top of page
Nov 19, 20242 min read
What are ports?
In a computer science or network a port can be defined as both physical and logical. A port acts like a door through which data can flow...
0 views
Nov 19, 20241 min read
What is the importance of configuration reviews and how can one practice configuration reviews ?
Configuration review is an activity where the current configuration of a component i.e server, firewall, database etc is compared against...
12 views
Nov 19, 20243 min read
How and where can one practice vulnerability assessment and which open source tools can be downloaded and used?
One can practice Vulnerability Assessment using these Free Labs: Platform: HackXpert Description: Free labs and training Source:...
5 views
Nov 19, 20242 min read
What is an IPS and what role does it play in Cyber security for network or end point?
An IPS stands for "Intrusion Prevention System." It is a crucial tool in the field of cybersecurity, used to protect computer networks or...
3 views
Nov 19, 20242 min read
What is DLP software and what role does it play in Cyber security?
DLP stands for "Data Loss Prevention" software. It plays a crucial role in cybersecurity to safeguard sensitive information and prevent...
2 views
Nov 19, 20243 min read
What are some of the recent high profile cyber attacks that all freshers should know and what are the details of these attacks?
Some of the recent high profile cyber attacks that all freshers should know about are: Cyber Attack: MOVEit Date : June 2023 Description...
0 views
Nov 19, 20242 min read
What is threat intelligence and how can one gather threat intelligence and what role does it play in an organization?
Threat intelligence is information collected and analyzed to understand potential cybersecurity threats, such as cyberattacks,...
1 view
Nov 19, 20242 min read
What are the meanings of vulnerability, risk, threat, likelihood, impact and why do Cyber security experts need to know this and where are these applied?
Vulnerability, risk, threat, likelihood, and impact are crucial concepts that help experts understand, assess, and mitigate potential...
33 views
Nov 19, 20241 min read
What are CVE, CVSS, CWE scores?
CVE : CVE stands for Common Vulnerabilities and Exposures. In simple words it is a database of all the publicly disclosed cybersecurity...
0 views
Nov 19, 20241 min read
What is Hashing and its practical examples?
Hashing is the process of converting an input into a hash value, think of it like a secret code that can be easily translated one way,...
1 view
bottom of page