Common Network Analysis Tool For Cyber Security Analysts

Common Network Analysis Tool For Cyber Security Analysts

October 27, 2023 Adeniyi Salau 0

Common Network Analysis Tool For Cyber Security Analysts   A SOC relies on a supporting infrastructure of tools and systems that provide the following services: Network mapping Network monitoring Vulnerability detection Penetration testing Data collection Threat and anomaly detection Data aggregation and correlation   One tool that is used by […]

Loading

Initial SQL Slammer Infection

Initial SQL Slammer Infection: How It Is Done

April 26, 2023 Adeniyi Salau 0

Worms share similar characteristics. They all exploit an enabling vulnerability, have a way to propagate themselves, and they all contain a payload. Worm Components Despite the mitigation techniques that have emerged over the years, worms have continued to evolve and pose a persistent threat. Worms have become more sophisticated over […]

Loading

Unknown Facts About Trojan Horses

Trojan Horses: How It Really Works (+Examples)

April 26, 2023 Adeniyi Salau 0

  The term Trojan horse originated from Greek mythology. Greek warriors offered the people of Troy (the Trojans) a giant hollow horse as a gift. The Trojans brought the giant horse into their walled city, unaware that it contained many Greek warriors. At night, after most Trojans were asleep, the […]

Loading

Basic Computer Security Tips To Protect Your Computer

September 28, 2022 Adeniyi Salau 0

The security of the computer allows users to use the computer while keeping safe from threats.   Computer Security can also be defined as managing all components of computer systems that can provide secrecy, credibility, and availability. Data, software, firmware, and hardware are among these components.     Tip 1:  […]

Loading

ITIL 4 Foundation Is All About

What You Need To Know About Home Networks

September 21, 2022 Adeniyi Salau 0

  In my previous article, I talked about all that you need to know about networks. In this article, I want to talk about all that you need to know about Home Networks. Follow me as we are going to look at that together in this article.      What […]

Loading

How Nigerian Scam Yahoo Yahoo Works

How Nigerian Scam Yahoo Yahoo Works

August 24, 2022 Adeniyi Salau 0

  Before I start writing this article, here is a disclaimer. I am not writing this article to rubbish Nigeria as a country and I am not a Yahoo Boy and I will never in my wildest dream support their nefarious activities. I just wanted ordinary Nigerians and all my […]

Loading

Understanding Network Communications Protocols For Cyber Security

Network Communications Protocols For Cyber Security: The Facts

August 18, 2022 Adeniyi Salau 0

Simply having a wired or wireless physical connection between end devices is not enough to enable communication. For communication to occur, devices must know “how” to communicate. Communication, whether face-to-face or over a network, is governed by rules called protocols. These protocols are specific to the type of communication method […]

Loading

Understanding How Address Resolution Protocol Works

Address Resolution Protocol: How It Works

August 18, 2022 Adeniyi Salau 0

If your network is using the IPv4 communications protocol, the Address Resolution Protocol, or ARP, is what you need to map IPv4 addresses to MAC addresses. This topic explains how ARP works. Every IP device on an Ethernet network has a unique Ethernet MAC address. When a device sends an […]

Loading

Examining Transport Layer Characteristics In Networking

Examining Transport Layer Characteristics In Networking

August 18, 2022 Adeniyi Salau 0

Application layer programs generate data that must be exchanged between the source and destination hosts. The transport layer is responsible for logical communications between applications running on different hosts. This may include services such as establishing a temporary session between two hosts and the reliable transmission of information for an […]

Loading

Discussing Transport Layer Session Establishment

Transport Layer Session Establishment: How It Is Done

August 18, 2022 Adeniyi Salau 0

You already know the fundamentals of TCP. Understanding the role of port numbers will help you to grasp the details of the TCP communication process. In this topic, you will also learn about the TCP three-way handshake and session termination processes. Each application process running on a server is configured […]

Loading

Understanding Dynamic Host Configuration Protocol

Understanding Dynamic Host Configuration Protocol

August 18, 2022 Adeniyi Salau 0

The Dynamic Host Configuration Protocol (DHCP) for IPv4 service automates the assignment of IPv4 addresses, subnet masks, gateways, and other IPv4 networking parameters. This is referred to as dynamic addressing. The alternative to dynamic addressing is static addressing. When using static addressing, the network administrator manually enters IP address information […]

Loading

The Truth About Domain Name Service

The Truth About Domain Name Service

August 18, 2022 Adeniyi Salau 0

The webservers that we so often connect to using names like www⋅cisco⋅com, are actually reached by assigning IP addresses to packets. On the internet, these domain names are much easier for people to remember than an IP address such as 74.163.4.161. If Cisco decides to change the numeric address of […]

Loading

Quotes on Marketing Automation To Help You Boost Your Business

Roles Of End Devices In The Network Process

August 18, 2022 Adeniyi Salau 0

  The network devices that people are most familiar with are end devices. To distinguish one end device from another, each end device on a network has an address. When an end device initiates communication, it uses the address of the destination end device to specify where to deliver the […]

Loading