
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
All network analyzers/sniffers have the ability to capture data from network. But most of them only do some simple statistics then throw pages of numbers to the users. Especially in a big network with heavy traffic, network administrators have to figure out a network problem even a simple one.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Access control lists (ACLs) are used by many different features. When applied to interfaces or globally as access rules, they permit or deny traffic that flows through the appliance. For other features, the ACL selects the traffic to which the feature will apply, performing a matching service rather than a control service.
Access control lists (ACLs) identify traffic flows by one or more characteristics, including source and destination IP address, IP protocol, ports, EtherType, and other parameters, depending on the type of ACL.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Here I have shared with you a post that will give a bird's eye view of the key activities performed by Security Analysis.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
A cyber security risk assessment is the process of identifying, analysing and evaluating risk. It helps to ensure that the cyber security controls you choose are appropriate to the risks your organisation faces.
Risk assessment is a process that includes:

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
It is the next generation of WiFi security
Protecting Wi-Fi from hackers is one of the most important tasks in cybersecurity. Which is why the arrival of next-generation wireless security protocol WPA3 deserves your attention.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
There are many types of cyber attacks. The most common are as follows:

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The best method for ensuring your enterprise web apps are secure is to build them with security architecture in mind. And the best way to do that is to cultivate a development security operations (DevSecOps) culture.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
An advanced persistent threat (APT) is a broad term used to describe an attack campaign in which an intruder, or team of intruders, establishes an illicit, long-term presence on a network in order to mine highly sensitive data.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Data encryption is what happens when you take the text or data you use and convert it to a code (also called “ciphertext”) that can’t be understood by those who do not have the correct key. For the data to be useable, it must be changed back or decrypted.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
If you have been following banking, investing, or cryptocurrency over the last ten years, you may be familiar with “blockchain,” the record-keeping technology behind the Bitcoin network.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Packet filtering is a firewall technique used to control network access by monitoring outgoing and incoming packets and allowing them to pass or halt based on the source and destination Internet Protocol (IP) addresses, protocols and ports.
- IBM Security MDR + X-Force Incident Response + Threat Intelligence = Powerful Threat Defense
- Why Adaptive Authentication is the Next Big Thing!
- Inventory and Control of Hardware Assets
- Some of Best Practices to Mitigate Web Security Vulnerabilities
- What is Required to Become a Vulnerability Assessor?
- Top 10 most common database security vulnerabilities
- 2-Most Critical Functions of An SOC
- Situational Awareness in Cybersecurity
- Layered Cybersecurity is must for prevention of attacks
- Bluetooth Security: What should you know to keep yourself SAFE?