure they are safe, be careful about what information you share online, and be suspicious of anyone who asks for your personal information or access to your computer system.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Location and Tracking&#039;&#039;&#039;: Young adults need to be aware of how their location can be tracked online and take steps to protect their privacy. This includes managing location-sharing settings on devices and apps, and being wary of location-based apps that might inadvertently reveal personal information.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Online Dating and Relationships&#039;&#039;&#039;: Use reputable and secure dating apps and being cautious about sharing personal information. With the rise of AI and deepfakes, it is paramount that young adults are aware of these potential risks and that the person they are talking to can be images and videos of other individuals who look or sounds like they are saying or doing something they never actually said or did.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Personal Cybersecurity Hygiene&#039;&#039;&#039;: Young adults need to practice good personal cybersecurity hygiene. This includes using strong and unique passwords, enabling two-factor authentication wherever possible, and keeping operating systems, apps, and security software up to date.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Ease_of_use_icon.png&amp;diff=3052</id>
		<title>File:Ease of use icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Ease_of_use_icon.png&amp;diff=3052"/>
		<updated>2023-10-22T04:31:03Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Features_icon.png&amp;diff=3051</id>
		<title>File:Features icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Features_icon.png&amp;diff=3051"/>
		<updated>2023-10-22T04:30:55Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Budget_icon.png&amp;diff=3050</id>
		<title>File:Budget icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Budget_icon.png&amp;diff=3050"/>
		<updated>2023-10-22T04:30:46Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Organization_size_icon.png&amp;diff=3049</id>
		<title>File:Organization size icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Organization_size_icon.png&amp;diff=3049"/>
		<updated>2023-10-22T04:30:39Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Compliance_icon.png&amp;diff=3048</id>
		<title>File:Compliance icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Compliance_icon.png&amp;diff=3048"/>
		<updated>2023-10-22T04:30:32Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Security_Information_%26_Event_Management&amp;diff=3047</id>
		<title>Security Information &amp; Event Management</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Security_Information_%26_Event_Management&amp;diff=3047"/>
		<updated>2023-10-22T04:30:23Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
[[File:ACT_Security_Information_Event_Management_Icon.svg|frameless|40px|link=Security Information &amp;amp; Event Management]] &amp;lt;big&amp;gt;&#039;&#039;&#039;Introduction&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Security information and event management (SIEM) is a security solution that helps organizations detect, analyze, and respond to security threats. SIEM systems collect log data from a variety of sources, such as firewalls, intrusion detection systems, and security applications, and then analyze the data for suspicious activity. SIEM systems can also generate alerts to notify security personnel of potential threats.&lt;br /&gt;
&lt;br /&gt;
SIEM systems are an important part of a layered security strategy. They can help organizations to:&lt;br /&gt;
* &#039;&#039;&#039;Detect threats early&#039;&#039;&#039;: SIEM systems can detect threats that may go undetected by other security solutions. For example, a SIEM system may be able to detect a pattern of unusual login attempts that could indicate an attack.&lt;br /&gt;
* &#039;&#039;&#039;Investigate incidents more quickly&#039;&#039;&#039;: SIEM systems can help organizations to investigate security incidents more quickly and efficiently. By centralizing and analyzing log data from a variety of sources, SIEM systems can give security personnel a complete view of the incident.&lt;br /&gt;
* &#039;&#039;&#039;Respond to threats more effectively&#039;&#039;&#039;: SIEM systems can help organizations to respond to threats more effectively. For example, a SIEM system may be able to automatically block an attacker&#039;s IP address or notify security personnel of the need to take other action.&lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
[[File:Elephants.png|frameless|100px|right|link=Advanced_Protection]]&lt;br /&gt;
Placeholder (Tools coming soon!)&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;How SIEM works&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
SIEM systems typically work by following these steps:&lt;br /&gt;
&lt;br /&gt;
[[File:data_collection_icon.png|frameless|15px]] &#039;&#039;&#039;Data collection&#039;&#039;&#039;: SIEM systems collect log data from a variety of sources, such as firewalls, intrusion detection systems, and security applications.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:data_normalization_icon.png|frameless|15px]] &#039;&#039;&#039;Data normalization&#039;&#039;&#039;: SIEM systems normalize the log data, meaning that they convert the data into a consistent format so that it can be easily analyzed.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:data_correlation_icon.png|frameless|15px]] &#039;&#039;&#039;Data correlation&#039;&#039;&#039;: SIEM systems correlate the log data to identify patterns and trends. This can help to identify suspicious activity that may indicate an attack.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:alert_generation_icon.png|frameless|15px]] &#039;&#039;&#039;Alert generation&#039;&#039;&#039;: SIEM systems generate alerts to notify security personnel of potential threats.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:report_icon.png|frameless|15px]] &#039;&#039;&#039;Reporting&#039;&#039;&#039;: SIEM systems can generate reports to help organizations track their security posture and identify areas for improvement.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Benefits of using a SIEM system&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
There are many benefits to using a SIEM system, including:&lt;br /&gt;
&lt;br /&gt;
[[File:improved_security_icon.png|frameless|15px]] &#039;&#039;&#039;Improved security posture&#039;&#039;&#039;: SIEM systems can help organizations to improve their security posture by helping them to detect and respond to threats more quickly and effectively.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:data_exposure_icon.jpg|frameless|15px]] &#039;&#039;&#039;Reduced risk of data breaches&#039;&#039;&#039;: SIEM systems can help to reduce the risk of data breaches by helping organizations to detect and respond to attacks before they can cause damage.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:compliance_icon.png|frameless|15px]] &#039;&#039;&#039;Improved compliance&#039;&#039;&#039;: SIEM systems can help organizations to comply with security regulations by providing them with a way to track and report on their security posture.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Choosing a SIEM system&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
There are a number of SIEM systems available on the market. When choosing a SIEM system, it is important to consider the following factors:&lt;br /&gt;
&lt;br /&gt;
[[File:organization_size_icon.png|frameless|15px]] &#039;&#039;&#039;Organization size&#039;&#039;&#039;: SIEM systems are available for organizations of all sizes. It is important to choose a SIEM system that is right for the size and complexity of your organization.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:budget_icon.png|frameless|15px]] &#039;&#039;&#039;Budget&#039;&#039;&#039;: SIEM systems can range in price from a few thousand dollars to hundreds of thousands of dollars. It is important to choose a SIEM system that fits your budget.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:features_icon.png|frameless|15px]] [[#Common Features|&#039;&#039;&#039;Features&#039;&#039;&#039;]]: SIEM systems offer a variety of features. It is important to choose a SIEM system that has the features that you need.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:ease_of_use_icon.png|frameless|15px]] &#039;&#039;&#039;Ease of use&#039;&#039;&#039;: SIEM systems can be complex to implement and use. It is important to choose a SIEM system that is easy to use for your security personnel.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you are considering using a SIEM system, it is important to do your research and choose a system that is right for your organization.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;&amp;lt;span id=&amp;quot;Common Features&amp;quot;&amp;gt;Common Features&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
SIEM systems offer a variety of features, but the most common features include:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Log collection&#039;&#039;&#039;: SIEM systems can collect log data from a variety of sources, such as firewalls, intrusion detection systems, security applications, and servers.&lt;br /&gt;
* &#039;&#039;&#039;Data normalization&#039;&#039;&#039;: SIEM systems normalize the log data, meaning that they convert the data into a consistent format so that it can be easily analyzed.&lt;br /&gt;
* &#039;&#039;&#039;Data correlation&#039;&#039;&#039;: SIEM systems correlate the log data to identify patterns and trends. This can help to identify suspicious activity that may indicate an attack.&lt;br /&gt;
* &#039;&#039;&#039;Alert generation&#039;&#039;&#039;: SIEM systems generate alerts to notify security personnel of potential threats.&lt;br /&gt;
* &#039;&#039;&#039;Reporting&#039;&#039;&#039;: SIEM systems can generate reports to help organizations track their security posture and identify areas for improvement.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Additional Features&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
In addition to these core features, many SIEM systems also offer the following features:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security intelligence&#039;&#039;&#039;: SIEM systems can integrate with security intelligence feeds to provide organizations with information about the latest threats.&lt;br /&gt;
* &#039;&#039;&#039;Threat hunting&#039;&#039;&#039;: SIEM systems can be used to hunt for threats that are not detected by traditional security solutions.&lt;br /&gt;
* &#039;&#039;&#039;Incident response&#039;&#039;&#039;: SIEM systems can be used to automate and streamline the incident response process.&lt;br /&gt;
* &#039;&#039;&#039;Compliance reporting&#039;&#039;&#039;: SIEM systems can generate reports to help organizations comply with security regulations.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Advanced Features&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Some SIEM systems also offer more advanced features, such as:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;User and entity behavior analytics (UEBA)&#039;&#039;&#039;: UEBA uses machine learning to analyze user and entity behavior to identify anomalous activity that may indicate an attack.&lt;br /&gt;
* &#039;&#039;&#039;Network traffic analysis (NTA)&#039;&#039;&#039;: NTA analyzes network traffic to identify suspicious activity, such as malware or botnet traffic.&lt;br /&gt;
