top of page
Nov 19, 20242 min read
What are the meanings of vulnerability, risk, threat, likelihood, impact and why do Cyber security experts need to know this and where are these applied?
Vulnerability, risk, threat, likelihood, and impact are crucial concepts that help experts understand, assess, and mitigate potential...
33 views
Nov 19, 20241 min read
What are CVE, CVSS, CWE scores?
CVE : CVE stands for Common Vulnerabilities and Exposures. In simple words it is a database of all the publicly disclosed cybersecurity...
0 views
Nov 19, 20241 min read
What is Hashing and its practical examples?
Hashing is the process of converting an input into a hash value, think of it like a secret code that can be easily translated one way,...
1 view
Nov 19, 20242 min read
What is symmetric and asymmetric encryption and what are the practical uses of the same?
In symmetric encryption, a single key is used which can encrypt plaintext into ciphertext as well as decrypt ciphertext into plaintext....
0 views
Nov 19, 20242 min read
What is encryption and where is it relevant in a cyber security professional’s job?
Encryption is a process of conversion of plain text to unreadable ciphertext with the help of a mathematical algorithm and an encryption...
0 views
Nov 19, 20241 min read
Why should a cyber security professional know about project plan and how to manage project?
Project management is an integral part of a cyber security professional’s career. He should be able to deliver the project smoothly as...
0 views
Nov 19, 20242 min read
What is a project plan and how to draft a project plan?
A project plan is a comprehensive document that outlines the objectives, scope, resources, timelines, and deliverables of a project. It...
0 views
Nov 19, 20243 min read
Why should a cyber security professional know how to draft minutes of meetings?
Effective communication Good communication and writing down important information are really important in cybersecurity. As a...
0 views
Nov 19, 20241 min read
What are minutes of the meeting and how to draft minutes of the meeting?
Minutes of Meetings (MoM) are essential documents that provide an overview of the discussion that occurred during a particular meeting....
0 views
Nov 18, 20241 min read
Approach towards testing a login page, reset password/verify email
Following test cases can be applied on the Login page: Bruteforce the login using cluster bomb attack. (both username / password) Use...
1 view
bottom of page