
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Here IP stands for 'Internet Protocol and 'Sec' for secure. The Internet Protocol is the main routing protocol used on the Internet and it designates where data will go using IP addresses. IPSec is secure because it adds encryption and authentication to this process.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
This post is intended to brief you with top known vulnerabilities that exists in systems, particularly in Web Applications.
OWASP or Open Web Application Security Project is a worldwide not-for-profit charitable organization which is focused on improving the security of software. It regularly publishes top security holes across applications and suggestions on fixing the same.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Virtualized security, or security virtualization, refers to security solutions that are software-based and designed to work within a virtualized IT environment. They are different from traditional, hardware-based network security, which is static and runs on devices such as traditional firewalls, routers, and switches.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The CIA Triad of confidentiality, integrity and availability is considered the core underpinning of information security. Every security control and every security vulnerability can be viewed in light of one or more of these key concepts. For a security program to be considered comprehensive and complete, it must adequately address the entire CIA Triad.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Brute force attacks occur when a bad actor attempts a large amount of 'user name and password' combinations on a target. These attacks frequently involve multiple attempts on account passwords with the hopes that one of them will be valid. It’s a bit like trying all of the possible combinations on a padlock, but on a much larger scale.
Passwords are not the only resource that can be brute forced: Links and directories, usernames, and emails are other common targets.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Packet Capture or PCAP (also known as libpcap) is an application programming interface (API) that captures live network packet data from OSI model Layers 2-7.
Unix-like systems implement pcap in the libpcap library; for Windows, there is a port of libpcap named WinPcap that is no longer supported or developed, and a port named Npcap for Windows 7 and later that is still supported.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Both SSL (Secure Socket Layer) and TLS (Transport Layer Security) are the foundations of a secure connection for communication across an unsecured network. At present, over 90% of internet traffic across Google is being encrypted, according to the Google Transparency Report.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Security Onion is a free and open source alternative to expensive enterprise security solutions!
Security Onion can be described as a Network Security Monitoring (NSM) platform that “provides context, intelligence and situational awareness of your network.”

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
As the name implies, volume-based DDoS attacks depend on the volume of inbound traffic. The goal of this type of attack is to overload the website’s bandwidth or cause CPU or IOPS usage issues.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
VPN stands for virtual private network. The network part, well, that's easy. It's basically a bunch of computers that share various resources. Private? That one's pretty self-explanatory. The "virtual" bit is where things get a little more complicated.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Input validation is the first step of checking the type and content of data supplied by a user or application.
For web applications, input validation means verifying user inputs provided in web forms, query parameters, uploads, and so on.
- Who is a Vulnerability Assessment Analyst? What are his Typical Work Duties?
- Mapping the OWASP Top 10 to Blockchain
- What is Principle of Least Privilege? Why is this Principle So Important?
- What is UEFI Secure Boot? Beware of TRICKBOOT
- An Integrated Strategy to Protect and Defend Your Enterprise
- What is Red Teaming?
- What are Digital Certificates? How does the Creation of a Digital Certificate Happen?
- Cybersecurity Frameworks - What are the Most Popular Cybersecurity Frameworks?
- How does an APT Attack happen Actually? An Example of APT Attack in Action
- If a Major Incident Happens, What Should You Do?