- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Brute force attacks occur when a bad actor attempts a large amount of 'user name and password' combinations on a target. These attacks frequently involve multiple attempts on account passwords with the hopes that one of them will be valid. It’s a bit like trying all of the possible combinations on a padlock, but on a much larger scale.
Passwords are not the only resource that can be brute forced: Links and directories, usernames, and emails are other common targets.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Packet Capture or PCAP (also known as libpcap) is an application programming interface (API) that captures live network packet data from OSI model Layers 2-7.
Unix-like systems implement pcap in the libpcap library; for Windows, there is a port of libpcap named WinPcap that is no longer supported or developed, and a port named Npcap for Windows 7 and later that is still supported.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Both SSL (Secure Socket Layer) and TLS (Transport Layer Security) are the foundations of a secure connection for communication across an unsecured network. At present, over 90% of internet traffic across Google is being encrypted, according to the Google Transparency Report.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Security Onion is a free and open source alternative to expensive enterprise security solutions!
Security Onion can be described as a Network Security Monitoring (NSM) platform that “provides context, intelligence and situational awareness of your network.”
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
As the name implies, volume-based DDoS attacks depend on the volume of inbound traffic. The goal of this type of attack is to overload the website’s bandwidth or cause CPU or IOPS usage issues.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
VPN stands for virtual private network. The network part, well, that's easy. It's basically a bunch of computers that share various resources. Private? That one's pretty self-explanatory. The "virtual" bit is where things get a little more complicated.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Input validation is the first step of checking the type and content of data supplied by a user or application.
For web applications, input validation means verifying user inputs provided in web forms, query parameters, uploads, and so on.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
You may laugh, but Vulnerability Assessment Analysts are actually cybersecurity trouble-seekers.
They scan applications, systems and networks all the time, looking for vulnerabilities and deviations from acceptable configurations, enclave policy or local policy. They then present their findings in a comprehensive list or report (the vulnerability assessment) so that their clients can use it to improve their security posture.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Recently I had shared a number of posts on Blockchain technology.
Yes, I am aware of some basic benefits of Blockchain. For example,
Blockchain works as a shared system of record among participants on a business network, eliminating the need to reconcile disparate ledgers. It is distributed!
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The principle of least privilege is widely considered to be a cybersecurity best practice and is a fundamental step in protecting privileged access to high-value data and assets.
The principle of least privilege (PoLP) is an information security concept in which a user is given the minimum levels of access – or permissions which are needed to perform his/her job functions.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Secure Boot is one feature of the latest Unified Extensible Firmware Interface (UEFI) 2.3.1 specification (Errata C). The feature defines an entirely new interface between operating system and firmware/BIOS.
- An Integrated Strategy to Protect and Defend Your Enterprise
- What is Red Teaming?
- What are Digital Certificates? How does the Creation of a Digital Certificate Happen?
- Cybersecurity Frameworks - What are the Most Popular Cybersecurity Frameworks?
- How does an APT Attack happen Actually? An Example of APT Attack in Action
- If a Major Incident Happens, What Should You Do?
- An Holistic view of PenTesting. How to Manage the Penetration Testing?
- What is the Difference between IT and OT? Why OT Security is Important?
- How Do Cyber Attackers Gather Information Before Targeted Attacks?
- In-Demand CyberSecurity Jobs 2021
IT PANORAMAApplication Platform Optimization
|
CYBER WARRIOR'S
|
CERTIFICATIONSCCNA CCNP - Project & Assignment Help |
MANAGEMENT CONSULTANCYLean Six Sigma Certification Training LSS Black Belt Program (On-site) LSS Green Belt Program (On-site)
|
BLOGS |
CONTACT US
© 2013 Luminis Consulting Services P Ltd, IN |