Social Engineering

Social engineering are a broad range of malicious attacks accomplished through human interaction. How to identify social engineering techniques. Anywhere there is human interaction there is potential for social engineering. The most common techniques used are: Baiting: This form attack uses the victims naivety by presenting them with lure such as a flash drive withContinue reading “Social Engineering”

Multi-Factor Authentication

What is Multi-Factor Authentication? Multi-factor authentication is a security method requiring a multiple layers of authentication for an individual to gain access to a system. Typically when you log-on to a network or service you enter your login credentials such as a username and a password. That would be considered the first layer. A multi-factorContinue reading “Multi-Factor Authentication”

Next-generation Firewalls

What is a next-generation firewall? “A next-generation firewall provides capabilities beyond that of a stateful network firewall” Next-generation firewalls have a “deep-packet inspection firewall that moves beyond port/protocol inspection and blocking to add application-level inspection, intrusion prevention, and bringing intelligence from outside the firewall.” A next-generation firewall must include: Standard firewall capabilities like stateful inspectionContinue reading “Next-generation Firewalls”

System Hardening

What is system hardening? System hardening can be defined as a collection of techniques to reduce vulnerability in technology applications, systems, infrastructure, firmware, and operating systems. The goal of systems hardening is to reduce security risk by eliminating potential attack vectors and condensing the system’s attack surface. Cyber Security professionals and organization come up withContinue reading “System Hardening”