Authentication is the process of validating and verifying the identity of a user or system trying to access a system or service before granting access. Authentication comes after the Identification process. Authentication can be done with the following ways What you know is where a user is authenticated with what they know like passwords, passphrase,…
Identification
Identification is the process of identifying a person or system in a realm (domain, organization, enterprise). The identification is the initial process before authenticating. Every user and system in a realm should have a unique identification, so that they can be authenticated & authorized for granting access and accounted for their actions.
Computing Clock Cycle
A clock cycle also known as machine cycle is the fundamental unit of time in a computer’s CPU. The clock cycle is driven by an internal clock signal within the central processing unit (CPU). The clock cycle is measured in Hertz (Hz). The following are the operations that are performed in a clock cycle. Fetching…
Instruction Set
An Instruction Set also known as Instruction set architecture (ISA) is the abstract model present in a computing machine that gives the instruction to the CPU present in a computer machine. The computing machine performs the required operations. The Operating System and Applications communicates to the computing hardware to perform an action through the Instruction…
MITRE ATT&CK
MITRE ATT&CK® is a knowledge base of adversary tactics and techniques based on real world observations published by MITRE. This knowledge base can be used as the foundation for understanding the Cyber Attack patterns. The MITRE Attack Matrices covers the following categories The MITRE Attack chain has 14 Tactics that will be executed in order by…
Buffer Overflow
Buffer Overflow is a vulnerability in software due to improper boundary checks, where an attacker exploits the target system by writing overwhelming data to the software memory buffer to overflow the buffer’s capacity and then making the malicious data to be written in the adjacent memory location giving un-authorized access. There are two types of…
Threads
A Process is broken down into multiple threads. A program becomes a process when it’s loaded into the memory and each process has it’s own address space. A process is sub divided into multiple threads and each thread uses the allocated address space given to it’s parent process for execution enabling to run multiple threads…
Password Hacking
Password Hacking is the process of breaking or cracking and obtaining passwords stored in the target system or when being transmitted between systems. The obtained passwords are used to access accounts on the target system to gain access and privilege access. Password Cracking, Password Breaking, Password Attack are other terms used for Password Hacking. The…
Process
A process is an instance of program being executed in the CPU. Application Software is collection of multiple programs. When we run an application, the programs are loaded in the CPU as sequential processes with an address space. This creates a kind virtual CPU for each process. The CPU loads multiple processes and keeps multiplexing…
Tactics, Techniques and Procedures (TTPs)
Tactics, Techniques and Procedures (TTPs) are the attributes that depicts the patterns and behavior of a cyber security attack. It helps cyber security professionals to understand how threat actors perform attacks on a target. A cyber security attack is done in multiple stages across a period of time which can some days or months. The…