Network Attacks

Confidence Attacks and Romance Fraud Attacks

2020-09-23T13:11:08+00:00Categories: Certified Ethical Hacker, Network Security|Tags: , , , , , , |

These days, confidence attacks and romance fraud attacks are very common. An attacker deceives a victim into believing the attacker and the victim have a trust relationship, whether family, friendly or romantic. So, victim will trust to attacker. At this time, the attacker asks the victim to send money to the attacker. Or the victim may [...]

Pharming Attacks

2020-09-23T13:09:45+00:00Categories: Certified Ethical Hacker, Network Security|Tags: , , , , , , , , , |

Pharming is a type of cyber crime. It is very similar to phishing attacks. The Pharming attacks to name resolution process. However, There is a  DNS server in each network. In fact, each computer has its local DNS service. A pharming attack uses two way for attack to this process:   First Way More about hosts [...]

Implement and Manage Physical Security

2020-07-15T12:05:01+00:00Tags: , , , , , , , , , , , , , |

Implement and Manage Physical Security Physical security is yet another important aspect of the security professional’s responsibilities, and refers to securing physical assets such as land, buildings, computers, and other company property. We've discussed about important physical security concepts and technologies in detail before. If you need to refer to the contents of these [...]

Implement Disaster Recovery Processes

2020-07-15T12:07:22+00:00Tags: , , , , , , , , , , , , , , |

Implement Disaster Recovery (DR) Processes The general process of disaster recovery include: Responding to the disruption Activation of the recovery team Ongoing tactical communication Assessment of the damage Recovery of critical assets and processes Response The first thing to consider when an incident occurs is whether the disaster recovery process is needed. If the [...]

Implement Recovery Strategies

2020-07-15T12:09:43+00:00Tags: , , , , , , , , , , , , , , , , , , , , |

Implement Recovery Strategies Recovery strategies are important because they have a big impact on how long the organization will be down or have a degraded environment. Backup Storage Strategies In order to cover all reasonable scenarios, backup storage strategies often involve the following: 1- Secure offsite storage: Store backup media at a remote location. [...]

Understand and Participate in Change Management Processes

2020-07-16T08:15:19+00:00Tags: , , , , , , , , , , |

Understand and Participate in Change Management Processes In this part of this tutorial, we'll take a look at change management processes to help you understand the different aspects of change management processes. System, network, and application always require changes. A system that does not change will become less secure over time, as security updates [...]

Implement and Support Patch and Vulnerability Management

2020-06-24T05:28:17+00:00Tags: , , , , , , , , , , , , , , |

Implement and Support Patch and Vulnerability Management Patch and vulnerability management is the process of regularly assessing, testing, installing and verifying fixes and patches for software bugs and flaws as they are discovered. Some of software bugs and flaws are security vulnerabilities that could permit an attacker to control a target system and at result [...]

Operate and Maintain Detective and Preventative Measures

2020-07-15T12:11:44+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , |

Operate and Maintain Detective and Preventative Measures These days, one of the most important aspects of cyber security is operate and maintain detective and also preventative measures. In this part of this tutorial, we'll take a look at operate and maintain detective and also preventative measures to help you understand the different aspects of [...]

Apply Resource Protection Techniques

2020-07-15T11:46:43+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , |

Apply Resource Protection Techniques One of the important aspects of cyber security is resources protection techniques. In this part of this tutorial, we'll take a look at resources protection techniques to help you understand the different aspects of resources protection.. We will look at some tips for managing media and use asset management for [...]

Go to Top