Posts

Showing posts with the label Cyber security basics

What is VPN? How It Works, Types of VPN

VPN stands for  "Virtual Private Network"  and describes the opportunity to establish a protected network connection when using public networks. VPNs encrypt your internet traffic and disguise your online identity. This makes it more difficult for third parties to track your activities online and steal data. The encryption takes place in  real time . How does a virtual private network (VPN) work? A VPN hides your IP address by letting the network redirect it through a specially configured remote server run by a VPN host. This means that if you surf online with a VPN, the VPN server becomes the source of your data. This means your Internet Service Provider (ISP) and other third parties cannot see which websites you visit or what data you send and receive online. A VPN works like a filter that turns all your data into "gibberish". Even if someone were to get their hands on your data, it would be useless. What are the benefits of a VPN connection? A VPN connection disg...

Cyber Kill Chain

  What is a Cyber Kill Chain The cyber kill chain is essentially a cyber security model created by Lockheed Martin that traces the stages of a cyber-attack, identifies vulnerabilities, and helps security teams to stop the attacks at every stage of the chain. The term kill chain is adopted from the military, which uses this term related to the structure of an attack. It consists of identifying a target, dispatch, decision, order, and finally, destruction of the target. How does the Cyber Kill Chain Work? The cyber kill chain consists of 7 distinct steps: 1. Reconnaissance – The attacker collects data about the target and the tactics for the attack. This includes harvesting email addresses and gathering other information. – Automated scanners are used by intruders to find points of vulnerability in the system. This includes scanning firewalls, intrusion prevention systems, etc to get a point of entry for the attack. 2. Weaponization – Attackers develop malware by leveraging s...

HTTP Status Codes

  HTTP Status Codes httpstatuses.com is an easy to reference database of HTTP Status Codes with their definitions and helpful code references all in one place 1×× Informational 100  Continue 101  Switching Protocols 102  Processing 2×× Success 200  OK 201  Created 202  Accepted 203  Non-authoritative Information 204  No Content 205  Reset Content 206  Partial Content 207  Multi-Status 208  Already Reported 226  IM Used 3×× Redirection 300  Multiple Choices 301  Moved Permanently 302  Found 303  See Other 304  Not Modified 305  Use Proxy 307  Temporary Redirect 308  Permanent Redirect 4×× Client Error 400  Bad Request 401  Unauthorized 402  Payment Required 403  Forbidden 404  Not Found 405  Method Not Allowed 406  Not Acceptable 407  Proxy Authentication Required 408  Request Timeout 409  Conflict 410  Gone 411  Length ...

Cyber security Top Interview Questions

Cyber Security Top interview Questions Cyber Security Full Notes IDS or IPS top 100 Questions

Cyber Security Self Introduction

  Self introduction: Myself (Yourname) Currently working in (Your company name) as a  security analyst from the last (Your Experience) In this organization I am handling the roles and responsibilities like Incidents monitoring and a nalyzing part by using the siem tools like Microsoft sentinel, Ibm qradar, Micro Focus Arcsight, DLP tool forcepoint, Microsoft EDR After analyzing the incidents we raise tickets in the ticketing tool for the appropriate team to remediate.  Maintaining the incident tracker , and daily report.  As well as participating in daily and weekly calls with vendors. Reporting the siem health checkup.  SIEM Analyst for log & event analysis, incident investigation, reporting, remediation and also develop • Worked on Multiple SIEM tools like QRadar, sentinel, Archsight Was Responsible for complete detailed analysis in SIEM tools to provide the clear picture of incident to the customer. Having an experience in creating Security Threat ...