In information security, social engineering is a technique used to manipulate people into revealing private information. It is mostly done online rather than by breaking in or using other hacking …
Tashina
Tashina
Tashina has been an avid cybersecurity writer for many years. She is passionate about cybersecurity and enjoys learning and writing about the latest trends, issues and challenges in the industry.
-
-
A port is a communication endpoint for the flow of information from one point to another in a network. It’s the central point for data exchange through programming, electronic and …
-
Red team engagement is an advanced security test that companies take to simulate a tailored, full-scale attack on your organisation. It gives a holistic and bigger picture of your organization’s …
-
Patch management is the process of applying and distributing updates to your software. These patches are essential to resolve errors, bugs, and vulnerabilities in the software. It is one of …
-
A Brute Force Attack is a method to get access to a server or website. It involves frequent attempts of trying different password combinations to break into a server, website, …
-
In an era where cyber threats from network security evolve at an unprecedented pace, fortifying your network with a robust firewall is no longer optional but essential. Firewalls serve as …
-
Cryptography is an Ancient Greek word in which “crypto” means “hidden” and “graphy” means “writing.” It is the practice and study of techniques used for securing communication in the presence …
-
A Vulnerability Assessment is a process that uses automated testing tools to identify threats and risks in an organization’s network. Cyber attackers can use security vulnerabilities to infiltrate into an …
-
The CIA triad stands for Confidentiality, Integrity and Availability. It’s a model that guides policies of Information Security for an organization. Security experts consider the three elements of CIA as the …
-
In the ever-evolving field of network security, it’s very important to have clarity of industry terms and associated technologies. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are two …