logo
logo
Sign in
WikiSoc
Followers 1 Following 0
WikiSoc 2021-02-15
img

What is Hacking?Hacking is the activity of identifying weaknesses in a computer system or a network to exploit security and gain access to personal or business data.

An example of hacking can be: using a password cracking algorithm to gain access to a computer system.Computers have become a must for running successful businesses.

It is not enough to have isolated computer systems; they need to be networked to facilitate communication with external companies.

This exposes them to the outside world and piracy.

System hacking means using computers to commit fraudulent acts such as fraud, invasion of privacy, theft of corporate/personal data, etc.

Cybercrime costs many organizations millions of dollars each year.

collect
0
WikiSoc 2021-02-15
img

The Cyber Kill Chain was developed by Lockheed Martin as a framework to help organizations understand the cyber attack process.By understanding each point in the chain of events of a cyber attack, you can focus your efforts on breaking that chain and mitigating the damage.Many organizations have adopted their own approach to defining the correct Cyber Kill Chain, with varying degrees of success.

For the purposes of this article, we will focus on the original 7-step Cyber-Kill Chain developed by Lockheed Martin.

We will go over each step of the chain that it involves and how the chain is broken to better protect your data.How Cyber Kill Chain works in 7 stepsEach stage of the Cyber Kill Chain is related to a certain type of threat, both external and internal.

For the most part, whatever threat you face (from malware, phishing, insider threats, and more), you are likely to fall for one or more of the activities in the removal chain.

collect
0
WikiSoc 2021-02-14
img

Slow computerThe most common symptom of a malware infection is a slow-running computer.

Are your operating systems and programs taking a while to startup?

Is your data bandwidth suspiciously slow?

If so, your computer may have a virus.However, before immediately assuming that your computer has a virus, you should check for other causes for your computer to slow down.

Check to see if you are running out of RAM.

For Windows, open task manager (Ctrl + Shift + Esc) and go to the Performance tab, and check how many gigabytes of RAM you are using in the Memory section.

collect
0
WikiSoc 2021-02-14
img

 SSL certificates are small data files that digitally link a cryptographic key to the details of an organization.

When installed on a web server, it enables the padlock and the HTTPS protocol and allows secure connections from a web server to a browser.

Typically SSL is used to protect credit card transactions, data transfers, and logins, and more recently it is becoming the norm to protect browsing of social media sites.SSL certificates bind:A domain name, server name, or hostname.An organizational identity (that is, the name of the company) and a location.Note: As of August 2020, most browsers will no longer display the green lock and address bar to indicate Extended Validation.An organization needs to install the SSL certificate on its webserver to start a secure session with browsers.

Once a secure connection is established, all web traffic between the web server and the web browser will be secure.When a certificate is successfully installed on your server, the application protocol (also known as HTTP) will change to HTTPS, where the "S" stands for "secure.

collect
0
WikiSoc 2021-02-15
img

What is Hacking?Hacking is the activity of identifying weaknesses in a computer system or a network to exploit security and gain access to personal or business data.

An example of hacking can be: using a password cracking algorithm to gain access to a computer system.Computers have become a must for running successful businesses.

It is not enough to have isolated computer systems; they need to be networked to facilitate communication with external companies.

This exposes them to the outside world and piracy.

System hacking means using computers to commit fraudulent acts such as fraud, invasion of privacy, theft of corporate/personal data, etc.

Cybercrime costs many organizations millions of dollars each year.

WikiSoc 2021-02-14
img

Slow computerThe most common symptom of a malware infection is a slow-running computer.

Are your operating systems and programs taking a while to startup?

Is your data bandwidth suspiciously slow?

If so, your computer may have a virus.However, before immediately assuming that your computer has a virus, you should check for other causes for your computer to slow down.

Check to see if you are running out of RAM.

For Windows, open task manager (Ctrl + Shift + Esc) and go to the Performance tab, and check how many gigabytes of RAM you are using in the Memory section.

WikiSoc 2021-02-15
img

The Cyber Kill Chain was developed by Lockheed Martin as a framework to help organizations understand the cyber attack process.By understanding each point in the chain of events of a cyber attack, you can focus your efforts on breaking that chain and mitigating the damage.Many organizations have adopted their own approach to defining the correct Cyber Kill Chain, with varying degrees of success.

For the purposes of this article, we will focus on the original 7-step Cyber-Kill Chain developed by Lockheed Martin.

We will go over each step of the chain that it involves and how the chain is broken to better protect your data.How Cyber Kill Chain works in 7 stepsEach stage of the Cyber Kill Chain is related to a certain type of threat, both external and internal.

For the most part, whatever threat you face (from malware, phishing, insider threats, and more), you are likely to fall for one or more of the activities in the removal chain.

WikiSoc 2021-02-14
img

 SSL certificates are small data files that digitally link a cryptographic key to the details of an organization.

When installed on a web server, it enables the padlock and the HTTPS protocol and allows secure connections from a web server to a browser.

Typically SSL is used to protect credit card transactions, data transfers, and logins, and more recently it is becoming the norm to protect browsing of social media sites.SSL certificates bind:A domain name, server name, or hostname.An organizational identity (that is, the name of the company) and a location.Note: As of August 2020, most browsers will no longer display the green lock and address bar to indicate Extended Validation.An organization needs to install the SSL certificate on its webserver to start a secure session with browsers.

Once a secure connection is established, all web traffic between the web server and the web browser will be secure.When a certificate is successfully installed on your server, the application protocol (also known as HTTP) will change to HTTPS, where the "S" stands for "secure.