Understanding Security Policy Regulations And Standards

Understanding Security Policy Regulations And Standards

June 25, 2022 Adeniyi Salau 0

Business policies are the guidelines that are developed by an organization to govern its actions. The policies define standards of correct behaviour for the business and its employees. In networking, policies define the activities that are allowed on the network.   This sets a baseline of acceptable use. If the […]

Understanding CIA Triad In Cyber Security

Understanding CIA Triad In Cyber Security

June 25, 2022 Adeniyi Salau 0

  Information security deals with protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. In this article, I will be talking about CIA Triad in cyber security. Follow me as we are going to look at that together in this article.  CIA Triad As shown […]

Understanding AAA Operation In Cyber Security

Understanding AAA Operation In Cyber Security

June 25, 2022 Adeniyi Salau 0

Understanding AAA Operation In Cyber Security   A network must be designed to control who is allowed to connect to it and what they are allowed to do when they are connected. These design requirements are identified in the network security policy. The policy specifies how network administrators, corporate users, […]

Ways Of Securing Communications In Cyber Security

Securing Communications In Cyber Security: How ?

June 25, 2022 Adeniyi Salau 0

  Organizations must provide support to secure the data as it travels across links. This may include internal traffic, but it is even more important to protect the data that travels outside of the organization to branch sites, telecommuter sites, and partner sites. In this article, I want to take […]

Ways Of Securing Communications In Cyber Security

Data Confidentiality In Cybersecurity: What You Should Know

June 25, 2022 Adeniyi Salau 0

  There are two classes of encryption used to provide data confidentiality; asymmetric and symmetric. These two classes differ in how they use keys. In this article, I am going to talk about data confidentiality in Cybersecurity. Symmetric encryption algorithms such as Data Encryption Standard (DES), 3DES, and Advanced Encryption […]

Ways Of Using Digital Signatures In Cybersecurity

Digital Signatures In Cybersecurity: How To Use It

June 25, 2022 Adeniyi Salau 0

  Digital signatures in cybersecurity are a mathematical techniques used to provide authenticity, integrity, and nonrepudiation. Digital signatures have specific properties that enable entity authentication and data integrity. In addition, digital signatures provide nonrepudiation of the transaction. In other words, the digital signature serves as legal proof that the data […]

Understanding Authority And PKI Trust System

Authority And PKI Trust System: The Facts

June 25, 2022 Adeniyi Salau 0

  Internet traffic consists of traffic between two parties. When establishing an asymmetric connection between two hosts, the hosts will exchange their public key information. An SSL certificate is a digital certificate that confirms the identity of a website domain. To implement SSL on your website, you purchase an SSL […]

Understanding Antimalware Protection In Cybersecurity

Antimalware Protection In Cybersecurity: Facts To Note

June 25, 2022 Adeniyi Salau 0

  The term “endpoint” is defined in various ways. For the purpose of this course, we can define endpoints as hosts on the network that can access or be accessed by other hosts on the network. This obviously includes computers and servers, however many other devices can also access the […]

Facts About Host Based Firewalls In Cybersecurity

Host Based Firewalls In Cybersecurity: The Facts

June 25, 2022 Adeniyi Salau 0

  Host-based personal firewalls are standalone software programs that control traffic entering or leaving a computer. Firewall apps are also available for Android phones and tablets. In this article, I want to talk about some of the facts that you need to know about host-based firewalls in cybersecurity. Host-based firewalls […]

Understanding Network Profiling In Cybersecurity

Network Profiling In Cybersecurity: Facts To Note

June 25, 2022 Adeniyi Salau 0

  In order to detect serious security incidents, it is important to understand, characterize, and analyze information about normal network functioning. Networks, servers, and hosts all exhibit typical behaviour for a given point in time. Network and device understanding network profiling in cybersecurity Care must be taken when capturing baseline […]

Highlighting Common Vulnerability Scoring System

Common Vulnerability Scoring System: Facts To Note

June 25, 2022 Adeniyi Salau 0

  The Common Vulnerability Scoring System (CVSS) is a risk assessment tool that is designed to convey the common attributes and severity of vulnerabilities in computer hardware and software systems. The third revision, CVSS 3.0, is a vendor-neutral, industry-standard, open framework for weighting the risks of a vulnerability using a […]

Understanding Risk Management In Cybersecurity

Risk Management In Cybersecurity: Facts To Note

June 25, 2022 Adeniyi Salau 0

Risk management in cybersecurity involves the selection and specification of security controls for an organization. It is part of an ongoing organization-wide information security program that involves the management of the risk to the organization or to individuals associated with the operation of a system. The image is a diagram […]

Information Security Management System: Facts To Note

June 25, 2022 Adeniyi Salau 0

An Information Security Management System (ISMS) consists of a management framework through which an organization identifies, analyzes, and addresses information security risks. ISMSs are not based on servers or security devices. Instead, an ISMS consists of a set of practices that are systematically applied by an organization to ensure continuous […]

Protocols

Ways Of Monitoring Syslog And NTP Protocols Effectively

June 25, 2022 Adeniyi Salau 0

  Various protocols that commonly appear on networks have features that make them of special interest in security monitoring. For example, Syslog and Network Time Protocol (NTP) are essential to the work of the cybersecurity analyst. In this article, I will be talking about how to use Syslog and NTP […]

Understanding Access Control List In Cybersecurity

Understanding Access Control List In Cybersecurity

June 25, 2022 Adeniyi Salau 0

  Many technologies and protocols can have impacts on security monitoring. Access Control Lists (ACLs) are among these technologies. ACLs can give a false sense of security if they are overly relied upon. ACLs, and packet filtering in general, are technologies that contribute to an evolving set of network security […]

7 Types Of Security Data In Cybersecurity

7 Types Of Security Data In Cybersecurity

June 25, 2022 Adeniyi Salau 0

Alert data consists of messages generated by intrusion prevention systems (IPSs) or intrusion detection systems (IDSs) in response to traffic that violates a rule or matches the signature of a known exploit. A network IDS (NIDS), such as Snort, comes configured with rules for known exploits. Alerts are generated by […]

6 Types Of End Device Logs In Cybersecurity

End Device Logs In Cybersecurity: The Various Types

June 25, 2022 Adeniyi Salau 0

As previously discussed, host-based intrusion detection systems (HIDS) run on individual hosts. HIDS not only detects intrusions but in the form of host-based firewalls, which can also prevent intrusion. This software creates logs and stores them on the host. This can make it difficult to get a view of what […]

Network Logs In Cybersecurity: Facts To Note

Network Logs In Cybersecurity: Facts To Note

June 25, 2022 Adeniyi Salau 0

The tcpdump command-line tool is a very popular packet analyzer. It can display packet captures in real-time or write packet captures to a file. It captures detailed packet protocol and content data. Wireshark is a GUI built on tcpdump functionality. The structure of tcpdump captures varies depending on the protocol […]