* &#039;&#039;&#039;Security orchestration, automation, and response (SOAR)&#039;&#039;&#039;: SOAR automates tasks associated with security incident response.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Security_Information_%26_Event_Management&amp;diff=3046</id>
		<title>Security Information &amp; Event Management</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Security_Information_%26_Event_Management&amp;diff=3046"/>
		<updated>2023-10-22T04:29:01Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
[[File:ACT_Security_Information_Event_Management_Icon.svg|frameless|40px|link=Security Information &amp;amp; Event Management]] &amp;lt;big&amp;gt;&#039;&#039;&#039;Introduction&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Security information and event management (SIEM) is a security solution that helps organizations detect, analyze, and respond to security threats. SIEM systems collect log data from a variety of sources, such as firewalls, intrusion detection systems, and security applications, and then analyze the data for suspicious activity. SIEM systems can also generate alerts to notify security personnel of potential threats.&lt;br /&gt;
&lt;br /&gt;
SIEM systems are an important part of a layered security strategy. They can help organizations to:&lt;br /&gt;
* &#039;&#039;&#039;Detect threats early&#039;&#039;&#039;: SIEM systems can detect threats that may go undetected by other security solutions. For example, a SIEM system may be able to detect a pattern of unusual login attempts that could indicate an attack.&lt;br /&gt;
* &#039;&#039;&#039;Investigate incidents more quickly&#039;&#039;&#039;: SIEM systems can help organizations to investigate security incidents more quickly and efficiently. By centralizing and analyzing log data from a variety of sources, SIEM systems can give security personnel a complete view of the incident.&lt;br /&gt;
* &#039;&#039;&#039;Respond to threats more effectively&#039;&#039;&#039;: SIEM systems can help organizations to respond to threats more effectively. For example, a SIEM system may be able to automatically block an attacker&#039;s IP address or notify security personnel of the need to take other action.&lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
[[File:Elephants.png|frameless|100px|right|link=Advanced_Protection]]&lt;br /&gt;
Placeholder (Tools coming soon!)&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;How SIEM works&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
SIEM systems typically work by following these steps:&lt;br /&gt;
&lt;br /&gt;
[[File:data_collection_icon.png|frameless|15px]] &#039;&#039;&#039;Data collection&#039;&#039;&#039;: SIEM systems collect log data from a variety of sources, such as firewalls, intrusion detection systems, and security applications.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:data_normalization_icon.png|frameless|15px]] &#039;&#039;&#039;Data normalization&#039;&#039;&#039;: SIEM systems normalize the log data, meaning that they convert the data into a consistent format so that it can be easily analyzed.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:data_correlation_icon.png|frameless|15px]] &#039;&#039;&#039;Data correlation&#039;&#039;&#039;: SIEM systems correlate the log data to identify patterns and trends. This can help to identify suspicious activity that may indicate an attack.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:alert_generation_icon.png|frameless|15px]] &#039;&#039;&#039;Alert generation&#039;&#039;&#039;: SIEM systems generate alerts to notify security personnel of potential threats.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:report_icon.png|frameless|15px]] &#039;&#039;&#039;Reporting&#039;&#039;&#039;: SIEM systems can generate reports to help organizations track their security posture and identify areas for improvement.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Benefits of using a SIEM system&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
There are many benefits to using a SIEM system, including:&lt;br /&gt;
&lt;br /&gt;
[[File:improved_security_icon.png|frameless|15px]] &#039;&#039;&#039;Improved security posture&#039;&#039;&#039;: SIEM systems can help organizations to improve their security posture by helping them to detect and respond to threats more quickly and effectively.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:data_exposure_icon.png|frameless|15px]] &#039;&#039;&#039;Reduced risk of data breaches&#039;&#039;&#039;: SIEM systems can help to reduce the risk of data breaches by helping organizations to detect and respond to attacks before they can cause damage.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:compliance_icon.png|frameless|15px]] &#039;&#039;&#039;Improved compliance&#039;&#039;&#039;: SIEM systems can help organizations to comply with security regulations by providing them with a way to track and report on their security posture.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Choosing a SIEM system&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
There are a number of SIEM systems available on the market. When choosing a SIEM system, it is important to consider the following factors:&lt;br /&gt;
&lt;br /&gt;
[[File:organization_size_icon.png|frameless|15px]] &#039;&#039;&#039;Organization size&#039;&#039;&#039;: SIEM systems are available for organizations of all sizes. It is important to choose a SIEM system that is right for the size and complexity of your organization.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:budget_icon.png|frameless|15px]] &#039;&#039;&#039;Budget&#039;&#039;&#039;: SIEM systems can range in price from a few thousand dollars to hundreds of thousands of dollars. It is important to choose a SIEM system that fits your budget.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:features_icon.png|frameless|15px]] [[#Common Features|&#039;&#039;&#039;Features&#039;&#039;&#039;]]: SIEM systems offer a variety of features. It is important to choose a SIEM system that has the features that you need.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:ease_of_use_icon.png|frameless|15px]] &#039;&#039;&#039;Ease of use&#039;&#039;&#039;: SIEM systems can be complex to implement and use. It is important to choose a SIEM system that is easy to use for your security personnel.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you are considering using a SIEM system, it is important to do your research and choose a system that is right for your organization.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;&amp;lt;span id=&amp;quot;Common Features&amp;quot;&amp;gt;Common Features&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
SIEM systems offer a variety of features, but the most common features include:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Log collection&#039;&#039;&#039;: SIEM systems can collect log data from a variety of sources, such as firewalls, intrusion detection systems, security applications, and servers.&lt;br /&gt;
* &#039;&#039;&#039;Data normalization&#039;&#039;&#039;: SIEM systems normalize the log data, meaning that they convert the data into a consistent format so that it can be easily analyzed.&lt;br /&gt;
* &#039;&#039;&#039;Data correlation&#039;&#039;&#039;: SIEM systems correlate the log data to identify patterns and trends. This can help to identify suspicious activity that may indicate an attack.&lt;br /&gt;
* &#039;&#039;&#039;Alert generation&#039;&#039;&#039;: SIEM systems generate alerts to notify security personnel of potential threats.&lt;br /&gt;
* &#039;&#039;&#039;Reporting&#039;&#039;&#039;: SIEM systems can generate reports to help organizations track their security posture and identify areas for improvement.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Additional Features&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
In addition to these core features, many SIEM systems also offer the following features:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security intelligence&#039;&#039;&#039;: SIEM systems can integrate with security intelligence feeds to provide organizations with information about the latest threats.&lt;br /&gt;
* &#039;&#039;&#039;Threat hunting&#039;&#039;&#039;: SIEM systems can be used to hunt for threats that are not detected by traditional security solutions.&lt;br /&gt;
* &#039;&#039;&#039;Incident response&#039;&#039;&#039;: SIEM systems can be used to automate and streamline the incident response process.&lt;br /&gt;
* &#039;&#039;&#039;Compliance reporting&#039;&#039;&#039;: SIEM systems can generate reports to help organizations comply with security regulations.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Advanced Features&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Some SIEM systems also offer more advanced features, such as:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;User and entity behavior analytics (UEBA)&#039;&#039;&#039;: UEBA uses machine learning to analyze user and entity behavior to identify anomalous activity that may indicate an attack.&lt;br /&gt;
* &#039;&#039;&#039;Network traffic analysis (NTA)&#039;&#039;&#039;: NTA analyzes network traffic to identify suspicious activity, such as malware or botnet traffic.&lt;br /&gt;
* &#039;&#039;&#039;Security orchestration, automation, and response (SOAR)&#039;&#039;&#039;: SOAR automates tasks associated with security incident response.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Data_normalization_icon.png&amp;diff=3045</id>
		<title>File:Data normalization icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Data_normalization_icon.png&amp;diff=3045"/>
		<updated>2023-10-22T04:28:38Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Report_icon.png&amp;diff=3044</id>
		<title>File:Report icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Report_icon.png&amp;diff=3044"/>
		<updated>2023-10-22T04:25:54Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Alert_generation_icon.png&amp;diff=3043</id>
		<title>File:Alert generation icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Alert_generation_icon.png&amp;diff=3043"/>
		<updated>2023-10-22T04:25:48Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Data_correlation_icon.png&amp;diff=3042</id>
		<title>File:Data correlation icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Data_correlation_icon.png&amp;diff=3042"/>
		<updated>2023-10-22T04:25:41Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Data_collection_icon.png&amp;diff=3040</id>
		<title>File:Data collection icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Data_collection_icon.png&amp;diff=3040"/>
		<updated>2023-10-22T04:25:26Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Security_Information_%26_Event_Management&amp;diff=3039</id>
		<title>Security Information &amp; Event Management</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Security_Information_%26_Event_Management&amp;diff=3039"/>
		<updated>2023-10-22T04:25:14Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
[[File:ACT_Security_Information_Event_Management_Icon.svg|frameless|40px|link=Security Information &amp;amp; Event Management]] &amp;lt;big&amp;gt;&#039;&#039;&#039;Introduction&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Security information and event management (SIEM) is a security solution that helps organizations detect, analyze, and respond to security threats. SIEM systems collect log data from a variety of sources, such as firewalls, intrusion detection systems, and security applications, and then analyze the data for suspicious activity. SIEM systems can also generate alerts to notify security personnel of potential threats.&lt;br /&gt;
&lt;br /&gt;
SIEM systems are an important part of a layered security strategy. They can help organizations to:&lt;br /&gt;
