top of page
What are the meanings of vulnerability, risk, threat, likelihood, impact and why do Cyber security experts need to know this and where are these applied?
Vulnerability, risk, threat, likelihood, and impact are crucial concepts that help experts understand, assess, and mitigate potential...
Nov 19, 20242 min read
Â
Â
What are CVE, CVSS, CWE scores?
CVE : CVE stands for Common Vulnerabilities and Exposures. In simple words it is a database of all the publicly disclosed cybersecurity...
Nov 19, 20241 min read
Â
Â
What is Hashing and its practical examples?
Hashing is the process of converting an input into a hash value, think of it like a secret code that can be easily translated one way,...
Nov 19, 20241 min read
Â
Â
What is symmetric and asymmetric encryption and what are the practical uses of the same?
In symmetric encryption, a single key is used which can encrypt plaintext into ciphertext as well as decrypt ciphertext into plaintext....
Nov 19, 20242 min read
Â
Â
What is encryption and where is it relevant in a cyber security professional’s job?
Encryption is a process of conversion of plain text to unreadable ciphertext with the help of a mathematical algorithm and an encryption...
Nov 19, 20242 min read
Â
Â
Why should a cyber security professional know about project plan and how to manage project?
Project management is an integral part of a cyber security professional’s career. He should be able to deliver the project smoothly as...
Nov 19, 20241 min read
Â
Â
What is a project plan and how to draft a project plan?
A project plan is a comprehensive document that outlines the objectives, scope, resources, timelines, and deliverables of a project. It...
Nov 19, 20242 min read
Â
Â
Why should a cyber security professional know how to draft minutes of meetings?
Effective communication Good communication and writing down important information are really important in cybersecurity. As a...
Nov 19, 20243 min read
Â
Â
What are minutes of the meeting and how to draft minutes of the meeting?
Minutes of Meetings (MoM) are essential documents that provide an overview of the discussion that occurred during a particular meeting....
Nov 19, 20241 min read
Â
Â
Approach towards testing a login page, reset password/verify email
Following test cases can be applied on the Login page: Bruteforce the login using cluster bomb attack. (both username / password) Use...
Nov 18, 20241 min read
Â
Â
bottom of page