Identity and Access Management (IAM) is an area of cyber security that encompasses the processes and technologies used to control user access to information system resources.
In other words, IAM answers the following questions:
Who has access to what?
When and how is access authorised?
What actions can this user perform?
In IT security, an Intrusion Detection System (IDS) is a device or software designed to monitor a network or system for malicious or suspicious activity.
It works like an alarm system, alerting you to unusual behaviour or potentially dangerous activity.
Social engineering refers to the set of psychological manipulation techniques used by malicious individuals, often cybercriminals, to get people to divulge confidential information or perform actions that compromise the security of their personal data or that of their organisation.
These attacks do not directly target computer systems, but exploit human weaknesses, playing on emotions and cognitive biases such as trust (by pretending to be a trustworthy person), fear (of punishment or an urgent problem), urgency (to get a quick reaction), curiosity (with tempting lures), greed (promises of financial gain), altruism (asking for help for a cause), or ignorance.
SQL injection (SQLi) is a malicious technique used by attackers to compromise the security of a web application.
It involves inserting malicious SQL code into the input fields of a web application in order to manipulate the underlying database. It exploits vulnerabilities in the way the application processes user input and constructs its SQL queries.
An injection is a technique used by cybercriminals to insert malicious code into a computer system.
Once executed, this code can enable the attacker to :
Stealing sensitive data: personal and financial information, etc.
Take control of the system: to use it for malicious purposes (for example, to launch attacks against other systems).
Degrading services: by making a website or application unavailable (denial of service attack).