Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Cyber Security Articles
Page 31 of 53
What is Executive Order 14028 on Improving National Cybersecurity?
Executive Order 14028 (EO), Improving the Nation's Cybersecurity, issued by Joe Biden on May 12, 2021, directs several agencies to improve cybersecurity through various software and data security and integrity measures. Several high-profile information security and ransomware assaults in 2020/21 triggered the order, including the SolarWinds hack, MS Exchange server vulnerabilities, and the Pulse Connect Secure attack that targeted both public and private sectors.Cybersecurity and Infrastructure Security Agency (CISA) issued guidelines about the country's security framework as a result of these assaults. This is a large policy document with 74 executable directives that span 15 pages. There are 45 directives ...
Read MoreWhat are Autorun Worms? (How Do They Spread, How to Remove, How to Prevent)
Autorun Worms, which are commonly disseminated via USB devices, are a "surprise attack" that uses the Windows Auto-Run feature (autorun.inf) to execute malicious code without user knowledge when an infected device is connected to a computer. Many variants of this exploit make use of Windows' Autoplay features.Usually, the danger is in the form of removable media. If an unproven media item is presented and immediately runs, there is a danger of infection.Many modern operating systems disable Auto-Run by default, lowering the risk of this type of worm. Just in case, make sure you have strong endpoint security in place so ...
Read MoreWhat is Harpooning? (How it Works, How to Prevent)
Harpooning is the act of a hacker gathering information from social media sites in order to mimic executives and target employees in their company for the purpose of obtaining sensitive personal data. The security specialists from Mimecast had polled hundreds of IT professionals and determined that a new wave of "whaling" − a type of phishing assault that especially targets C to top-level executives − had impacted firms.Difference between Phishing and CyberwhalingThe difference between phishing and cyberwhaling is almost identical to the difference between real-world fishing and whaling: A "harpoon" instead of a fishnet, targets an enormous target instead of ...
Read MoreWhat is HTTP Flooding? (Process, Types, How to Detect and Defend)
What is HTTP Flooding?HTTP flood is a sort of Distributed Denial of Service (DDoS) attack in which an attacker attacks a web server or application using seemingly valid HTTP GET or POST requests.HTTP flood assaults are volumetric attacks that frequently employ a botnet "zombie army"—a collection of Internet-connected computers that have been maliciously taken over, usually with the help of malware such as Trojan Horses.HTTP floods are a sophisticated Layer 7 assault that does not involve corrupted packets, spoofing, or reflection techniques and requires less bandwidth to bring down the targeted site or server than other attacks. As a result, ...
Read MoreWhat is Defense-in-Depth? (Process, Significance, Use Cases, Security Products Used)
What is Defense-in-Depth?The act of deploying several security methods to defend the integrity of information is known as defense in Depth. For the entirety of a system's life cycle, this strategy addresses weaknesses in technology, humans, and operations.The employment of several layers of defense throughout an information system is what this is all about. The outermost levels of a multi-layered defense system are the first line of protection and function well against the tiniest and most common attacks. More powerful and unorthodox attacks will get beyond the first few layers, but the deeper, more focused layers will stop them. The ...
Read MoreWhat is Pharming Attack? (Process, How to Prevent)
Pharming is a new type of cyberattack that is as difficult to detect as it is to put up. But what is the definition of a pharming attack? It's a method for hackers to gain access to large quantities of data by sending people to flawed clones of legitimate websites.If you look attentively, you'll see that "pharming" contains two words: "phishing" and "farming." The attacker phishes the victim and then farms their information. This allows them to recover any information that visitors unwittingly provide. Attacks that previously controlled the internet have become obsolete as the world of cybersecurity has evolved. ...
Read MoreTwo-Factor Authentication: What is, How It Works, Significance
The majority of people nowadays utilise the internet on a regular basis. It has transformed communications, business, and everyday duties, to mention a few. While the Internet has practically revolutionised the world, it has not come without a cost. We expose ourselves to identity theft, fraud, data breaches, hackers, and a world that was once unimaginable now threatens our everyday operations.The significance of online safety cannot be overstated. Vigilance and security are essential for keeping yourself, your information, and others safe. You put yourself at risk of being a victim of fraud, theft, and even property damage if you don't ...
Read MoreSingle-Sign ON (SSO): How Does It Work, How to Implement, Advantages
What is Single Sign-On?SSO is a system that merges several application login windows into a single screen. To access all of their SaaS services, a user just has to input their login credentials once on a single page using SSO.SSO is widely used in a corporate context where user applications are allocated and managed by an internal IT team. Remote employees that use SaaS services benefit from SSO as well.Consider what would happen if customers who had previously been admitted to a bar were required to present their identity card each time they sought to purchase further alcoholic beverages. Some ...
Read MoreWhat is Data Skewing? (Symptoms, How to Prevent)
What is Data Skewing?In a skewing attack, attackers attempt to fabricate (or skew) data in order to influence an organization's decision in their favor. Skewing assaults may be divided into two types −Machine Learning Data Poisoning Attacks − It occurs when an attacker alters the training data used by a machine learning algorithm, causing it to make a mistake.Web Analytics Skewing − Attackers manipulate analytics data from systems such as Google Analytics or Adobe Analytics by deploying bots to make a huge number of automated queries. The goal is to make it appear like visitors to a website complete particular ...
Read MoreWhat is Cybersecurity Business Continuity Planning (BCP)?
Cybersecurity is an important part of a company's Business Continuity Plan (BCP), and policies and procedures pertaining to key technology and sensitive data protection must be considered.The process of developing preventative and recovery measures to cope with possible cyber threats to a company or to assure process continuity in the aftermath of a cyberattack is known as business continuity planning (BCP).In business continuity planning, it's critical to incorporate guidelines for recognizing, controlling, and decreasing cyber threats.The secondary purpose of BCP is to maintain operational continuity before and throughout catastrophe recovery. This facilitates cross-departmental coordination and ensures that companies have a ...
Read More