Skip to content
crmnuggets

CRMNUGGETS

RELIGION. DIGITAL MARKETING. PROJECT MANAGEMENT. ITIL 4 AND MORE

  • Home
  • ABOUT
  • CRM
    • SCRUM
    • ITIL 4
  • STC 30
  • PROJECT MANAGEMENT
  • RCCG SOD
    • RCCG SUNDAY SCHOOL TEACHERS
    • RCCG SUNDAY SCHOOL MANUAL
  • MORE
    • COMPUTER SECURITY
    • DIGITAL MARKETING
    • CYBER SECURITY
    • MFM 70 DAYS FASTING
    • BUSINESS ANALYSIS
    • BUSINESS CONTINUITY MANAGEMENT
    • KEDI HEALTHCARE
  • TERMS
  • PRIVACY
  • HIRE ME

Category: CYBER SECURITY

Common Http And Https Exploits For Networks
CYBER SECURITY

Common Http And Https Exploits For Networks

  Internet browsers are used by almost everyone. Blocking web browsing completely is not an option because businesses need access to the web, without undermining web security. In this article,…

Adeniyi SalauJuly 2, 2022October 2, 2023
Understanding Threats And Vulnerabilities For Networks
CYBER SECURITY

Understanding Threats And Vulnerabilities For Networks

    In this article, I want to look at some of the facts that you need to know about threats and vulnerabilities for networks. Cybersecurity analysts must prepare for…

Adeniyi SalauJune 29, 2022October 2, 2023
Understanding Security Policy Regulations And Standards
CYBER SECURITY

Understanding Security Policy Regulations And Standards

Business policies are the guidelines that are developed by an organization to govern its actions. The policies define standards of correct behaviour for the business and its employees. In networking,…

Adeniyi SalauJune 25, 2022October 2, 2023
Understanding CIA Triad In Cyber Security
CYBER SECURITY

Understanding CIA Triad In Cyber Security

  Information security deals with protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. In this article, I will be talking about CIA Triad in…

Adeniyi SalauJune 25, 2022October 2, 2023
Understanding AAA Operation In Cyber Security
CYBER SECURITY

Understanding AAA Operation In Cyber Security

Understanding AAA Operation In Cyber Security   A network must be designed to control who is allowed to connect to it and what they are allowed to do when they…

Adeniyi SalauJune 25, 2022October 2, 2023
Securing Communications In Cyber Security: How ?
CYBER SECURITY

Securing Communications In Cyber Security: How ?

  Organizations must provide support to secure the data as it travels across links. This may include internal traffic, but it is even more important to protect the data that…

Adeniyi SalauJune 25, 2022October 2, 2023
Data Confidentiality In Cybersecurity: What You Should Know
CYBER SECURITY

Data Confidentiality In Cybersecurity: What You Should Know

  There are two classes of encryption used to provide data confidentiality; asymmetric and symmetric. These two classes differ in how they use keys. In this article, I am going…

Adeniyi SalauJune 25, 2022October 2, 2023
Authority And PKI Trust System: The Facts
CYBER SECURITY

Authority And PKI Trust System: The Facts

  Internet traffic consists of traffic between two parties. When establishing an asymmetric connection between two hosts, the hosts will exchange their public key information. An SSL certificate is a…

Adeniyi SalauJune 25, 2022October 2, 2023
Host Based Firewalls In Cybersecurity: The Facts
CYBER SECURITY

Host Based Firewalls In Cybersecurity: The Facts

  Host-based personal firewalls are standalone software programs that control traffic entering or leaving a computer. Firewall apps are also available for Android phones and tablets. In this article, I…

Adeniyi SalauJune 25, 2022October 2, 2023
Common Vulnerability Scoring System: Facts To Note
CYBER SECURITY

Common Vulnerability Scoring System: Facts To Note

  The Common Vulnerability Scoring System (CVSS) is a risk assessment tool that is designed to convey the common attributes and severity of vulnerabilities in computer hardware and software systems.…

Adeniyi SalauJune 25, 2022October 2, 2023
Risk Management In Cybersecurity: Facts To Note
CYBER SECURITY

Risk Management In Cybersecurity: Facts To Note

Risk management in cybersecurity involves the selection and specification of security controls for an organization. It is part of an ongoing organization-wide information security program that involves the management of…

Adeniyi SalauJune 25, 2022October 2, 2023
Information Security Management System: Facts To Note
CYBER SECURITY

Information Security Management System: Facts To Note

An Information Security Management System (ISMS) consists of a management framework through which an organization identifies, analyzes, and addresses information security risks. ISMSs are not based on servers or security…

Adeniyi SalauJune 25, 2022October 2, 2023
Ways Of Monitoring Syslog And NTP Protocols Effectively
CYBER SECURITY

Ways Of Monitoring Syslog And NTP Protocols Effectively

  Various protocols that commonly appear on networks have features that make them of special interest in security monitoring. For example, Syslog and Network Time Protocol (NTP) are essential to…

Adeniyi SalauJune 25, 2022October 2, 2023
Understanding Access Control List In Cybersecurity
CYBER SECURITY

Understanding Access Control List In Cybersecurity

  Many technologies and protocols can have impacts on security monitoring. Access Control Lists (ACLs) are among these technologies. ACLs can give a false sense of security if they are…

Adeniyi SalauJune 25, 2022October 2, 2023
Network Logs In Cybersecurity: Facts To Note
CYBER SECURITY

Network Logs In Cybersecurity: Facts To Note

The tcpdump command-line tool is a very popular packet analyzer. It can display packet captures in real-time or write packet captures to a file. It captures detailed packet protocol and…

Adeniyi SalauJune 25, 2022October 2, 2023
CYBER SECURITY

Use Of Security Onion As A Source Of Alerts

Use Of Security Onion As A Source Of Alerts   Security Onion is an open-source suite of Network Security Monitoring (NSM) tools that run on an Ubuntu Linux distribution. Security…

Adeniyi SalauJune 24, 2022October 2, 2023
The Need For Alert Evaluation In Cybersecurity
CYBER SECURITY

The Need For Alert Evaluation In Cybersecurity

The threat landscape is constantly changing as new vulnerabilities are discovered and new threats evolve. As a user and organizational needs change, so also does the attack surface. Threat actors…

Adeniyi SalauJune 24, 2022October 2, 2023
Using Sguil In Investigating Network Data
CYBER SECURITY

Using Sguil In Investigating Network Data

  The primary duty of a cybersecurity analyst is the verification of security alerts. Depending on the organization, the tools used to do this will vary. For example, a ticketing…

Adeniyi SalauJune 24, 2022October 2, 2023
Digital Forensics In Cybersecurity: Facts To Note
CYBER SECURITY

Digital Forensics In Cybersecurity: Facts To Note

    Now that you have investigated and identified valid alerts, what do you do with the evidence? The cybersecurity analyst will inevitably uncover evidence of criminal activity. In order…

Adeniyi SalauJune 24, 2022October 2, 2023
Cyber Killer Chain In Cybersecurity: Facts To Know
CYBER SECURITY

Cyber Killer Chain In Cybersecurity: Facts To Know

  The Cyber Killer Chain was developed by Lockheed Martin to identify and prevent cyber intrusions. There are seven steps to the Cyber Kill Chain. Focusing on these steps helps…

Adeniyi SalauJune 24, 2022October 2, 2023

Posts pagination

Previous 1 2 3 4 Next

SEARCH THROUGH OUR BLOG

new

NAVIGATE HERE

CHECK THIS

Copyright © 2025 CRMNUGGETS