Saturday , September 22 2018

April, 2018

  • 9 April

    Secure Sockets Layer

    Secure Sockets Layer

    Secure Sockets Layer: Another important mechanism for securing information is Secure Sockets Layer (SSL). The SSL protocol was developed by Netscape in the mid-1990s and rapidly became a standard mechanism for exchanging data securely over insecure channels such as the Internet. NOTE: SSL is supported by all modern browsers and …

  • 8 April

    Understanding the Steps of Ethical Hacking

    Understanding the Steps of Ethical Hacking

    Understanding the Steps of Ethical Hacking: For an overview of the process, let’s look at the steps of ethical hacking to see where Footprinting fits in as well as what future phases hold. Phase 1: Footprinting Footprinting is the first phase of the ethical hacking process and is the subject …

  • 7 April

    Hacking: Current Developments

    Hacking: Current Developments

    Current Developments: In the early 2000s, more malicious activity started to appear in the form of more advanced attacks. In the first few years of the new millennium, the aggressiveness of attacks increased, with many attacks criminally motivated. Malicious attacks that have occurred include the following (although there are many …

  • 6 April

    So, What is an Ethical Hacker?

    So, What is an Ethical Hacker?

    What is an Ethical Hacker: When you explore this blog and the tools it has to offer, you are learning the skills of the hacker. But we can’t leave it at that, because you need to be an ethical hacker, so let’s explore what that means. Ethical hackers are employed …

  • 5 April

    Reporting a Security Incident

    Reporting a Security Incident

    Reporting a Security Incident: Once an incident has been responded to and a team has gotten involved to assess the damage and start the cleanup, the required parties will need to be informed. These parties be will responsible for getting the ball rolling whether it is legal action, an investigative …

  • 4 April

    Competitive Analysis

    Competitive Analysis

    Competitive Analysis: We have covered some great tools so far, but there is another way of gathering useful data that may not seem as obvious; Competitive Analysis. The report created through competitive analysis provides information such as product information, project data, financial status, and in some cases intellectual property. Good …

  • 3 April

    Complying with Privacy and Security Regulations

    Complying with Privacy and Security Regulations

    Complying with Privacy and Security Regulations: An organization’s security management policies don’t exist in a vacuum. Regulatory and governmental agencies are key components of a security management policy. These agencies have made large improvements over the last several years to ensure the privacy of information; several laws have been passed …

  • 2 April

    Typo Squatting and URL Hijacking

    Typo Squatting and URL Hijacking

    Typo Squatting and URL Hijacking: Typo squatting (also spelled typosquatting) and URL hijacking are the one and the same. Difficult to describe as an attack, this is the act of registering domain that are similar to those for known entity but based on a misspelling or typographical error. As an …

  • 1 April

    Government and Military Classification

    Government and Military Classification

    Government and Military Classification: The U.S government and the military have slightly different types of concerns relating to information classification. Government agencies are concerned about privacy and national security. Because of this, a unique system of classification and access controls has been implemented to protect information.   The following is …

March, 2018

  • 30 March

    Surviving Viruses

    Surviving Viruses

    Surviving Viruses: A virus is a piece of software designed to infect a computer system. Under the best of circumstances, a virus may do nothing more than reside on the computer, but it may also damage the data on your hard disk (HDD), destroy your operating system, and possibly spread …