* &#039;&#039;&#039;Detect threats early&#039;&#039;&#039;: SIEM systems can detect threats that may go undetected by other security solutions. For example, a SIEM system may be able to detect a pattern of unusual login attempts that could indicate an attack.&lt;br /&gt;
* &#039;&#039;&#039;Investigate incidents more quickly&#039;&#039;&#039;: SIEM systems can help organizations to investigate security incidents more quickly and efficiently. By centralizing and analyzing log data from a variety of sources, SIEM systems can give security personnel a complete view of the incident.&lt;br /&gt;
* &#039;&#039;&#039;Respond to threats more effectively&#039;&#039;&#039;: SIEM systems can help organizations to respond to threats more effectively. For example, a SIEM system may be able to automatically block an attacker&#039;s IP address or notify security personnel of the need to take other action.&lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
[[File:Elephants.png|frameless|100px|right|link=Advanced_Protection]]&lt;br /&gt;
Placeholder (Tools coming soon!)&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;How SIEM works&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
SIEM systems typically work by following these steps:&lt;br /&gt;
&lt;br /&gt;
[[File:data_collection_icon.png|frameless|15px]] &#039;&#039;&#039;Data collection&#039;&#039;&#039;: SIEM systems collect log data from a variety of sources, such as firewalls, intrusion detection systems, and security applications.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:data_normalization_icon.jpg|frameless|15px]] &#039;&#039;&#039;Data normalization&#039;&#039;&#039;: SIEM systems normalize the log data, meaning that they convert the data into a consistent format so that it can be easily analyzed.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:data_correlation_icon.png|frameless|15px]] &#039;&#039;&#039;Data correlation&#039;&#039;&#039;: SIEM systems correlate the log data to identify patterns and trends. This can help to identify suspicious activity that may indicate an attack.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:alert_generation_icon.png|frameless|15px]] &#039;&#039;&#039;Alert generation&#039;&#039;&#039;: SIEM systems generate alerts to notify security personnel of potential threats.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:report_icon.png|frameless|15px]] &#039;&#039;&#039;Reporting&#039;&#039;&#039;: SIEM systems can generate reports to help organizations track their security posture and identify areas for improvement.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Benefits of using a SIEM system&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
There are many benefits to using a SIEM system, including:&lt;br /&gt;
&lt;br /&gt;
[[File:improved_security_icon.png|frameless|15px]] &#039;&#039;&#039;Improved security posture&#039;&#039;&#039;: SIEM systems can help organizations to improve their security posture by helping them to detect and respond to threats more quickly and effectively.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:data_exposure_icon.png|frameless|15px]] &#039;&#039;&#039;Reduced risk of data breaches&#039;&#039;&#039;: SIEM systems can help to reduce the risk of data breaches by helping organizations to detect and respond to attacks before they can cause damage.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:compliance_icon.png|frameless|15px]] &#039;&#039;&#039;Improved compliance&#039;&#039;&#039;: SIEM systems can help organizations to comply with security regulations by providing them with a way to track and report on their security posture.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Choosing a SIEM system&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
There are a number of SIEM systems available on the market. When choosing a SIEM system, it is important to consider the following factors:&lt;br /&gt;
&lt;br /&gt;
[[File:organization_size_icon.png|frameless|15px]] &#039;&#039;&#039;Organization size&#039;&#039;&#039;: SIEM systems are available for organizations of all sizes. It is important to choose a SIEM system that is right for the size and complexity of your organization.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:budget_icon.png|frameless|15px]] &#039;&#039;&#039;Budget&#039;&#039;&#039;: SIEM systems can range in price from a few thousand dollars to hundreds of thousands of dollars. It is important to choose a SIEM system that fits your budget.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:features_icon.png|frameless|15px]] [[#Common Features|&#039;&#039;&#039;Features&#039;&#039;&#039;]]: SIEM systems offer a variety of features. It is important to choose a SIEM system that has the features that you need.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:ease_of_use_icon.png|frameless|15px]] &#039;&#039;&#039;Ease of use&#039;&#039;&#039;: SIEM systems can be complex to implement and use. It is important to choose a SIEM system that is easy to use for your security personnel.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you are considering using a SIEM system, it is important to do your research and choose a system that is right for your organization.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;&amp;lt;span id=&amp;quot;Common Features&amp;quot;&amp;gt;Common Features&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
SIEM systems offer a variety of features, but the most common features include:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Log collection&#039;&#039;&#039;: SIEM systems can collect log data from a variety of sources, such as firewalls, intrusion detection systems, security applications, and servers.&lt;br /&gt;
* &#039;&#039;&#039;Data normalization&#039;&#039;&#039;: SIEM systems normalize the log data, meaning that they convert the data into a consistent format so that it can be easily analyzed.&lt;br /&gt;
* &#039;&#039;&#039;Data correlation&#039;&#039;&#039;: SIEM systems correlate the log data to identify patterns and trends. This can help to identify suspicious activity that may indicate an attack.&lt;br /&gt;
* &#039;&#039;&#039;Alert generation&#039;&#039;&#039;: SIEM systems generate alerts to notify security personnel of potential threats.&lt;br /&gt;
* &#039;&#039;&#039;Reporting&#039;&#039;&#039;: SIEM systems can generate reports to help organizations track their security posture and identify areas for improvement.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Additional Features&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
In addition to these core features, many SIEM systems also offer the following features:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security intelligence&#039;&#039;&#039;: SIEM systems can integrate with security intelligence feeds to provide organizations with information about the latest threats.&lt;br /&gt;
* &#039;&#039;&#039;Threat hunting&#039;&#039;&#039;: SIEM systems can be used to hunt for threats that are not detected by traditional security solutions.&lt;br /&gt;
* &#039;&#039;&#039;Incident response&#039;&#039;&#039;: SIEM systems can be used to automate and streamline the incident response process.&lt;br /&gt;
* &#039;&#039;&#039;Compliance reporting&#039;&#039;&#039;: SIEM systems can generate reports to help organizations comply with security regulations.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Advanced Features&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Some SIEM systems also offer more advanced features, such as:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;User and entity behavior analytics (UEBA)&#039;&#039;&#039;: UEBA uses machine learning to analyze user and entity behavior to identify anomalous activity that may indicate an attack.&lt;br /&gt;
* &#039;&#039;&#039;Network traffic analysis (NTA)&#039;&#039;&#039;: NTA analyzes network traffic to identify suspicious activity, such as malware or botnet traffic.&lt;br /&gt;
* &#039;&#039;&#039;Security orchestration, automation, and response (SOAR)&#039;&#039;&#039;: SOAR automates tasks associated with security incident response.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Young_Adults_(18_-_25_yo)&amp;diff=3036</id>
		<title>Young Adults (18 - 25 yo)</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Young_Adults_(18_-_25_yo)&amp;diff=3036"/>
		<updated>2023-10-21T21:24:00Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;width: 40%&amp;quot;| {{#categorytree:GenZ-Digital Natives - Young Adults‎ |hideroot|mode=pages}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;width: 60%&amp;quot;|&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
Young adults, specifically those aged 18 to 25, have distinct cybersecurity needs and concerns as they navigate the digital landscape. In this era of advanced connectivity, it becomes imperative for young adults to proactively address their online safety. By comprehending and adopting cybersecurity protocols, they can mitigate potential hazards and cultivate a resilient and secure digital environment.&lt;br /&gt;
&lt;br /&gt;
=== Online Environment ===&lt;br /&gt;
&lt;br /&gt;
Young adults need to be aware of cybersecurity risks and take steps to protect themselves online. This includes safeguarding their personal information, ensuring safe online experiences, protecting against cyber threats, and securing devices and networks.&lt;br /&gt;
&lt;br /&gt;
Specifically, young adults should:&lt;br /&gt;
&lt;br /&gt;
*Be cautious about sharing sensitive information online and be aware of the privacy settings on social media platforms.&lt;br /&gt;
*Be mindful of interacting with strangers online and avoid sharing personal details with individuals they don’t know. Recognize and report inappropriate content.&lt;br /&gt;
*Be familiar with common cyber threats such as phishing attempts and social engineering and learn how to identify them. Create strong passwords for their accounts, enable two-factor authentication, and regularly update their software and apps.&lt;br /&gt;
*Set up strong passwords for their devices, ensure that their Wi-Fi networks are secure, and keep their devices up to date with the latest security patches.&lt;br /&gt;
&lt;br /&gt;
=== Protection Needs ===&lt;br /&gt;
&lt;br /&gt;
