Types in Cybersecurity

Cybersecurity is a tree with several branches to it. When you start watering it with excess knowledge, the success you taste would be awesome. The success in the sense the level of security you can possess. So, without any delay we shall dive into some of the types of Cybersecurity. Critical Infrastructure Security It is […]

Actors and their motives in CS

Developing knowledge about our enemy, like their goals, inorder to provide protection for yourself or an organization. In cybersecurity, enemy is called as “threat actor”. A threat actor can be defined as an organization or a person or a group intended to disrupt the security of a network or system. We shall now look at […]

Social engineering

“As we have noticed several followers are enthusiastic to gain more knowledge, we have an exciting world of knowledge created for you. You will have an access to numerous books, courses that we have cascaded together. To enter a new world, click here and take a ride!” Here we go now. Social engineering is a […]

Cryptography and its types

There are a lot of ways in securing the information that is being transmitted. One of the ways is Cryptography. Some of the information has already been provided in Block chain and Cryptography. As of now, we shall discuss cryptography types and in the consecutive writings its algorithms, tools, and applications. We shall now dive […]

Picked up Platforms.

The information we are imparting will gradually plunge into depth. We hope for a better foundation by cascading data from several references but if you are a little hasty to know more, we guide you in that way as well. Here are some suggestions from venerable learning platforms. Station X Station X has been a […]

Firewalls and types

Why there is a security guard at the gate? To make sure someone new or harmful not to enter in to premises. Same as the guard, we have a protective layer that doesn’t allow malicious network or viruses to enter to the system. That protective layer is termed as Firewall!! Firewall: A firewall is a network […]

Top Certifications in Security

Yes!! We are learning basics, soon we will learn deeper. But, where am I up to? Am I well trained? How can I get assessed? The only simple solution to the answer can sound bit impassive, but it’s a test!! Mostly used term- Certification. So, we shall look into some of the certifications from our […]

Hacking Organizations

Remember the question from Introduction, Who did it? Here comes the answer. These are some notable hacking organizations. Isn’t that strange? Actually Not!!. This doesn’t mean that they are only involved in hazardous activities. Some are with us and some for us, mean the same, but the perspective do not!! Some work as government agencies,corporations […]

Threats and Protection

We have already learnt what is a threat in earlier writings. If not visited yet, here are the detailed details!! “Prevention is better than cure!”, the elders’ sayings should not be passed over. Like Voldemort having horcruxes, bad always have several forms. Now we shall plunge into some of the types of threats, prevention and […]

Attacks and Loss!!

Remember one of the questions from Introduction?? Any kind of these (cyber) attacks happened before? Yes!! The world has been experiencing attacks and risks since years. Happened might be good or bad, we should remember. So, let’s look into some of the attacks… Adobe in October 2013 announced the massive hacking of its IT infrastructure. […]

Women in Security

If we think subject is only required to be professional, we are wrong!! So, let’s include some great achievements. Most of the world think of women’s safety!! As a return gift, women are also into the world’s security. To support them, we shall study some of the organizations or associations that relate to Women in […]

CYBER SECURITY AND ETHICAL HACKING

Have you ever felt insecure when someone interrupted your conversation with your best friend (especially secret convos)? Yes? Okay, let’s get to the point. Ever thought of a day where all our personal data exposed? In these days everything almost became possible. We put everything into internet’s hand and we assume that it’s secure. But […]