Incident Management

Incident Management

Incident Management is the procedure and method of handling an incident that occurs. This incident may be any specific violation of any condition policies, or else. Similarly, in information security, incident responses are the remediation actions or steps taken as the response of an incident depending upon indentification of an event, threat or attack to the removal or elimination ( when system become stable , secure and functional again). Incident Response Management defines the roles and responsibilities of penetration testers, users or employees of an organization. Additionally, incident response management…

Read More

Cloud Security

Cloud Security

Cloud Security refers to the security implementations, deployments, and preventions to defend against security threats. Cloud Security includes Control policies, deployment of security devices such as application firewalls, Next generation IPS devices and hardening the infrastructure of Cloud Computing. It also includes some activites that are to be taken from the service providers end as well as actions that should be taken at the user end. Cloud Security Control Layers Application Layer There are several security mechanisms, devices, and policies that provide support at different cloud security control layers. At…

Read More

Malware Analysis

Malware Analysis

Malware Analysis is the process of identification of a malware till its verification that malware is completely removed, including observing the behavior that malware, is scoping the potential threat to a system and findings other measures. Before explaining the malware analysis, the need for malware analysis and goal to be achived by this analytics must be defined. Security analyst and security professional at some point in their career have performed malware analyst. The major goal of malware analysis is to gain detailed information and observe the behavior of malware, to…

Read More

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS)

An Intrusion Detection Systems (IDS) inspects all inbound and outbound network traffic for suspicious patterns that may indicate a network or system security breach. The IDS checks traffic for signatures that match known intrusion patterns, and signals an alarm when a match is found. How IDS Works Ways To Detect an Intrusion Signature Recognition It is also known as misuse detection, Signature recognition tries to identify events that indicate misuse of a system resource. Anomaly Detection It detect the intrusion based on the fixed behavioral characterstics of the users and…

Read More

Computer Viruses

Computer Viruses

Computer Viruses are the oldest form of the malicious program; it was first introduced in 1970. In this section, we will discuss the virus and worms, how viruses are classified to be different from other malicious programs, how to create viruses and how does virus infect the target. Viruses The Virus is self-replicating program; it is capable of producing multiple copies of itself by attaching with another program of any format. These viruses can be executed as soon as they are downloaded, it may wait for the host to execute…

Read More

Bluetooth Hacking

Bluetooth Hacking

What is Bluetooth? Bluetooth is a universal protocol for low power, near field communication operating at 2.4 – 2.485 GHz using spread spectrum, frequency hopping at 1,600 hops per second (this frequency hopping is a security measure). It was developed in 1994 by Ericsson Corp. of Sweden and named after the 10th century Danish (Sweden and Denmark were a single country in the 10th century) King Harald Bluetooth. The minimum specification for Bluetooth range is 10 meters, but there is no limit to the range that manufacturers may implement in…

Read More

DOS & D-DOS

DOS Denial of service (DOS) is an attack on a computer or network that reduces, restricts or prevent accessibility of system resources to its legitimate users. In a DOS attack, attackers flood a victim system with non-legitimate service request or traffic to overload its resources. Dos attack leads to unavailability of a particular website and slow network performance. Denial of Service (DOS) is a type of attack in which service offered by a system or a network is denied. Services may either be denied, reduced the functionality or prevent the…

Read More

What is Network Sniffer?

Network Sniffing is a process of monitoring and capturing all data packets passing through a given network using sniffer tools. It is a form of wiretap applied to computer networks. Many enterprises switch ports are open. Anyone in the same physical location can plug into the network using an Ethernet Cable. How a Sniffer Works Sniffer turns the NIC of a system to the promiscuous mode so that it listen to all the data transmitted on its segment. A sniffer can constantly monitor all the network traffic to a computer…

Read More

What is Footprinting?

What is Footprinting?

Footprinting is the process of collecting as much as information as possible about a target network. for identifying various ways to intrude into an organization’s network system. Footprinting is the first step of any attack on information system; attacker gathers publicly available sensitive information, using which she/he perform social engineering, system and network attack. etc that leads to huge financial loss and loss of business reputation. Know Security Posture Footprinting allows attackers to know the external security postures of the target organizations. Reduce Focus Area It reduces attacker’s focus area…

Read More

How To Hack Wifi Using Kali Linux?

How To Hack Wifi Using Kali Linux

Most Asking Question On Google Is How to Hack Wifi Using Kali Linux , Hack wifi , How To Hack Wifi Using Kali Linux , etc. But Firstly Understand What is Wifi & its Encryption. What is Wi-Fi and Is It Possible To Hack It? Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and Network connections. A common misconception is that the term Wi-Fi is short for “wireless fidelity,” however this is not the case. Wi-Fi is simply a…

Read More