Posts

Showing posts with the label Penetration testing

Cybersecurity For Beginners

Image
Overview We, are living in an era of constant improvement, an era of technological improvement. Today, is the day of digitization, a world where almost everything becomes virtual, or we can say that internet (also call as cyberspace ) has made our lives easier.  Along with the comfort, this internet also brought us its dark side. In todays world, internet is the new medium of misdeeds for some of us. We are living in a society with both the good and evil sides of this modern era.  And to save yourself from this anonymous danger (also call as  cybercriminals ,) lurking in the corners of the internet, looking for a chance to stab you behind you back, that's where the security of your digital life takes place, often call as " CyberSecurity ". Technological advancements brings both the good and bad side of it. And to protect the good from the bad ones, cybersecurity takes its place to protect you and your digital life. It is the practice of securing your life on the internet ...

Terminologies For Cybersecurity And Ethical Hacking

Image
Overview Today's world is a digitized world. Technological evolution had made and making great changes in human civilization. The Internet becomes the daily part of our lives, also made the use of technology much comfortable to us. Also, it has it's bad effects cause cyberattacks are on the rise. In a world where cyberattacks have become a clear threat to our everyday lives, providing security to customers who want to protect their families and businesses from cyber threats and exposure to intrusive sites with inappropriate content, is an important role for service providers to fill. Botnets, backdoors, Trojan Horses, malware, Denial of Service attacks – the language of cybersecurity is filled with distinct jargon to describe its multitude of tools and tactics. Backbone of Cybersecurity (CIA Triad) The CIA triad in cybersecurity is a model comprising three core principles: confidentiality, integrity, and availability. Confidentiality Confidentiality ensures that sensitive infor...