Ayushi Bhargava has Published 143 Articles

What is Kovter Malware?

Ayushi Bhargava

Ayushi Bhargava

Updated on 04-May-2022 14:00:59

542 Views

Kovter MalwareKovter is a sort of malware that isn't visible and doesn't leave any files on your computer. It's designed to attack Windows computers. It avoids detection by storing its configuration data mostly in the computer's registry, thereby bypassing standard endpoint file inspection. Kovter has also remained robust by morphing ... Read More

What is Network Sniffing? Types, Working, Usage, Tools

Ayushi Bhargava

Ayushi Bhargava

Updated on 04-May-2022 13:58:41

8K+ Views

Sniffing is the technique used to monitor and record all data packets continuously that go through a network. Network/system administrators employ sniffers to monitor and troubleshoot network traffic. Attackers use sniffers to capture data packets carrying sensitive passwords and account information. Sniffers are implemented as hardware or software in the ... Read More

What are the five pillars of NIST Cybersecurity Framework?

Ayushi Bhargava

Ayushi Bhargava

Updated on 04-May-2022 13:53:05

592 Views

National Institute of Standards and Technology (NIST)The National Institute of Standards and Technology's cybersecurity framework is a valuable tool for organizing and improving your cybersecurity program. It's a set of standards and best practices aimed at assisting businesses in establishing and improving their cybersecurity posture. The framework includes a series ... Read More

How Does Non-Repudiation Help in Cyber Security?

Ayushi Bhargava

Ayushi Bhargava

Updated on 04-May-2022 13:49:38

6K+ Views

The certainty that someone cannot dispute the legitimacy of anything is known as non-repudiation. Non-repudiation is a regulatory notion commonly used in cybersecurity and refers to the service that confirms the origin and integrity of data. It assures that no party can deny sending or receiving a communication using encryption ... Read More

What is an Offline Attack? (Types and Working)

Ayushi Bhargava

Ayushi Bhargava

Updated on 04-May-2022 13:46:43

2K+ Views

Offline attacks are executed from a location other than the actual PC where passwords reside or were used. Offline attacks frequently need total access to the PC and duplicate the framework's secret key document onto external media. The programmer then transfers the record to another PC to accomplish the split.Even ... Read More

What is a Passive Attack and How is it different from an Active Attack?

Ayushi Bhargava

Ayushi Bhargava

Updated on 04-May-2022 13:43:14

3K+ Views

A passive network assault is one in which a system is monitored for open ports and vulnerabilities. A passive attack attempts to obtain or use information from the system while inflicting no harm to the system's resources. Passive attacks are characterized by eavesdropping or monitoring transmission. The opponent's goal is ... Read More

Patch Management: Definition, Working, Need, Best Practices

Ayushi Bhargava

Ayushi Bhargava

Updated on 04-May-2022 13:39:45

466 Views

What is Patch Management?Patch management involves analyzing computers, mobile devices, or other network equipment for missing software updates, known as "fixes, " and resolving the issue by delivering such patches as soon as they become available. Patches are pieces of code placed (or patched) into an existing software program's code. ... Read More

What is the importance of Pen Testing in Cyber Security?

Ayushi Bhargava

Ayushi Bhargava

Updated on 04-May-2022 13:36:26

311 Views

A penetration test, also known as a pen test, is a process to analyze the security of an IT infrastructure by exploiting vulnerabilities in a controlled manner. These defects could be found in operating systems, services, and applications, as well as incorrect setups and unsafe end-user behavior. These tests can ... Read More

What is a Polymorphic Virus? (How to Create, Detect, and Prevent)

Ayushi Bhargava

Ayushi Bhargava

Updated on 04-May-2022 13:34:26

2K+ Views

Polymorphic VirusA virus is a program or harmful code that propagates between computers and causes damage to the system. It spreads by copying itself and attaching it to a software file. The viruses merely multiply, show messages, and others may transmit a piece of the dangerous code to a program ... Read More

Who is a Cracker and how is it different from Hacking?

Ayushi Bhargava

Ayushi Bhargava

Updated on 04-May-2022 13:30:24

1K+ Views

What is Cracking?Cracking is the process of breaking into a computer or a network system. A cracker may be cracking for malicious purposes, profit, specific non-profit purposes or causes, or simply as a challenge. Some crackers purposefully break into a network system in order to expose security holes in that ... Read More

Previous 1 ... 4 5 6 7 8 ... 15 Next
Advertisements