Data breach at Unacademy

 Unacademy which is India’s largest education platform based in Bangalore is changing the way to learn. In a span of 6 months, over 300,000 students have benefited from over 2,400 online lessons and specialized courses on cracking various competitive examinations, on our platform. They have onboard some of the top educators in the country. They originally started […]

OSI Model

We speak. Birds chirp. But how do applications communicate with each other over a network? To understand, OSI model is used by IT professionals. OSI stands for Open Systems Interconnection, that is used to observe how networks send and receive data on a network. The main concept of OSI is that the process of communication […]

VAPT continued!

What is VAPT? Why is it needed? How it is done? Some of the details have already been discussed so far. If you have missed it, find it here! Penetration Testing have been learnt and now we shall go for Vulnerability Assessment. A vulnerability assessment is a process of finding out the vulnerabilities (mistakes or […]

VAPT

Development doesn’t happen suddenly. If it had happened so, it is not development. Any highest grossing companies, Google for example,V have their earlier and the later phases. Same as for the companies, Internet also has its earlier phase. During that phase not everything is well secured and equipped as today it is. Vulnerabilities existed all […]

Types of Security attacks

Have your friends ever asked you to pass on some message to someone? Yes? It is obvious. Sometimes we tell the exact information but sometimes we forget some and modify in our own style and convey the message😂. Quiet common!! The intention for the above context is not our memory, but is modification of a […]

Network Protocols

” Our Honorable President will be the chief guest of Convocation Ceremony! The accomplishments will be awarded to the students following certain protocols. ” These are the words I heard when I have attended a convocation ceremony. The point to focus here is not our President, its Protocol. What is a protocol? Why it is […]

Stepping in to the Network

We commonly use Google Chrome, Firefox and many more to stream or to play or to chat, etc. Didn’t feel magical anytime? Like wow, we are able to access the world in our palms! Well yes, that’s a magic until you start unwinding the loops. The magic is nothing but the Internet. Then how and […]

Types in Cybersecurity

Cybersecurity is a tree with several branches to it. When you start watering it with excess knowledge, the success you taste would be awesome. The success in the sense the level of security you can possess. So, without any delay we shall dive into some of the types of Cybersecurity. Critical Infrastructure Security It is […]

Actors and their motives in CS

Developing knowledge about our enemy, like their goals, inorder to provide protection for yourself or an organization. In cybersecurity, enemy is called as “threat actor”. A threat actor can be defined as an organization or a person or a group intended to disrupt the security of a network or system. We shall now look at […]

Cryptography and its types

There are a lot of ways in securing the information that is being transmitted. One of the ways is Cryptography. Some of the information has already been provided in Block chain and Cryptography. As of now, we shall discuss cryptography types and in the consecutive writings its algorithms, tools, and applications. We shall now dive […]

Firewalls and types

Why there is a security guard at the gate? To make sure someone new or harmful not to enter in to premises. Same as the guard, we have a protective layer that doesn’t allow malicious network or viruses to enter to the system. That protective layer is termed as Firewall!! Firewall: A firewall is a network […]

Top Certifications in Security

Yes!! We are learning basics, soon we will learn deeper. But, where am I up to? Am I well trained? How can I get assessed? The only simple solution to the answer can sound bit impassive, but it’s a test!! Mostly used term- Certification. So, we shall look into some of the certifications from our […]

Threats and Protection

We have already learnt what is a threat in earlier writings. If not visited yet, here are the detailed details!! “Prevention is better than cure!”, the elders’ sayings should not be passed over. Like Voldemort having horcruxes, bad always have several forms. Now we shall plunge into some of the types of threats, prevention and […]

Attacks and Loss!!

Remember one of the questions from Introduction?? Any kind of these (cyber) attacks happened before? Yes!! The world has been experiencing attacks and risks since years. Happened might be good or bad, we should remember. So, let’s look into some of the attacks… Adobe in October 2013 announced the massive hacking of its IT infrastructure. […]