Category

Certified Ethical Hacker
Footprinting Footprinting is a part of reconnaissance process which is used for gathering possible information about a target computer system or network. When used in the computer security lexicon, “Footprinting” generally refers to one of the pre-attack phases; tasks performed before doing the actual attack. Some of the tools used for Footprinting are Sam Spade, nslookup,...
Read More
Fundamental Security Concepts The whole principle is to avoid Theft, Tampering and Disruption of the systems through CIA Triad (Confidentiality, Integrity and Availability). Confidentiality Keeping systems and data from being accessed, seen, read to anyone who is not authorized to do so. Information is accessible only to the autorized personnel. Integrity TRUSTWORTHINESS OF DATA OR RESOUCES: Protect the data from modification...
Read More