Here are some key protection needs for young adults online:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Privacy Protection&#039;&#039;&#039;: Young adults need to be aware of the importance of protecting their privacy online. This includes understanding how their online activities can be tracked and used, and taking steps to minimize their exposure. For example, they should use strong passwords and two-factor authentication and be careful about what information they share on social media.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Data Security&#039;&#039;&#039;: Take steps to protect one&#039;s data from unauthorized access. This includes using encrypted messaging apps and services, and storing sensitive files in encrypted and password-protected containers. Additionally, there are many malicious links online that can include malware or ransomware. Do not click on links from an untrusted source. These links can always be double-checked by using link checker tools, such as [https://www.urlvoid.com/ URLVoid]&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Social Engineering&#039;&#039;&#039;: Social engineering is a type of cyberattack that uses psychological manipulation to trick people into revealing confidential information or performing actions that could compromise their security. Social engineers use a variety of techniques, such as phishing emails, baiting attacks, quid pro quo attacks, and pretexting attacks. To protect yourself from social engineering attacks, be wary of unsolicited messages, don&#039;t click on links or open attachments unless you are sure they are safe, be careful about what information you share online, and be suspicious of anyone who asks for your personal information or access to your computer system.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Location and Tracking&#039;&#039;&#039;: Young adults need to be aware of how their location can be tracked online and take steps to protect their privacy. This includes managing location-sharing settings on devices and apps, and being wary of location-based apps that might inadvertently reveal personal information.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Online Dating and Relationships&#039;&#039;&#039;: Use reputable and secure dating apps and being cautious about sharing personal information. With the rise of AI and deepfakes, it is paramount that young adults are aware of these potential risks and that the person they are talking to can be images and videos of other individuals who look or sounds like they are saying or doing something they never actually said or did.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Personal Cybersecurity Hygiene&#039;&#039;&#039;: Young adults need to practice good personal cybersecurity hygiene. This includes using strong and unique passwords, enabling two-factor authentication wherever possible, and keeping operating systems, apps, and security software up to date.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Young_Adults_(18_-_25_yo)&amp;diff=3035</id>
		<title>Young Adults (18 - 25 yo)</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Young_Adults_(18_-_25_yo)&amp;diff=3035"/>
		<updated>2023-10-21T21:23:56Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;width: 40%&amp;quot;| {{#categorytree:GenZ-Digital Natives - Young Adults‎ |hideroot|mode=pages}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;width: 60%&amp;quot;|&lt;br /&gt;
=== Introduction ====&lt;br /&gt;
Young adults, specifically those aged 18 to 25, have distinct cybersecurity needs and concerns as they navigate the digital landscape. In this era of advanced connectivity, it becomes imperative for young adults to proactively address their online safety. By comprehending and adopting cybersecurity protocols, they can mitigate potential hazards and cultivate a resilient and secure digital environment.&lt;br /&gt;
&lt;br /&gt;
=== Online Environment ===&lt;br /&gt;
&lt;br /&gt;
Young adults need to be aware of cybersecurity risks and take steps to protect themselves online. This includes safeguarding their personal information, ensuring safe online experiences, protecting against cyber threats, and securing devices and networks.&lt;br /&gt;
&lt;br /&gt;
Specifically, young adults should:&lt;br /&gt;
&lt;br /&gt;
*Be cautious about sharing sensitive information online and be aware of the privacy settings on social media platforms.&lt;br /&gt;
*Be mindful of interacting with strangers online and avoid sharing personal details with individuals they don’t know. Recognize and report inappropriate content.&lt;br /&gt;
*Be familiar with common cyber threats such as phishing attempts and social engineering and learn how to identify them. Create strong passwords for their accounts, enable two-factor authentication, and regularly update their software and apps.&lt;br /&gt;
*Set up strong passwords for their devices, ensure that their Wi-Fi networks are secure, and keep their devices up to date with the latest security patches.&lt;br /&gt;
&lt;br /&gt;
=== Protection Needs ===&lt;br /&gt;
&lt;br /&gt;
Here are some key protection needs for young adults online:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Privacy Protection&#039;&#039;&#039;: Young adults need to be aware of the importance of protecting their privacy online. This includes understanding how their online activities can be tracked and used, and taking steps to minimize their exposure. For example, they should use strong passwords and two-factor authentication and be careful about what information they share on social media.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Data Security&#039;&#039;&#039;: Take steps to protect one&#039;s data from unauthorized access. This includes using encrypted messaging apps and services, and storing sensitive files in encrypted and password-protected containers. Additionally, there are many malicious links online that can include malware or ransomware. Do not click on links from an untrusted source. These links can always be double-checked by using link checker tools, such as [https://www.urlvoid.com/ URLVoid]&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Social Engineering&#039;&#039;&#039;: Social engineering is a type of cyberattack that uses psychological manipulation to trick people into revealing confidential information or performing actions that could compromise their security. Social engineers use a variety of techniques, such as phishing emails, baiting attacks, quid pro quo attacks, and pretexting attacks. To protect yourself from social engineering attacks, be wary of unsolicited messages, don&#039;t click on links or open attachments unless you are sure they are safe, be careful about what information you share online, and be suspicious of anyone who asks for your personal information or access to your computer system.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Location and Tracking&#039;&#039;&#039;: Young adults need to be aware of how their location can be tracked online and take steps to protect their privacy. This includes managing location-sharing settings on devices and apps, and being wary of location-based apps that might inadvertently reveal personal information.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Online Dating and Relationships&#039;&#039;&#039;: Use reputable and secure dating apps and being cautious about sharing personal information. With the rise of AI and deepfakes, it is paramount that young adults are aware of these potential risks and that the person they are talking to can be images and videos of other individuals who look or sounds like they are saying or doing something they never actually said or did.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Personal Cybersecurity Hygiene&#039;&#039;&#039;: Young adults need to practice good personal cybersecurity hygiene. This includes using strong and unique passwords, enabling two-factor authentication wherever possible, and keeping operating systems, apps, and security software up to date.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Colleges_%26_Universities&amp;diff=3034</id>
		<title>Colleges &amp; Universities</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Colleges_%26_Universities&amp;diff=3034"/>
		<updated>2023-10-21T21:23:36Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;width: 40%&amp;quot;| {{#categorytree:Education - Secondary - Administrators &amp;amp; Teachers‎|hideroot|mode=pages}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;width: 60%&amp;quot;|&lt;br /&gt;
=== Cybersecurity Needs and Concerns of Secondary Education Administrators and Teachers ===&lt;br /&gt;
In today&#039;s digital age, secondary education administrators and teachers face a set of distinctive cybersecurity needs and concerns. As educators responsible for the safety and well-being of students in an increasingly online world, it is crucial for them to be proactive in safeguarding not only their own data but also that of the students they serve.&lt;br /&gt;
&lt;br /&gt;
=== Key Cybersecurity Needs and Concerns ===&lt;br /&gt;
&lt;br /&gt;
Here is a comprehensive overview of the key cybersecurity needs and concerns of secondary education administrators and teachers:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Safeguarding personal information&#039;&#039;&#039;: One of the foremost concerns is safeguarding student data and preserving their privacy. This includes the protection of sensitive information like personal details, academic records, and health data. Administrators and teachers must establish robust security measures to ensure that databases and records systems are secure. Additionally, strict compliance with data privacy regulations such as FERPA is imperative to safeguard students&#039; privacy rights and maintain the trust of both students and parents.&lt;br /&gt;
* &#039;&#039;&#039;Ensuring safe online experiences&#039;&#039;&#039;: Creating a safe online environment for students is a top priority for educators. Cyberbullying and online safety are significant concerns, necessitating proactive measures to prevent cyberbullying incidents and promote responsible digital behavior. Furthermore, ensuring secure communication between the school and parents or guardians is essential to keep them informed about their child&#039;s education journey while maintaining the privacy and security of sensitive information.&lt;br /&gt;
* &#039;&#039;&#039;Protecting against cyber threats&#039;&#039;&#039;: In the ever-evolving landscape of cybersecurity threats, educators must be well-prepared to defend against various forms of attacks. Recognizing and countering phishing attempts is crucial, as is monitoring and mitigating insider risks, which can emerge from students, teachers, or staff members. To fortify defenses, schools need to establish effective measures to protect against ransomware attacks that can disrupt operations and compromise data. Additionally, safeguarding digital resources and curriculum materials against unauthorized access and distribution is essential to prevent intellectual property theft.&lt;br /&gt;
* &#039;&#039;&#039;Securing devices and networks&#039;&#039;&#039;: Securing the multitude of devices and networks used in educational settings presents a unique challenge. This includes addressing the security concerns associated with personal devices used for educational purposes, often referred to as Bring Your Own Device (BYOD) policies. It&#039;s equally important to implement robust security measures for Internet of Things (IoT) devices, such as smartboards and surveillance cameras, which are increasingly integrated into the educational environment.&lt;br /&gt;
* &#039;&#039;&#039;Promoting responsible online behavior&#039;&#039;&#039;: Teaching responsible online behavior is a foundational aspect of secondary education. This includes not only ensuring secure online platforms for remote learning but also educating students about online safety and the potential risks of sharing personal information. By instilling a sense of responsibility and awareness in students, educators contribute to creating a safer and more informed digital environment.&lt;br /&gt;
&lt;br /&gt;
=== Additional Cybersecurity Needs ===&lt;br /&gt;
&lt;br /&gt;
In addition to the core cybersecurity needs listed above, secondary education administrators and teachers should consider the following crucial aspects to enhance their digital security within the educational environment:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Securing student data when using third-party service providers&#039;&#039;&#039;: Ensure the security of student data when using third-party service providers, such as cloud-based platforms and educational software.&lt;br /&gt;
* &#039;&#039;&#039;Providing cybersecurity training for teachers and staff&#039;&#039;&#039;: Teachers and staff must undergo comprehensive training in cybersecurity best practices, including password hygiene and identifying and reporting security threats.&lt;br /&gt;
* &#039;&#039;&#039;Implementing phishing awareness programs&#039;&#039;&#039;: Implement ongoing phishing awareness programs for both students and staff to reduce the risk of falling victim to phishing attacks.&lt;br /&gt;
