Virtualization is the process of creating virtual software-based computing resources from the underlying physical hardware. Virtualization creates an abstraction layer over computer hardware. It divides s single physical system into multiple virtual machines having their computing resources such as processors, memory, networks and storage. Each VM will have its own operating system (OS). History of Virtualization Virtualization emerged…
Category: Cyber Security Fundamentals
ITU
ITU (International Telecommunication Union) is a special agency of United Nations that is responsible for governing matters related to Information and Communication Technologies (ICT). It was established in 1865 to support and help governing Telegraphic Networks globally. ITU has member states across the globe. Each country manages the radio spectrum within their country. The management…
Tactics, Techniques and Procedures (TTPs)
Tactics, Techniques and Procedures (TTPs) are the attributes that depicts the patterns and behavior of a cyber security attack. It helps cyber security professionals to understand how threat actors perform attacks on a target. A cyber security attack is done in multiple stages across a period of time which can some days or months. The…
Cyber Kill Chain
The Cyber Kill Chain framework developed by Lockheed Martin explains attacker’s progressive steps when attacking a target which can be used to identify and prevent cyber threat. The Cyber Kill Chain has seven stages as following: Reconnaissance This is the initial phase, where the attacker gather’s information about the target. Scanning, Foot printing and Enumeration is…
VPN
Virtual Private Network (VPN) is process of creating a virtual tunnel over a shared network that can be accessed by anyone. The virtual tunnel provides protection for the data being sent over the shared network. The data should be protected for it’s confidentiality and integrity. A virtual tunnel can provide protection of confidentiality or integrity…
Adversary
The attacker who is performing the cyber attack on the target with a motive.