Network Security Basics Part-2 Read

This section will demonstrate common information security problems mapped with OSI seven layers and evaluate the same for solutions to secure the organisation’s information resources. Layer 1 – Physical Layer The physical layer is responsible for the physical communication between end devices …

Effective Log Analysis Read

Log analysis is a responsibility that a secu-rity Analyst need fulfill with at most conviction in all organizations. If our is equipped with security devices like firewall, AV,VPN  which is crucial to the organization and breach in any such devices affects the …

Network Security Basics Part-1 Read

Introduction From this article we will go through network security as whole from basic to expert level. It will help you get better idea of Network Security. It’s just the reference for people who are interested in network security but don’t know …

Watering Hole Attacks Read

In recent months, many readers became familiar with the term “Watering Hole,” used to describe an attack implemented to infect a website’s visitors. One could describe it as a “drive-by” exploit used to compromise legitimate websites. This method of attack is not …

WordPress Security Read

WordPress Security

Introduction You must have heard the name WordPress as it has become popular term across the social media world. I am not going deep into explaining what WordPress is but here is a short introduction to WordPress – It is a free …

Scan Your Home Network With Nmap Read

Who should read this article? Everyone that is interested in computer security and computer networking should read this article. Introduction If you run a network, a small or big one, you need a flexible and productive way to monitor it. You need …

Identify Web Application Vulnerabilities using OWASP ZAP Read

Introduction Today’s organizations are facing major problems with Web Application Vulnerabilities. Many of such Web app vulnerabilities resulted in compromise of systems, including financial damage, theft of credit cards, loss of confidential data and reputational damage. Sometimes you just need to browse …

Information Rights Management (IRM) Read

IRM.png Introduction Information Rights Management is the set of techniques and methods which protect the highly sensitive information of the organization irrespective of the file location whether it resides “in” or “outside” the corporate boundaries. This happens as the permissions embedded inside …