* &#039;&#039;&#039;Developing and maintaining incident response plans&#039;&#039;&#039;: Develop and maintain incident response plans that outline steps to take in case of various incidents, such as data breaches or network disruptions.&lt;br /&gt;
* &#039;&#039;&#039;Keeping software and systems up to date&#039;&#039;&#039;: Maintain up-to-date software and systems by regularly applying security patches to address vulnerabilities that could be exploited by cybercriminals.&lt;br /&gt;
* &#039;&#039;&#039;Using strong authentication methods and access controls&#039;&#039;&#039;: Ensure strong authentication methods and strict access controls for sensitive data and systems, including multi-factor authentication (MFA) and role-based access control.&lt;br /&gt;
* &#039;&#039;&#039;Safeguarding physical access to devices&#039;&#039;&#039;: Safeguard physical access to devices such as laptops, tablets, and servers by storing them securely and restricting access to authorized personnel.&lt;br /&gt;
* &#039;&#039;&#039;Securing online platforms&#039;&#039;&#039;: Pay attention to the security of online platforms, including websites and social media accounts, and educate staff about responsible social media use to prevent security incidents and reputation damage.&lt;br /&gt;
* &#039;&#039;&#039;Considering the cybersecurity implications of emerging technologies&#039;&#039;&#039;: Consider the cybersecurity implications of emerging technologies, such as artificial intelligence (AI), virtual reality (VR), and augmented reality (AR), as they become more integrated into education, and adapt security strategies accordingly.&lt;br /&gt;
&lt;br /&gt;
By addressing these critical cybersecurity needs and concerns, secondary education administrators and teachers can create a safer and more secure digital environment for both themselves and their students.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Young_Adults_(18_-_25_yo)&amp;diff=3033</id>
		<title>Young Adults (18 - 25 yo)</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Young_Adults_(18_-_25_yo)&amp;diff=3033"/>
		<updated>2023-10-21T21:23:07Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;width: 40%&amp;quot;| {{#categorytree:GenZ-Digital Natives - Young Adults‎ |hideroot|mode=pages}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;width: 60%&amp;quot;|&lt;br /&gt;
Young adults, specifically those aged 18 to 25, have distinct cybersecurity needs and concerns as they navigate the digital landscape. In this era of advanced connectivity, it becomes imperative for young adults to proactively address their online safety. By comprehending and adopting cybersecurity protocols, they can mitigate potential hazards and cultivate a resilient and secure digital environment.&lt;br /&gt;
&lt;br /&gt;
=== Online Environment ===&lt;br /&gt;
&lt;br /&gt;
Young adults need to be aware of cybersecurity risks and take steps to protect themselves online. This includes safeguarding their personal information, ensuring safe online experiences, protecting against cyber threats, and securing devices and networks.&lt;br /&gt;
&lt;br /&gt;
Specifically, young adults should:&lt;br /&gt;
&lt;br /&gt;
*Be cautious about sharing sensitive information online and be aware of the privacy settings on social media platforms.&lt;br /&gt;
*Be mindful of interacting with strangers online and avoid sharing personal details with individuals they don’t know. Recognize and report inappropriate content.&lt;br /&gt;
*Be familiar with common cyber threats such as phishing attempts and social engineering and learn how to identify them. Create strong passwords for their accounts, enable two-factor authentication, and regularly update their software and apps.&lt;br /&gt;
*Set up strong passwords for their devices, ensure that their Wi-Fi networks are secure, and keep their devices up to date with the latest security patches.&lt;br /&gt;
&lt;br /&gt;
=== Protection Needs ===&lt;br /&gt;
&lt;br /&gt;
Here are some key protection needs for young adults online:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Privacy Protection&#039;&#039;&#039;: Young adults need to be aware of the importance of protecting their privacy online. This includes understanding how their online activities can be tracked and used, and taking steps to minimize their exposure. For example, they should use strong passwords and two-factor authentication and be careful about what information they share on social media.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Data Security&#039;&#039;&#039;: Take steps to protect one&#039;s data from unauthorized access. This includes using encrypted messaging apps and services, and storing sensitive files in encrypted and password-protected containers. Additionally, there are many malicious links online that can include malware or ransomware. Do not click on links from an untrusted source. These links can always be double-checked by using link checker tools, such as [https://www.urlvoid.com/ URLVoid]&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Social Engineering&#039;&#039;&#039;: Social engineering is a type of cyberattack that uses psychological manipulation to trick people into revealing confidential information or performing actions that could compromise their security. Social engineers use a variety of techniques, such as phishing emails, baiting attacks, quid pro quo attacks, and pretexting attacks. To protect yourself from social engineering attacks, be wary of unsolicited messages, don&#039;t click on links or open attachments unless you are sure they are safe, be careful about what information you share online, and be suspicious of anyone who asks for your personal information or access to your computer system.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Location and Tracking&#039;&#039;&#039;: Young adults need to be aware of how their location can be tracked online and take steps to protect their privacy. This includes managing location-sharing settings on devices and apps, and being wary of location-based apps that might inadvertently reveal personal information.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Online Dating and Relationships&#039;&#039;&#039;: Use reputable and secure dating apps and being cautious about sharing personal information. With the rise of AI and deepfakes, it is paramount that young adults are aware of these potential risks and that the person they are talking to can be images and videos of other individuals who look or sounds like they are saying or doing something they never actually said or did.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Personal Cybersecurity Hygiene&#039;&#039;&#039;: Young adults need to practice good personal cybersecurity hygiene. This includes using strong and unique passwords, enabling two-factor authentication wherever possible, and keeping operating systems, apps, and security software up to date.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Colleges_%26_Universities&amp;diff=3032</id>
		<title>Colleges &amp; Universities</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Colleges_%26_Universities&amp;diff=3032"/>
		<updated>2023-10-21T21:19:54Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;width: 40%&amp;quot;| {{#categorytree:Education - Secondary - Administrators &amp;amp; Teachers‎|hideroot|mode=pages}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;width: 60%&amp;quot;|&lt;br /&gt;
== Cybersecurity Needs and Concerns of Secondary Education Administrators and Teachers == &lt;br /&gt;
In today&#039;s digital age, secondary education administrators and teachers face a set of distinctive cybersecurity needs and concerns. As educators responsible for the safety and well-being of students in an increasingly online world, it is crucial for them to be proactive in safeguarding not only their own data but also that of the students they serve.&lt;br /&gt;
&lt;br /&gt;
=== Key Cybersecurity Needs and Concerns ===&lt;br /&gt;
&lt;br /&gt;
Here is a comprehensive overview of the key cybersecurity needs and concerns of secondary education administrators and teachers:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Safeguarding personal information&#039;&#039;&#039;: One of the foremost concerns is safeguarding student data and preserving their privacy. This includes the protection of sensitive information like personal details, academic records, and health data. Administrators and teachers must establish robust security measures to ensure that databases and records systems are secure. Additionally, strict compliance with data privacy regulations such as FERPA is imperative to safeguard students&#039; privacy rights and maintain the trust of both students and parents.&lt;br /&gt;
* &#039;&#039;&#039;Ensuring safe online experiences&#039;&#039;&#039;: Creating a safe online environment for students is a top priority for educators. Cyberbullying and online safety are significant concerns, necessitating proactive measures to prevent cyberbullying incidents and promote responsible digital behavior. Furthermore, ensuring secure communication between the school and parents or guardians is essential to keep them informed about their child&#039;s education journey while maintaining the privacy and security of sensitive information.&lt;br /&gt;
* &#039;&#039;&#039;Protecting against cyber threats&#039;&#039;&#039;: In the ever-evolving landscape of cybersecurity threats, educators must be well-prepared to defend against various forms of attacks. Recognizing and countering phishing attempts is crucial, as is monitoring and mitigating insider risks, which can emerge from students, teachers, or staff members. To fortify defenses, schools need to establish effective measures to protect against ransomware attacks that can disrupt operations and compromise data. Additionally, safeguarding digital resources and curriculum materials against unauthorized access and distribution is essential to prevent intellectual property theft.&lt;br /&gt;
* &#039;&#039;&#039;Securing devices and networks&#039;&#039;&#039;: Securing the multitude of devices and networks used in educational settings presents a unique challenge. This includes addressing the security concerns associated with personal devices used for educational purposes, often referred to as Bring Your Own Device (BYOD) policies. It&#039;s equally important to implement robust security measures for Internet of Things (IoT) devices, such as smartboards and surveillance cameras, which are increasingly integrated into the educational environment.&lt;br /&gt;
* &#039;&#039;&#039;Promoting responsible online behavior&#039;&#039;&#039;: Teaching responsible online behavior is a foundational aspect of secondary education. This includes not only ensuring secure online platforms for remote learning but also educating students about online safety and the potential risks of sharing personal information. By instilling a sense of responsibility and awareness in students, educators contribute to creating a safer and more informed digital environment.&lt;br /&gt;
&lt;br /&gt;
=== Additional Cybersecurity Needs ===&lt;br /&gt;
&lt;br /&gt;
In addition to the core cybersecurity needs listed above, secondary education administrators and teachers should consider the following crucial aspects to enhance their digital security within the educational environment:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Securing student data when using third-party service providers&#039;&#039;&#039;: Ensure the security of student data when using third-party service providers, such as cloud-based platforms and educational software.&lt;br /&gt;
