Category: Uncategorized

  • CompTia Security+ Practice Test

    Dive into practice questionsQuestion 1 A business development team reports that files are missing from the database system and the server log-in screens are showing a lock symbol that requires users to contact an email address to access the system and data. Which of the following attacks is the company facing? A. Rootkit B. Ransomware…

  • THREAT ACTORS

    An individual or entity responsible for incidents that impact security and data protection. Threat actors can be anyone lone hackers ,a group of hackers , an organization and there only intention is to get your data , damage it or use your data for unethical purpose. when we are talking about threat actors ,they are…

  • IPINFO.IO/IP ON KALI LINUX ADDRESS TO GET LOCATION

    the most common command is ipconfig. What ipconfig do is it give your current private IP address that are specific to each adapter on your network. let get a bit more detail about ip address. An IP address is a unique numerical label assigned to each device connected to the Internet, allowing for identification and…

  • FREE CYBER SECURITY TOOLS

  • Gap Analysis

    Gap analysis is the process of evaluating the difference between an organization’s current performance and its desired performance. The goal of Gap Analysis is to analyse the areas where improvements can be made to bridge the gap. Conducting a gap analysis can be a really valuable tool for organizations that are looking to improve their…

  • CONFIDENTIALITY IN CYBER SECURITY EXPLAINED

    In order to ensure confidentiality, We basically use 5 measures ·         Encryption ·         Access control ·         Data masking ·         Physical security measures ·         Training and awareness ENCRYPTION Encryption comes with an encryption key that converts data to cipher text.this cipertext is not readable and can only be decrypted with decryption key .a way for ensuring…

  • Calling every threat “malware” without knowing if it’s a Trojan, backdoor, bootloader, spyware, rootkit, loader, wiper, or RAT isn’t “security awareness” — it’s technical illiteracy.

    So , now we are going to discuss this in detail… Well, what is malware????malware is short form of MALicious softWARE ,any software that is intentionally designed to disrupt ,damage and gain unauthorized access to computer system.Malware software can be of multiple types and here the terms comes as worms,viruses,ransomware ,spyware adware…cyber criminals use these…

  • Interview Questions and Answers

  • INTEGRITY ,AVAILABILITY AND ACCOUNTABILITY EXPLAINED

    Integrity Integrity helps to ensure information and data remain accurate and unchanged from their original state unless intentionally modified by an authorized individual. Integrity verifies the accuracy and trustworthiness of data over the entire lifecycle. Just think about what would happen if somebody altered our exam answers papers .that’s called integrity.data should not be altered…

  • CONFIDENTIALITY IN CYBER SECURITY EXPLAINED

    In order to ensure confidentiality, We basically use 5 measures ·         Encryption ·         Access control ·         Data masking ·         Physical security measures ·         Training and awareness ENCRYPTION Encryption comes with an encryption key that converts data to cipher text.this cipertext is not readable and can only be decrypted with decryption key .a way for ensuring…