Introduction To Cybersecurity & PAM
Introduction To Cybersecurity & PAM
Inaugural Session
Information Sharing and Analysis Center
- By Shahbazuddin
Introduction to Cybersecurity
• The term cybersecurity is used to refer to the security offered through online
services to protect your online information.
• With an increasing amount of people getting connected to internet , the
security threats that cause massive harm are also increasing.
Need of
Cybersecurity
• Cybersecurity is
necessary since it helps
in securing data from
threats such as data
theft or misuse, also
safeguards your systems
from viruses.
Major Security Problems
• A PAM admin uses the PAM portal to define methods to access the privileged account
across various applications and enterprise resources.
• The credentials of privileged accounts are stored in a special-purpose and highly secure
password vault.
• The PAM admin also uses the PAM portal to define the policies of who can consume access
to these privileged accounts and under what conditions.
• To ensure security, the PAM user is usually asked to provide a business justification for using
the account. Sometimes manager approval is required as well.
• Often, the user isn’t granted access to the actual passwords used to log into the applications
but instead is provided access via the PAM.
How do PAM system work?
• Additionally, the PAM ensures that passwords are frequently changed, often
automatically, either at regular intervals or after each use.
• The PAM admin can monitor user activities through the PAM portal and
even manage live sessions in real time, if needed.
• Modern PAMs also use machine learning to identify anomalies and use risk
scoring to alert the PAM admins in real time of risky operations.
PAM Benefits