* &#039;&#039;&#039;Providing cybersecurity training for teachers and staff&#039;&#039;&#039;: Teachers and staff must undergo comprehensive training in cybersecurity best practices, including password hygiene and identifying and reporting security threats.&lt;br /&gt;
* &#039;&#039;&#039;Implementing phishing awareness programs&#039;&#039;&#039;: Implement ongoing phishing awareness programs for both students and staff to reduce the risk of falling victim to phishing attacks.&lt;br /&gt;
* &#039;&#039;&#039;Developing and maintaining incident response plans&#039;&#039;&#039;: Develop and maintain incident response plans that outline steps to take in case of various incidents, such as data breaches or network disruptions.&lt;br /&gt;
* &#039;&#039;&#039;Keeping software and systems up to date&#039;&#039;&#039;: Maintain up-to-date software and systems by regularly applying security patches to address vulnerabilities that could be exploited by cybercriminals.&lt;br /&gt;
* &#039;&#039;&#039;Using strong authentication methods and access controls&#039;&#039;&#039;: Ensure strong authentication methods and strict access controls for sensitive data and systems, including multi-factor authentication (MFA) and role-based access control.&lt;br /&gt;
* &#039;&#039;&#039;Safeguarding physical access to devices&#039;&#039;&#039;: Safeguard physical access to devices such as laptops, tablets, and servers by storing them securely and restricting access to authorized personnel.&lt;br /&gt;
* &#039;&#039;&#039;Securing online platforms&#039;&#039;&#039;: Pay attention to the security of online platforms, including websites and social media accounts, and educate staff about responsible social media use to prevent security incidents and reputation damage.&lt;br /&gt;
* &#039;&#039;&#039;Considering the cybersecurity implications of emerging technologies&#039;&#039;&#039;: Consider the cybersecurity implications of emerging technologies, such as artificial intelligence (AI), virtual reality (VR), and augmented reality (AR), as they become more integrated into education, and adapt security strategies accordingly.&lt;br /&gt;
&lt;br /&gt;
By addressing these critical cybersecurity needs and concerns, secondary education administrators and teachers can create a safer and more secure digital environment for both themselves and their students.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Colleges_%26_Universities&amp;diff=3031</id>
		<title>Colleges &amp; Universities</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Colleges_%26_Universities&amp;diff=3031"/>
		<updated>2023-10-21T21:17:59Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;width: 40%&amp;quot;| {{#categorytree:Digital Currency Users|hideroot|mode=pages}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;width: 60%&amp;quot;|&lt;br /&gt;
== Cybersecurity Needs and Concerns of Secondary Education Administrators and Teachers == &lt;br /&gt;
In today&#039;s digital age, secondary education administrators and teachers face a set of distinctive cybersecurity needs and concerns. As educators responsible for the safety and well-being of students in an increasingly online world, it is crucial for them to be proactive in safeguarding not only their own data but also that of the students they serve.&lt;br /&gt;
&lt;br /&gt;
=== Key Cybersecurity Needs and Concerns ===&lt;br /&gt;
&lt;br /&gt;
Here is a comprehensive overview of the key cybersecurity needs and concerns of secondary education administrators and teachers:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Safeguarding personal information&#039;&#039;&#039;: One of the foremost concerns is safeguarding student data and preserving their privacy. This includes the protection of sensitive information like personal details, academic records, and health data. Administrators and teachers must establish robust security measures to ensure that databases and records systems are secure. Additionally, strict compliance with data privacy regulations such as FERPA is imperative to safeguard students&#039; privacy rights and maintain the trust of both students and parents.&lt;br /&gt;
* &#039;&#039;&#039;Ensuring safe online experiences&#039;&#039;&#039;: Creating a safe online environment for students is a top priority for educators. Cyberbullying and online safety are significant concerns, necessitating proactive measures to prevent cyberbullying incidents and promote responsible digital behavior. Furthermore, ensuring secure communication between the school and parents or guardians is essential to keep them informed about their child&#039;s education journey while maintaining the privacy and security of sensitive information.&lt;br /&gt;
* &#039;&#039;&#039;Protecting against cyber threats&#039;&#039;&#039;: In the ever-evolving landscape of cybersecurity threats, educators must be well-prepared to defend against various forms of attacks. Recognizing and countering phishing attempts is crucial, as is monitoring and mitigating insider risks, which can emerge from students, teachers, or staff members. To fortify defenses, schools need to establish effective measures to protect against ransomware attacks that can disrupt operations and compromise data. Additionally, safeguarding digital resources and curriculum materials against unauthorized access and distribution is essential to prevent intellectual property theft.&lt;br /&gt;
* &#039;&#039;&#039;Securing devices and networks&#039;&#039;&#039;: Securing the multitude of devices and networks used in educational settings presents a unique challenge. This includes addressing the security concerns associated with personal devices used for educational purposes, often referred to as Bring Your Own Device (BYOD) policies. It&#039;s equally important to implement robust security measures for Internet of Things (IoT) devices, such as smartboards and surveillance cameras, which are increasingly integrated into the educational environment.&lt;br /&gt;
* &#039;&#039;&#039;Promoting responsible online behavior&#039;&#039;&#039;: Teaching responsible online behavior is a foundational aspect of secondary education. This includes not only ensuring secure online platforms for remote learning but also educating students about online safety and the potential risks of sharing personal information. By instilling a sense of responsibility and awareness in students, educators contribute to creating a safer and more informed digital environment.&lt;br /&gt;
&lt;br /&gt;
=== Additional Cybersecurity Needs ===&lt;br /&gt;
&lt;br /&gt;
In addition to the core cybersecurity needs listed above, secondary education administrators and teachers should consider the following crucial aspects to enhance their digital security within the educational environment:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Securing student data when using third-party service providers&#039;&#039;&#039;: Ensure the security of student data when using third-party service providers, such as cloud-based platforms and educational software.&lt;br /&gt;
* &#039;&#039;&#039;Providing cybersecurity training for teachers and staff&#039;&#039;&#039;: Teachers and staff must undergo comprehensive training in cybersecurity best practices, including password hygiene and identifying and reporting security threats.&lt;br /&gt;
* &#039;&#039;&#039;Implementing phishing awareness programs&#039;&#039;&#039;: Implement ongoing phishing awareness programs for both students and staff to reduce the risk of falling victim to phishing attacks.&lt;br /&gt;
* &#039;&#039;&#039;Developing and maintaining incident response plans&#039;&#039;&#039;: Develop and maintain incident response plans that outline steps to take in case of various incidents, such as data breaches or network disruptions.&lt;br /&gt;
* &#039;&#039;&#039;Keeping software and systems up to date&#039;&#039;&#039;: Maintain up-to-date software and systems by regularly applying security patches to address vulnerabilities that could be exploited by cybercriminals.&lt;br /&gt;
* &#039;&#039;&#039;Using strong authentication methods and access controls&#039;&#039;&#039;: Ensure strong authentication methods and strict access controls for sensitive data and systems, including multi-factor authentication (MFA) and role-based access control.&lt;br /&gt;
* &#039;&#039;&#039;Safeguarding physical access to devices&#039;&#039;&#039;: Safeguard physical access to devices such as laptops, tablets, and servers by storing them securely and restricting access to authorized personnel.&lt;br /&gt;
* &#039;&#039;&#039;Securing online platforms&#039;&#039;&#039;: Pay attention to the security of online platforms, including websites and social media accounts, and educate staff about responsible social media use to prevent security incidents and reputation damage.&lt;br /&gt;
* &#039;&#039;&#039;Considering the cybersecurity implications of emerging technologies&#039;&#039;&#039;: Consider the cybersecurity implications of emerging technologies, such as artificial intelligence (AI), virtual reality (VR), and augmented reality (AR), as they become more integrated into education, and adapt security strategies accordingly.&lt;br /&gt;
&lt;br /&gt;
By addressing these critical cybersecurity needs and concerns, secondary education administrators and teachers can create a safer and more secure digital environment for both themselves and their students.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Customization_icon.png&amp;diff=3030</id>
		<title>File:Customization icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Customization_icon.png&amp;diff=3030"/>
		<updated>2023-10-21T21:11:30Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Peace_of_mind_icon.png&amp;diff=3029</id>
		<title>File:Peace of mind icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Peace_of_mind_icon.png&amp;diff=3029"/>
		<updated>2023-10-21T21:11:21Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Network_management_icon.png&amp;diff=3028</id>
		<title>File:Network management icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Network_management_icon.png&amp;diff=3028"/>
		<updated>2023-10-21T21:11:16Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Improved_security_icon.png&amp;diff=3027</id>
		<title>File:Improved security icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Improved_security_icon.png&amp;diff=3027"/>
		<updated>2023-10-21T21:11:07Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Enhanced_privacy_icon.png&amp;diff=3026</id>
		<title>File:Enhanced privacy icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Enhanced_privacy_icon.png&amp;diff=3026"/>
		<updated>2023-10-21T21:11:01Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Network_Segmentation&amp;diff=3025</id>
		<title>Network Segmentation</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Network_Segmentation&amp;diff=3025"/>
		<updated>2023-10-21T21:10:51Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
[[File:ACT_Network_Segmentation_Icon.svg|frameless|40px|link=Network Segmentation]] &amp;lt;big&amp;gt;&#039;&#039;&#039;Introduction&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Network segmentation is a crucial strategy in the field of cybersecurity. It involves dividing a network into smaller, isolated segments or subnetworks to enhance security and limit the potential impact of a security breach. This technique is employed by both individuals and organizations to protect sensitive data, systems, and resources from unauthorized access and cyber threats.&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
[[File:Elephants.png|frameless|100px|right|link=Advanced_Protection]]&lt;br /&gt;
