Tag: Cybersecurity 101
Total 15 Posts
Fundamentals and Basics of Cyber Security
IntroductionThe term "Trojan" is typically derived from the ancient Greek story of Troy. Trojans work similarly to the wooden horse in the story, introducing something unexpected under a disguise. Trojans are malware disguising themselves as legitimate file to trick the victims into clicking, downloading, or installing the malicious software onto
What is Malware?Malware, or malicious software, refers to any program or code that infects a computer and causes damage to it. Malware is malicious software that targets and seeks to damage, disable, or destroy computers, computer networks, tablets, and mobile devices, often by taking control of a device's operations.
ScenarioAn organization was hacked using the SQL injection and database access through its website. After penetrating the network and machine, the attacker created an account named “daemon” and then escalated the privileges to obtain more control of the network. Then the attacker injected a malware file called “hackit.exe” into
What is Botnet?The bot is a piece of malware that executes commands under the control of a remote attacker by infecting a computer system. The botnet is a network of malware-infected computers controlled by the bot herder. A botherder manages the botnet infrastructure and uses compromised computers to crack
What is Zero Trust?Zero trust is a perimeter-less security model focused on designing effective and efficient security architectures. In enterprise security, the zero trust principle states that anyone inside or outside the network cannot be trusted unless they are identified appropriately. The zero trust philosophy assumes that threats both