Firewall is nothing but a dedicated software or a hardware or sometimes the combination of both, which inspects network traffic passing through it and denies or permits passage based on...
Threat management: Threat management is the practice of using a combination of early detection systems such as intrusion detection systems , security information and event management systems, etc.—and security tools...
Vulnerability Testing:- Vulnerability Assessment is also known as Vulnerability Testing, is a software testing type performed to evaluate the security risks in the software system in order to reduce the...
Vulnerability Management- Vulnerability Scanning Vulnerability management is the process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and the software that runs on them. Security vulnerabilities, in...
Social Media Countermeasures: Countermeasures reduce the vulnerabilities in a system. In this section, we present these countermeasures grouped into the following main categories: platform countermeasures and user countermeasures. The former...
Computer-based Social Engineering: Out of the blue you receive an email informing you about a large sum of money that is trapped in a foreign bank account a wealthy politician...
Human-based Social Engineering: What is human-based social engineering (SE)? Simply, SE is the art of convincing people to reveal corporate secrets and confidential information. Social engineers depend on the fact...