- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Access attacks require some sort of intrusion capability. These can consist of anything as simple as gaining an account holder’s credentials to plugging foreign hardware directly into the network infrastructure. They usually happen when Reconnaissance Attacks have already performed by the hacker/attacker.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Cryptography is the science of writing in secret code and is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used nonstandard hieroglyphs in an inscription. Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to wartime battle plans.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
SSH (Secure Shell) keys are an access credential that is used in the SSH protocol.
Today, the SSH protocol is widely used to login remotely from one system into another, and its strong encryption makes it ideal to carry out tasks such as issuing remote commands and remotely managing network infrastructure and other vital system components.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is Network Traffic Analysis (NTA)?
Network Traffic Analysis is about analyzing all the entities or devices that make up your network--whether they are managed or unmanaged. Here you collect or ingest all the telemetry and/or flow records (like NetFlow) from multiple network devices like routers, switches, and firewalls and determine what "normal" behavior for these devices looks like and how parts of your network are being accessed and by whom.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Server-side request forgery (also known as SSRF) is a web security vulnerability that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker's choosing.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The security architect can be defined as a person who is entrusted to manage and keep a watchful eye on the various security aspects of a company. He has to be very vigilant and carefully observe that no hacker, phisher or pharmer is able to damage the computer system and steal sensitive information from its database. Therefore, you need to be shrewd as an attacker to anticipate the techniques employed by hackers to perform their illegal tasks. The job is very challenging yet quite exciting.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
There are many ways to expose, alter, disable, destroy, steal or gain unauthorized access to computer systems, infrastructure, networks, operating systems and IoT devices.
In general, attack vectors can be split into passive or active attacks:
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Every security device has advantages and disadvantages and firewalls are no different.
If we applied strict defensive mechanisms into our network to protect it from breach, then it might be possible that even our legitimate communication could malfunction, or if we allow entire protocol communications into our network, then it can be easily hacked by malicious users. So, we should maintain a balance between strictly-coupled and loosely-coupled functionalities.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The underlying concept of both Containerization and Virtualization is finding an alternative to traditional infrastructure setup to execute processes with more flexibility, speed and efficiency, while using minimum resources.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Here I wish to make you understand the technical backbones of DDoS.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Conducting a regular penetration test is a helpful way to identify serious vulnerabilities within your IT environment. A trusted ethical hacker performs the penetration test using a methodical and thorough approach.
- What is Sandboxing? What are the Common Sandbox-evading Techniques? What can you do about them?
- What is Reverse Engineering of A Malware? What are Techniques and Tools?
- IDS vs IPS - How to Place Sensors Correctly for Intrusion Prevention Systems (IPS)
- A Review Checklist for Network Security Analysis
- Access control lists (ACLs)
- Bird's eye view of the key activities performed by Security Analyst
- Why is cyber security risk assessment so important? 5 Major Reasons for Conducting a Cyber/IT Risk Assessment
- Wi-Fi Protected Access version 3 - Major Security Features of WPA3
- Types of Cyber Attacks
- Web Application Security Architecture - 7 Web Application Security Best Practices You Need to Know
IT PANORAMAApplication Platform Optimization
|
CYBER WARRIOR'S
|
CERTIFICATIONSCCNA CCNP - Project & Assignment Help |
MANAGEMENT CONSULTANCYLean Six Sigma Certification Training LSS Black Belt Program (On-site) LSS Green Belt Program (On-site)
|
BLOGS |
CONTACT US
© 2013 Luminis Consulting Services P Ltd, IN |