Find other uncategorised articles here:
Pi + IDS = Security Monitoring
An effective security monitoring system using a Pi. Similar concept applies for any sized organisation with better hardware and more complex network, so scale as you wish.
Designing a Malware Lab
This article will outline how I have designed an isolated network / lab for malware analysis. You will find the following sections in this article:
Malware Analysis - Overview (Part 1)
This article is part of the malware analysis series. This document will take a look at the basics and fundamental understanding of malware for analysis. Here is what you can expect from each part:
The Caeser Cipher
This article will be outlining what the Caeser Cipher is and how to encrypt/decrypt using the Caeser Cipher tool from Github.
TLS / SSL Handshake
TLS is an encryption protocol designed to secure Internet commonunications. As for any TCP communication, there is a handshake. The TLS handshake is the process which initiates the communication sessions with TLS encryption.
VPN Concepts and Protocols
Virtual Private Networks (VPNs) are commonly used to remotely and securely connect to a network. A private network is created over the internet in order to connect hosts. Security is accomplished by creating a cryptographic tunnel.
Honeypots - Intrusion Detection Concepts
Creating an intentionally vulnerable system to attract adversaries is called a honeypot. As the name suggests, system administrators create an enticing item, such as a valuable server or even an entire subnetwork, to focus the attacker on the honey pot rather than the rest of the system....
Intrusion Detection Systems - Concepts and Examples
There are six basic approaches to intrusion-detection and prevention. Some of these methods are implemented in various software packages, and others are simply strategies that an organisation can employ to decrease the likelihood of a successful intrusion.
Types of System Firewalls
Several types of firewalls offer their advantages and disadvantages. As a system administrator, it’s vital to understand each of the firewalls and their benefits.
Security professionals have specific terminology. These terms must be familiar with security or network professionals. Although most hacking terminology describes the activity or the person performing it (phreaking, sneaker, etc.). This article will discuss some of the basic security terminologies found in the cybersecurity industry.
Network Security Approaches
There are several ways an organisation can approach network security. A particular approach / paradigm will influence all subsequent security decisions and set the tone for the entire organisation’s network security infrastructure.
Socket Programming with Python (TCP and UDP)
This article will be explaining and demonstrating simple socket programming used to connect 2 application layer programs over a network. A network socket is essentially an internal endpoint for sending or receiving data within a node on a computer network.
A network is a collection of computers, servers, mainframes, network devices, peripherals, or other devices connected in order to allow for communication or the sharing of data. An example of a network is the internet which connects millions of devices across the world.
Analysing Windows Logs
Analysing log files is extremely common when working in cybersecurity. Keeping and managing secure systems means you will have to deal with log files. This article will be discussing the use of a script that I have created as a university assignment.