1. PROJECT NAME: Digital World Network Security Hardening and Firewall Optimization Duration : 6 months Tools Used : Kali Linux & Wireshark Client …
Cyber Security
A cyberattack is a malicious and deliberate attempt by an individual or organization to breach the information system of another individual or organization. Usually, the attacker seeks some type of…
Vulnerability assessment and penetration testing are two different phrases that both serve the same purpose: to secure the network environment. Vulnerability Assessment is a process for defining, detecting, and prioritizing vulnerabilities…
Honeypots are attack targets that are set up to see how different attackers attempt exploits. Private firms and governments can utilize the same concept to evaluate their vulnerabilities, which is…
A botnet is a collection of internet-connected devices, such as servers, PCs, and mobile phones, that are infected with malware and controlled by it. It’s used to steal data, send…
The following are some of the advantages of putting cybersecurity in place and keeping it up to date: Businesses are protected from cyberattacks and data breaches. Both data and network…
A firewall serves as a barrier between a LAN and the Internet. It allows private resources to remain private while reducing security threats. It manages both inbound and outbound network…
Threat: A threat is any form of hazard that has the potential to destroy or steal data, disrupt operations, or cause harm in general. Malware, phishing, data breaches, and even unethical…
CIA stands for Confidentiality, Integrity, and Availability. CIA is a model that is designed to guide policies for Information Security. It is one of the most popular models used by organizations. Confidentiality The information should…
IDS is Intrusion Detection System and it only detects intrusions and the administrator has to take care of preventing the intrusion. Intrusion Detection Systems (IDS) scan and monitor network traffic for signals that…
Difference between Symmetric and Asymmetric encryption Basis of Comparison Symmetric Encryption Asymmetric Encryption Encryption key Same key for encryption & decryption Different keys for encryption & decryption Performance Encryption is…
When a PHP application makes a database connection it of course generally needs to pass a login and password. If I’m using a single, minimum-permission login for my application, then…
I have two HTTP services running on one machine. I just want to know if they share their cookies or whether the browser distinguishes between the two server sockets. Solution…
I need .pfx file to install https on website on IIS. I have two separate files: certificate (.cer or pem) and private key (.crt) but IIS accepts only .pfx files….
When sending data over HTTPS, I know the content is encrypted, however I hear mixed answers about whether the headers are encrypted, or how much of the header is encrypted….
If user input is inserted without modification into an SQL query, then the application becomes vulnerable to SQL injection, like in the following example: $unsafe_variable = $_POST[‘user_input’]; mysql_query(“INSERT INTO `table` (`column`)…
VPN is an acronym that stands for Virtual Private Network. It creates a safe encrypted tunnel across the internet by connecting a VPN server to a VPN client. Suppose a…
Hashing is required when we have to compare a huge amount of data. We can create different hash values for different data, and we can compare hashes too. Following is…
A virus is a piece of harmful executable code that is attached to another executable file and can modify or erase data. When a virus-infected computer application executes, it takes…
Brute Force is a way of finding out the right credentials by repetitively trying all the permutations and combinations of possible credentials. In most cases, brute force attacks are automated…