
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
So why is it important to monitor networks? The network is the life line of the IT infrastructure. When networks fail, the flow of information required by applications and business operations stop.
Networks are dynamic environments. Network Admins are continually asked to add new users, technologies and applications to their networks. These changes can impact their ability to deliver consistent, predictable network performance.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Organizations conduct penetration testing to locate network vulnerabilities and to prevent attacks that can cause system downtime, data loss, and damaged reputations. While other measures exist, conducting penetration testing is a vital part of any effective, holistic security strategy. It’s the best way to determine system vulnerabilities that can then be remediated to prevent hackers from accessing mission-critical systems.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Elasticsearch is a distributed, open source search and analytics engine for all types of data, including textual, numerical, geospatial, structured, and unstructured.
Elasticsearch is built on Apache Lucene and was first released in 2010 by Elasticsearch N.V. (now known as Elastic). It is known for its simple REST APIs, distributed nature, speed, and scalability.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
But it is not what your eyes are seeing…
I am sure that you would remember that a hash function takes an entry, for example, a number, phrase, file or password and calculates a sequence from it, usually represented in hexadecimal format.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Evil Twin Attack is attack is frequently carried upon wireless access points with malicious intentions.
This attack happens when attackers exploits a fundamental issue with Wi-Fi, i.e., our Laptops, smartphones, and connected devices aren't equipped to distinguish between two radios broadcasting the same SSID name. This allows hackers to use malicious access points (APs) that eavesdrop on traffic, establish "man-in-the-middle" (MitM) positions, and extract sensitive information, often without leaving any traces behind.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
In 2019 alone, over $124 billion was spent on cybersecurity. In spite of this, however, many security teams are still struggling to keep up. Their challenges include having too many consoles to monitor, alert overload, a reliance on manual processes, and a shortage of cybersecurity personnel.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Though people may call it Vulnerability Scanning, but it for more than scanning. Because it must account for full-fledged 'assessment' of vulnerabilities in itself.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Pivoting refers to the distinctive practice of using an instance, which is also called a ‘foothold’ or plant to make it possible for you to move around within the compromised network. This process involves accessing networks that you would normally not have access to by exploiting compromised computers.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Access attacks require some sort of intrusion capability. These can consist of anything as simple as gaining an account holder’s credentials to plugging foreign hardware directly into the network infrastructure. They usually happen when Reconnaissance Attacks have already performed by the hacker/attacker.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Cryptography is the science of writing in secret code and is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used nonstandard hieroglyphs in an inscription. Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to wartime battle plans.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
SSH (Secure Shell) keys are an access credential that is used in the SSH protocol.
Today, the SSH protocol is widely used to login remotely from one system into another, and its strong encryption makes it ideal to carry out tasks such as issuing remote commands and remotely managing network infrastructure and other vital system components.
- What is Network Traffic Analysis (NTA)? How does NTA improve your Security?
- What is the Server-side request forgery (SSRF)?
- What are the Security Architect Skills
- What is the Most Overlooked Attack Vector?
- Firewalls - Advantages & Disadvantages
- Containerization vs. Virtualization
- The Evolution of DDos Reflectioin Amplificatioin Vectors - A Chronology
- 6 Stages of a Pen Testing Program
- What is Sandboxing? What are the Common Sandbox-evading Techniques? What can you do about them?
- What is Reverse Engineering of A Malware? What are Techniques and Tools?