Cyber Security

Scanning Networks

Scanning networks 1. Scanning networks overview Process of obtaining additional information about hosts, ports and services in network More detailed reconnaissance Purpose is to identify vulnerabilities in communication channels and then create an attack plan. Different techniques are used to identify hosts, ports, and services in the target network. Used by administrators to verify security …

Scanning Networks Read More »

Footprinting

Footprinting 1. Footprinting overview Also known as fingerprinting or reconnaissance 📝 Gathering information about a target system E.g. software, network protocols, operating systems or hardware devices. End goal is to find a way to break into the system. 🤗 Often offered as separate service bought by companies to check against leaks and to see what data is there. …

Footprinting Read More »

Cyber Security – Introduction Part 1

Information security 1. Information security overview Protecting information and information systems. Defines sets processes and activities performed in order to protect information. Goal is to prevent unauthorized users from stealing and misusing information or services. If sensitive information falls in wrong hands, it may cause huge losses including finances, brand reputations, customers. Essential terms Hack value …

Cyber Security – Introduction Part 1 Read More »

Tech Amplifier Final Logo