- Details
- Written by: Meena
- Category: Cybersecurity PRISM
IDS are mostly used for detecting anomalies with the aim of catching the hackers before they do any real damage to the network. They can be either host-based or network-based. Host-based IDS are installed on the client computer while the Network based IDS protection are residing in the network.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Elasticsearch is the central component of the Elastic Stack, a set of open-source tools for data ingestion, enrichment, storage, analysis, and visualization. It is commonly referred to as the “ELK” stack after its components Elasticsearch, Logstash, and Kibana and now also includes Beats.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Many organizations are quickly discovering that threat hunting is the next step in the evolution of the modern SOC, but they remain unsure of how to start threat-hunting or how far along they are in developing their own hunt capabilities. So, the question is --How can you quantify where your organization stands on the road to effective hunting?
Here, we will discuss a general model that can map threat-hunting maturity across any organization.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The basis for this attack often targets applications like Web Servers (i.e., Windows IIS, Apache, etc…); however, application layer attacks have been evolving to application platforms like WordPress, Joomla, Drupal, Magento, and others.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
White Box Penetration Testing:
White box penetration testing involves sharing full network and system information with the tester, including network maps and credentials. This helps to save time and reduce the overall cost of an engagement.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Here IP stands for 'Internet Protocol and 'Sec' for secure. The Internet Protocol is the main routing protocol used on the Internet and it designates where data will go using IP addresses. IPSec is secure because it adds encryption and authentication to this process.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
This post is intended to brief you with top known vulnerabilities that exists in systems, particularly in Web Applications.
OWASP or Open Web Application Security Project is a worldwide not-for-profit charitable organization which is focused on improving the security of software. It regularly publishes top security holes across applications and suggestions on fixing the same.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Virtualized security, or security virtualization, refers to security solutions that are software-based and designed to work within a virtualized IT environment. They are different from traditional, hardware-based network security, which is static and runs on devices such as traditional firewalls, routers, and switches.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The CIA Triad of confidentiality, integrity and availability is considered the core underpinning of information security. Every security control and every security vulnerability can be viewed in light of one or more of these key concepts. For a security program to be considered comprehensive and complete, it must adequately address the entire CIA Triad.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Brute force attacks occur when a bad actor attempts a large amount of 'user name and password' combinations on a target. These attacks frequently involve multiple attempts on account passwords with the hopes that one of them will be valid. It’s a bit like trying all of the possible combinations on a padlock, but on a much larger scale.
Passwords are not the only resource that can be brute forced: Links and directories, usernames, and emails are other common targets.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Packet Capture or PCAP (also known as libpcap) is an application programming interface (API) that captures live network packet data from OSI model Layers 2-7.
Unix-like systems implement pcap in the libpcap library; for Windows, there is a port of libpcap named WinPcap that is no longer supported or developed, and a port named Npcap for Windows 7 and later that is still supported.
- Let Us Compare SSL and TLS
- What is Security Onion? How Powerful Security Onion Actually is?
- What is Volume-based DDoS Attack? Know about Top-3 Largest Known DDoS Attacks
- What is VPN ? How Can You Choose a Good VPN ?
- What Is Input Validation? What are Strategies to Handle Input Validation?
- Who is a Vulnerability Assessment Analyst? What are his Typical Work Duties?
- Mapping the OWASP Top 10 to Blockchain
- What is Principle of Least Privilege? Why is this Principle So Important?
- What is UEFI Secure Boot? Beware of TRICKBOOT
- An Integrated Strategy to Protect and Defend Your Enterprise
IT PANORAMAApplication Platform Optimization
|
CYBER WARRIOR'S
|
CERTIFICATIONSCCNA CCNP - Project & Assignment Help |
MANAGEMENT CONSULTANCYLean Six Sigma Certification Training LSS Black Belt Program (On-site) LSS Green Belt Program (On-site)
|
BLOGS |
CONTACT US
© 2013 Luminis Consulting Services P Ltd, IN |