CYBER SECURITY

Common Network Analysis Tool For Cyber Security Analysts

A SOC relies on a supporting infrastructure of tools and systems that provide the following services: Network mapping Network monitoring Vulnerability detection Penetration testing Data collection Threat and anomaly detection Data aggregation and correlation   One tool that is used by analysts in a SOC is Security Onion. Security Onion is intended to support SOC […]

Read More
CRYPTOCURRENCY CYBER SECURITY

Computer Security Awareness: Boosting The Performance Of Your Devices

    There is a saying that you cannot outgrow what you don’t know. The same thing applies to system security, you need to make a conscious effort to learn of you don’t want to fall, a victim.   In this article, I want to look at five benefits of computer security awareness ..Follow me as we […]

Read More
CYBER SECURITY

Probabilistic Analysis In Cyber Security: How To Determine The Likelihood Of Events

Statistical techniques can be used to evaluate the risk that exploits will be successful in a given network. This type of analysis can help decision-makers to better evaluate the cost of mitigating a threat with the damage that an exploit could cause. Two general approaches used to do this are deterministic and probabilistic analysis. The […]

Read More
CYBER SECURITY

Initial SQL Slammer Infection: How It Is Done

Worms share similar characteristics. They all exploit an enabling vulnerability, have a way to propagate themselves, and they all contain a payload. Worm Components Despite the mitigation techniques that have emerged over the years, worms have continued to evolve and pose a persistent threat. Worms have become more sophisticated over time, but they still tend […]

Read More
CYBER SECURITY

Basic Computer Security Tips To Protect Your Computer

The security of the computer allows users to use the computer while keeping safe from threats.   Computer Security can also be defined as managing all components of computer systems that can provide secrecy, credibility, and availability. Data, software, firmware, and hardware are among these components.     Tip 1:  Turn on Application Automatic update […]

Read More
CYBER SECURITY

Network Communications Protocols For Cyber Security: The Facts

Simply having a wired or wireless physical connection between end devices is not enough to enable communication. For communication to occur, devices must know “how” to communicate. Communication, whether face-to-face or over a network, is governed by rules called protocols. These protocols are specific to the type of communication method occurring.   For example, consider […]

Read More
CYBER SECURITY

Examining Transport Layer Characteristics In Networking

Application layer programs generate data that must be exchanged between the source and destination hosts. The transport layer is responsible for logical communications between applications running on different hosts. This may include services such as establishing a temporary session between two hosts and the reliable transmission of information for an application. The transport layer has […]

Read More
CYBER SECURITY

Transport Layer Session Establishment: How It Is Done

You already know the fundamentals of TCP. Understanding the role of port numbers will help you to grasp the details of the TCP communication process. In this topic, you will also learn about the TCP three-way handshake and session termination processes. Each application process running on a server is configured to use a port number. […]

Read More
CYBER SECURITY

Understanding Dynamic Host Configuration Protocol

The Dynamic Host Configuration Protocol (DHCP) for IPv4 service automates the assignment of IPv4 addresses, subnet masks, gateways, and other IPv4 networking parameters. This is referred to as dynamic addressing. The alternative to dynamic addressing is static addressing. When using static addressing, the network administrator manually enters IP address information on hosts.   When a […]

Read More
CYBER SECURITY

Understanding IP PDU Details For IPV4 And IPV6

IP was designed as a Layer 3 connectionless protocol. It provides the necessary functions to deliver a packet from a source host to a destination host over an interconnected system of networks. The protocol was not designed to track and manage the flow of packets. These functions, if required, are performed primarily by TCP at […]

Read More
Back To Top
+