Placeholder (Tools coming soon!)&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Organizations&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Network segmentation is a vital cybersecurity strategy for organizations of all sizes in today&#039;s digital landscape. Each isolated segment can be equipped with its own security measures and access controls. This allows organizations mitigate the ever-evolving threats posed by cyberattacks, safeguard sensitive data, and maintain business continuity.&lt;br /&gt;
[[File:network_segmentation_organization.png|frameless|left|Traditional Network Segmentation]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Individuals&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Network segmentation is not just for large organizations; individuals can also use this cybersecurity strategy to enhance their online security and privacy. It involves dividing your home network into isolated segments to limit potential security risks and control access to your devices and data.&lt;br /&gt;
[[File:network_segmentation_individuals.png|frameless|left|Home Network Segmentation]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Organizational Benefits&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[File:security_icon.png|frameless|15px]] &#039;&#039;&#039;Enhanced Security&#039;&#039;&#039;: One of the primary benefits of network segmentation is improved security. By dividing a network into smaller segments, organizations can create barriers that prevent unauthorized access between segments. This makes it significantly more challenging for cybercriminals to move laterally within a network if they manage to breach one segment.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:recude_icon.jpg|frameless|15px]] &#039;&#039;&#039;Reduced Attack Surface&#039;&#039;&#039;: Network segmentation reduces the attack surface, which is the total area vulnerable to cyberattacks. By isolating different parts of the network, the potential attack vectors are minimized, making it harder for attackers to compromise critical systems.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:isolation_icon.png|frameless|15px]] &#039;&#039;&#039;Isolation of Sensitive Data&#039;&#039;&#039;: Organizations can isolate sensitive data, such as financial records or customer information, in dedicated segments. This ensures that even if one segment is breached, the sensitive data remains protected in another.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:regulation_icon.png|frameless|15px]] &#039;&#039;&#039;Compliance and Regulation&#039;&#039;&#039;: Many industry regulations and compliance standards require organizations to implement network segmentation as a security measure. Compliance with these standards is crucial for avoiding fines and legal repercussions.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:optimization_icon.png|frameless|15px]] &#039;&#039;&#039;Resource Optimization&#039;&#039;&#039;: Network segmentation allows for better resource allocation. For example, bandwidth-intensive applications can be isolated to specific segments to ensure that they do not impact the performance of other network segments.&lt;br /&gt;
|}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Organizational Impact&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[File:incident_response_icon.png|frameless|15px]] &#039;&#039;&#039;Improved Incident Response&#039;&#039;&#039;: In the event of a security incident, network segmentation helps contain the breach. This containment limits the damage caused and allows security teams to respond more effectively without affecting the entire network.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:data_exposure_icon.jpg|frameless|15px]] &#039;&#039;&#039;Minimized Data Exposure&#039;&#039;&#039;: If a breach occurs, the segmented structure minimizes the amount of data exposed, reducing the potential harm to an organization&#039;s reputation and financial well-being.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:access_control_icon.png|frameless|15px]] &#039;&#039;&#039;Better Access Control&#039;&#039;&#039;: Network segmentation enables granular control over who can access specific segments. This ensures that only authorized personnel have access to critical systems and resources.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:adaptability_icon.png|frameless|15px]] &#039;&#039;&#039;Adaptability&#039;&#039;&#039;: Organizations can adapt network segmentation to their specific needs. Segments can be created or modified as the organization&#039;s requirements evolve, allowing for a flexible and scalable security strategy.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:reduce_risk_icon.png|frameless|15px]] &#039;&#039;&#039;Reduced Risk&#039;&#039;&#039;: By proactively implementing network segmentation, organizations can significantly reduce the risk of a successful cyberattack. This helps protect sensitive information, maintain business continuity, and safeguard reputation.&lt;br /&gt;
|}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Individual Benefits&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[File:devoce_isolation_icon.png|frameless|15px]] &#039;&#039;&#039;Device Isolation&#039;&#039;&#039;: By segmenting your network, you can isolate different types of devices. For example, you can place your smart home devices (e.g., smart thermostats, cameras) in a separate segment from your personal computers and smartphones. This prevents a security breach on one type of device from compromising your entire network.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:guest_icon.png|frameless|15px]] &#039;&#039;&#039;Guest Network&#039;&#039;&#039;: Set up a separate guest network for visitors. This network can have limited access and be isolated from your main network, preventing guests from accidentally or intentionally accessing your sensitive data.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:iot_icon.png|frameless|15px]] &#039;&#039;&#039;IoT Security&#039;&#039;&#039;: With the proliferation of Internet of Things (IoT) devices, network segmentation is crucial. Isolating your IoT devices can protect your main network from potential vulnerabilities in these devices.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:parental_control_icon.png|frameless|15px]] &#039;&#039;&#039;Parental Control&#039;&#039;&#039;*: If you have children, network segmentation can help implement parental control measures. You can create a separate network segment for their devices and apply content filtering or time restrictions.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:security_testing_icon.png|frameless|15px]] &#039;&#039;&#039;Security Testing&#039;&#039;&#039;: Network segmentation allows you to test security measures on a limited scale without risking your entire network. You can experiment with different security configurations on one segment to assess their effectiveness.&lt;br /&gt;
|}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Individual Impact&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[File:enhanced_privacy_icon.png|frameless|15px]] &#039;&#039;&#039;Enhanced Privacy&#039;&#039;&#039;: Network segmentation provides better control over who can access your devices and data. Your personal devices and sensitive information are less exposed to potential threats.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:improved_security_icon.png|frameless|15px]] &#039;&#039;&#039;Improved Security&#039;&#039;&#039;: If one segment is compromised, the rest of your network remains protected. This containment can prevent the spread of malware and unauthorized access.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:network_management_icon.png|frameless|15px]] &#039;&#039;&#039;Efficient Network Management&#039;&#039;&#039;: Separating devices into segments makes it easier to manage your network and troubleshoot issues. You can identify and address problems in specific segments without affecting the entire network.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:peace_of_mind_icon.png|frameless|15px]] &#039;&#039;&#039;Peace of Mind&#039;&#039;&#039;: Knowing that your devices and data are compartmentalized can give you peace of mind, especially in an era of increasing cyber threats.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:customization_icon.png|frameless|15px]] &#039;&#039;&#039;Customization&#039;&#039;&#039;: Network segmentation allows you to customize security settings for each segment according to your specific needs and preferences.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implementing network segmentation at home may require some technical knowledge, but it can significantly improve your cybersecurity posture. It&#039;s an effective way to protect your devices, personal information, and privacy in an interconnected world.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Security_testing_icon.png&amp;diff=3024</id>
		<title>File:Security testing icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Security_testing_icon.png&amp;diff=3024"/>
		<updated>2023-10-21T21:10:30Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Parental_control_icon.png&amp;diff=3023</id>
		<title>File:Parental control icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Parental_control_icon.png&amp;diff=3023"/>
		<updated>2023-10-21T21:10:22Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Iot_icon.png&amp;diff=3022</id>
		<title>File:Iot icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Iot_icon.png&amp;diff=3022"/>
		<updated>2023-10-21T21:10:15Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Guest_icon.png&amp;diff=3021</id>
		<title>File:Guest icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Guest_icon.png&amp;diff=3021"/>
		<updated>2023-10-21T21:09:49Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Devoce_isolation_icon.png&amp;diff=3020</id>
		<title>File:Devoce isolation icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Devoce_isolation_icon.png&amp;diff=3020"/>
		<updated>2023-10-21T21:09:43Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Reduce_risk_icon.png&amp;diff=3019</id>
		<title>File:Reduce risk icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Reduce_risk_icon.png&amp;diff=3019"/>
		<updated>2023-10-21T21:09:37Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Adaptability_icon.png&amp;diff=3018</id>
		<title>File:Adaptability icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Adaptability_icon.png&amp;diff=3018"/>
		<updated>2023-10-21T21:09:31Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Access_control_icon.png&amp;diff=3017</id>
		<title>File:Access control icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Access_control_icon.png&amp;diff=3017"/>
		<updated>2023-10-21T21:09:25Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Data_exposure_icon.jpg&amp;diff=3016</id>
		<title>File:Data exposure icon.jpg</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Data_exposure_icon.jpg&amp;diff=3016"/>
		<updated>2023-10-21T21:09:19Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Incident_response_icon.png&amp;diff=3015</id>
		<title>File:Incident response icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Incident_response_icon.png&amp;diff=3015"/>
		<updated>2023-10-21T21:09:11Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Optimization_icon.png&amp;diff=3014</id>
		<title>File:Optimization icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Optimization_icon.png&amp;diff=3014"/>
		<updated>2023-10-21T21:09:03Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Regulation_icon.png&amp;diff=3013</id>
		<title>File:Regulation icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Regulation_icon.png&amp;diff=3013"/>
