application

Introduction-to-TCP-and-UDP

Introduction to TCP and UDP

Introduction to TCP and UDP in the OSI transport layer (Layer 4) defines several functions, the most important of which are error recovery and flow control. Likewise, the TCP/IP transport layer protocols also implement these same sorts of features. Note that both the OSI model and the TCP/IP model call this layer the transport layer. But as was common , when pertaining to the TCP/IP model, the layer name and number are supported OSI, so …

Introduction to TCP and UDP Read More »

ISO-27001-Annex-A.9.4.4-Use-of-Privileged-Utility-Programs

ISO 27001 Annex : A.9.4.4 Use of Privileged Utility Programs & A.9.4.5 Access Control to Program Source Code

In this article ISO 27001 Annex : A.9.4.4 Use of Privileged Utility Programs & A.9.4.5 Access Control to Program Source Code this two topics are explain. A.9.4.4 Use of Privileged Utility Programs Control- The use of utility programs that could bypass system and application controls should be limited and tightly controlled. Implementation Guidance- The following guidelines should be taken into account when using utility programs that could override system and application controls: the use of …

ISO 27001 Annex : A.9.4.4 Use of Privileged Utility Programs & A.9.4.5 Access Control to Program Source Code Read More »

Services Related Elastic Compute Cloud (EC2)

Services Related Elastic Compute Cloud (EC2)

Services Related Elastic Compute Cloud (EC2) in this article you will learn different types of EC2 Services like AWS Systems Manager, Placement Groups, AWS Elastic Beanstalk and Amazon Elastic Container Service and AWS Far gate etc. EC2-Related Services This section will briefly introduce you to a few more EC2 features. Some of these features won’t necessarily play a large role in the solutions architect exam but could definitely come in handy for you in your …

Services Related Elastic Compute Cloud (EC2) Read More »

Introduction to Cloud Computing and AWS

You will learn into this regarding cloud computing and their six advantages as well as Introduction to Cloud Computing and AWS types of cloud computing in detail . What is Cloud Computing? Cloud computing is that the on-demand delivery of compute power, database storage, applications, and other IT resources through a cloud services platform via the web with pay-as-you-go pricing. Whether you’re running applications that share photos to many mobile users or you’re supporting the …

Introduction to Cloud Computing and AWS Read More »

Web-Server-Security-Tools

Web Server Security Tools

This section describes common web server security tools that keep an internet server secure from possible attacks, These tools scan for vulnerabilities during a target server and web applications, send alerts on hacking attempts, scan for malware within the web server, and perform more security assessment activities. Web server security is the protection of information assets that can be accessed from a Web server. Web server security is important for any organization that has a physical or virtual Web server connected to the Internet. Web site security logs should be audited on a …

Web Server Security Tools Read More »

OWASP-high-TEN

OWASP high TEN web application security risks

The OWASP high ten maybe a regularly-updated report outlining security considerations for internet application security, specializing in the ten most important risks. The report is put together by a team of security specialists from everywhere the globe. OWASP refers to the highest ten as an ‘awareness document’ and that they suggest that every one companies incorporate the report into their processes so as reduce and/or mitigate security risks. Related Product : Certified Ethical Hacker | CEH …

OWASP high TEN web application security risks Read More »

Information-Security-of-Threat

Information Security of Threat

Information Security of Threat and a vulnerability are not one and also the same. Security of Threat may be a person or event that has the potential for impacting a valuable resource in a very negative manner. A vulnerability is that quality of a resource or its environment that enables the threat to be complete. AN armed robber is AN example of a threat. A bank teller is AN example of a valuable resource which …

Information Security of Threat Read More »

what-is-foot printing?

What is the Foot-printing?

Foot-printing Foot-printing collect the archived and keep info concerning the target using search engines, social networking sites, and so on. Footprinting is the method of making an idea or map of an organization’s network and systems. information gathering is additionally referred to as footprinting an organization. Footprinting starts by defining the target system, application, or physical location of the target. Once this information is understood , specific information about the organization is gathered using nonintrusive …

What is the Foot-printing? Read More »

Top-10-Most-Common-Types-of-Cyber-Attacks

Top 10 Most Common Types of Cyber Attacks

Top 10 Most Common Types of Cyber Attacks has various categories of information security threats, such as network threats, host threats, and application threats, and various attack vectors, such as viruses, worms, botnets, that might affect an organization’s information security. This section introduces you to the motives, goals, and objectives of information security Cyber Attacks, top information security attack vectors, information security threat categories, and the types of Cyber Attacks on a system Below is …

Top 10 Most Common Types of Cyber Attacks Read More »