
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Zero Trust security model considers each access request as a breach and verifies it as it came from an open network. Irrespective of where the request comes from or what assets it accesses, every access request is thoroughly authenticated, authorized, and scrutinized for anomalies before granting permission.It applies the least privileged access principles to reduce the threat landscape.
Read more: What Is Zero Trust Security? How Can You Build Zero Trust in Your Organization?

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
No doubt cyber security is a term you're quite familiar with, especially given the recent WannaCry ransomware attack that swept the internet in May 2017.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
There are multiple stages for launching a targeted cyber attack. Every stage is critical for ensuring the success of targeted attack.
The stages are briefly discussed as follows:

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The Nmap option -sn disables port scanning, leaving the discovery phase enabled, which makes Nmap perform a ping sweep. Depending on the privileges, Nmap by default uses different techniques to achieve this task:

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
ACLs are typically configured in firewalls, but they also can be configured in network infrastructure devices such as routers, switches, wireless access controllers (WLCs), and others.
Read more: What is an Access Control Entry (ACE)? What Information Do They Contain?

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The risk management framework is a six-step process created to engineer the best possible data security processes for institutions. The framework also helps in formulating the best practices and procedures for the company for risk management.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Splunk Enterprise Security is the nerve center of the security ecosystem, giving teams the insight to quickly detect and respond to internal and external attacks, simplify threat management minimizing risk.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
NetFlow is a network protocol developed by Cisco for collecting IP traffic information and monitoring network flow. By analyzing NetFlow data, you can get a picture of network traffic flow and volume. NetFlow data can provide valuable data about network traffic and utilization.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Confidentiality between two communicating nodes is achieved by using an appropriate encryption scheme: data is encrypted at the sending node and decrypted at the receiving node.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
There are many types of Authentication, but I am going to explain the 5 most common Authentication types in detail...

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Threat intelligence is data that is collected, processed, and analyzed to understand a threat actor’s motives, targets, and attack behaviors. Threat intelligence enables us to make faster, more informed, data-backed security decisions and change their behavior from reactive to proactive in the fight against threat actors.
- Let's Seriously Consider NOW! BYOD - 7 Big Challanges
- 4-Building Blocks of a Good Firewall System. 7 Important Facts to Remember when you design Firewall System
- Firewall Technology Explained. How do Firewalls Work?
- Advanced Persistent Threats (APTs) - A Short Lecture
- 14 Components of Network Security
- What is Smurf Attack? How to Prevent these?
- 4 Types of Access Control Models
- What is Enterprise Risk Management? Why is it Important for Cybersecurity Professionals?
- SNORT: FREE Intrusion Detection Software
- Why Should You Monitor A Network 24x7 ? What are TOP-21 FREE Network Monitor Tools?