		<updated>2023-10-21T21:08:54Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Isolation_icon.png&amp;diff=3012</id>
		<title>File:Isolation icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Isolation_icon.png&amp;diff=3012"/>
		<updated>2023-10-21T21:08:46Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Recude_icon.jpg&amp;diff=3011</id>
		<title>File:Recude icon.jpg</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Recude_icon.jpg&amp;diff=3011"/>
		<updated>2023-10-21T21:08:39Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Security_icon.png&amp;diff=3010</id>
		<title>File:Security icon.png</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Security_icon.png&amp;diff=3010"/>
		<updated>2023-10-21T21:08:29Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Network_Segmentation&amp;diff=3009</id>
		<title>Network Segmentation</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Network_Segmentation&amp;diff=3009"/>
		<updated>2023-10-21T21:08:02Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
[[File:ACT_Network_Segmentation_Icon.svg|frameless|40px|link=Network Segmentation]] &amp;lt;big&amp;gt;&#039;&#039;&#039;Introduction&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Network segmentation is a crucial strategy in the field of cybersecurity. It involves dividing a network into smaller, isolated segments or subnetworks to enhance security and limit the potential impact of a security breach. This technique is employed by both individuals and organizations to protect sensitive data, systems, and resources from unauthorized access and cyber threats.&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
[[File:Elephants.png|frameless|100px|right|link=Advanced_Protection]]&lt;br /&gt;
Placeholder (Tools coming soon!)&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Organizations&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Network segmentation is a vital cybersecurity strategy for organizations of all sizes in today&#039;s digital landscape. Each isolated segment can be equipped with its own security measures and access controls. This allows organizations mitigate the ever-evolving threats posed by cyberattacks, safeguard sensitive data, and maintain business continuity.&lt;br /&gt;
[[File:network_segmentation_organization.png|frameless|left|Traditional Network Segmentation]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;lt;big&amp;gt;&#039;&#039;&#039;Individuals&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Network segmentation is not just for large organizations; individuals can also use this cybersecurity strategy to enhance their online security and privacy. It involves dividing your home network into isolated segments to limit potential security risks and control access to your devices and data.&lt;br /&gt;
[[File:network_segmentation_individuals.png|frameless|left|Home Network Segmentation]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Organizational Benefits&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[File:security_icon.png|frameless|15px]] &#039;&#039;&#039;Enhanced Security&#039;&#039;&#039;: One of the primary benefits of network segmentation is improved security. By dividing a network into smaller segments, organizations can create barriers that prevent unauthorized access between segments. This makes it significantly more challenging for cybercriminals to move laterally within a network if they manage to breach one segment.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:recude_icon.jpg|frameless|15px]] &#039;&#039;&#039;Reduced Attack Surface&#039;&#039;&#039;: Network segmentation reduces the attack surface, which is the total area vulnerable to cyberattacks. By isolating different parts of the network, the potential attack vectors are minimized, making it harder for attackers to compromise critical systems.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:isolation_icon.png|frameless|15px]] &#039;&#039;&#039;Isolation of Sensitive Data&#039;&#039;&#039;: Organizations can isolate sensitive data, such as financial records or customer information, in dedicated segments. This ensures that even if one segment is breached, the sensitive data remains protected in another.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:regulation_icon.png|frameless|15px]] &#039;&#039;&#039;Compliance and Regulation&#039;&#039;&#039;: Many industry regulations and compliance standards require organizations to implement network segmentation as a security measure. Compliance with these standards is crucial for avoiding fines and legal repercussions.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:optimization_icon.png|frameless|15px]] &#039;&#039;&#039;Resource Optimization&#039;&#039;&#039;: Network segmentation allows for better resource allocation. For example, bandwidth-intensive applications can be isolated to specific segments to ensure that they do not impact the performance of other network segments.&lt;br /&gt;
|}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Organizational Impact&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[File:incident_response_icon.png|frameless|15px]] &#039;&#039;&#039;Improved Incident Response&#039;&#039;&#039;: In the event of a security incident, network segmentation helps contain the breach. This containment limits the damage caused and allows security teams to respond more effectively without affecting the entire network.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:data_exposure_icon.jpg|frameless|15px]] &#039;&#039;&#039;Minimized Data Exposure&#039;&#039;&#039;: If a breach occurs, the segmented structure minimizes the amount of data exposed, reducing the potential harm to an organization&#039;s reputation and financial well-being.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:access_control_icon.png|frameless|15px]] &#039;&#039;&#039;Better Access Control&#039;&#039;&#039;: Network segmentation enables granular control over who can access specific segments. This ensures that only authorized personnel have access to critical systems and resources.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:adaptability_icon.png|frameless|15px]] &#039;&#039;&#039;Adaptability&#039;&#039;&#039;: Organizations can adapt network segmentation to their specific needs. Segments can be created or modified as the organization&#039;s requirements evolve, allowing for a flexible and scalable security strategy.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:reduce_risk_icon.png|frameless|15px]] &#039;&#039;&#039;Reduced Risk&#039;&#039;&#039;: By proactively implementing network segmentation, organizations can significantly reduce the risk of a successful cyberattack. This helps protect sensitive information, maintain business continuity, and safeguard reputation.&lt;br /&gt;
|}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Individual Benefits&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[File:devoce_isolation_icon.png|frameless|15px]] &#039;&#039;&#039;Device Isolation&#039;&#039;&#039;: By segmenting your network, you can isolate different types of devices. For example, you can place your smart home devices (e.g., smart thermostats, cameras) in a separate segment from your personal computers and smartphones. This prevents a security breach on one type of device from compromising your entire network.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:guest_icon.png|frameless|15px]] &#039;&#039;&#039;Guest Network&#039;&#039;&#039;: Set up a separate guest network for visitors. This network can have limited access and be isolated from your main network, preventing guests from accidentally or intentionally accessing your sensitive data.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:iot_icon.png|frameless|15px]] &#039;&#039;&#039;IoT Security&#039;&#039;&#039;: With the proliferation of Internet of Things (IoT) devices, network segmentation is crucial. Isolating your IoT devices can protect your main network from potential vulnerabilities in these devices.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:parental_control_icon.png|frameless|15px]] &#039;&#039;&#039;Parental Control&#039;&#039;&#039;*: If you have children, network segmentation can help implement parental control measures. You can create a separate network segment for their devices and apply content filtering or time restrictions.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:security_testing_icon.png|frameless|15px]] &#039;&#039;&#039;Security Testing&#039;&#039;&#039;: Network segmentation allows you to test security measures on a limited scale without risking your entire network. You can experiment with different security configurations on one segment to assess their effectiveness.&lt;br /&gt;
|}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
{| role=&amp;quot;presentation&amp;quot; class=&amp;quot;wikitable mw-collapsible mw-collapsed&amp;quot;&lt;br /&gt;
| &amp;lt;strong&amp;gt;Individual Impact&amp;lt;/strong&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[File:enhanced_privacy_icon&lt;br /&gt;
.png|frameless|15px]] &#039;&#039;&#039;Enhanced Privacy&#039;&#039;&#039;: Network segmentation provides better control over who can access your devices and data. Your personal devices and sensitive information are less exposed to potential threats.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:improved_security_icon.png|frameless|15px]] &#039;&#039;&#039;Improved Security&#039;&#039;&#039;: If one segment is compromised, the rest of your network remains protected. This containment can prevent the spread of malware and unauthorized access.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:network_management_icon.png|frameless|15px]] &#039;&#039;&#039;Efficient Network Management&#039;&#039;&#039;: Separating devices into segments makes it easier to manage your network and troubleshoot issues. You can identify and address problems in specific segments without affecting the entire network.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:peace_of_mind_icon.png|frameless|15px]] &#039;&#039;&#039;Peace of Mind&#039;&#039;&#039;: Knowing that your devices and data are compartmentalized can give you peace of mind, especially in an era of increasing cyber threats.&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:customization_icon.png|frameless|15px]] &#039;&#039;&#039;Customization&#039;&#039;&#039;: Network segmentation allows you to customize security settings for each segment according to your specific needs and preferences.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implementing network segmentation at home may require some technical knowledge, but it can significantly improve your cybersecurity posture. It&#039;s an effective way to protect your devices, personal information, and privacy in an interconnected world.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:House-chimney-crack_icon.svg&amp;diff=2093</id>
		<title>File:House-chimney-crack icon.svg</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:House-chimney-crack_icon.svg&amp;diff=2093"/>
		<updated>2023-10-15T10:23:45Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:House_icon.svg&amp;diff=2092</id>
		<title>File:House icon.svg</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:House_icon.svg&amp;diff=2092"/>
		<updated>2023-10-15T10:23:37Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=File:Door-open_icon.svg&amp;diff=2091</id>
		<title>File:Door-open icon.svg</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=File:Door-open_icon.svg&amp;diff=2091"/>
		<updated>2023-10-15T10:23:25Z</updated>

		<summary type="html">&lt;p&gt;Aye: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Aye</name></author>
	</entry>
</feed>