Isolation

Through isolation, we aim to achieve a virtual separation between the running system processes and the main operating system. This ensures that a compromise of the system process cannot affect the entire system and should only be limited to the isolated process.


Authentication

Unix Password Management Tools Third-party password management tools come into the picture. They make it easy to: Manage passwords across multiple services.


CVE & Third Party Advisory

Operating System Protection Principles The basis of OS protection is separation of its components into an inner layer, middle layer, and outer layer.


Security Audit Report Template

1. Executive Summary Objective The objective of this security audit was to evaluate the current security posture of ABC Corporation’s IT infrastructure, identify vulnerabilities, and provide actionable recommendations to enhance security.


Review and Audit

Infrastructure and Control Audits Controls: The measures an organization takes to reduce risk. Preventive: Security measures to stop an event from occurring.


Risk Evaluation

Tools and Techniques for Risk Evaluation Risk Matrix: A visual tool that plots risks on a grid based on their likelihood and impact.


Defensive Techniques

Network Security Firewalls: Firewalls act as a barrier between trusted and untrusted networks. They monitor and control incoming and outgoing network traffic based on predetermined security rules.


Offensive Techniques

Reconnaissance Passive Reconnaissance Footprinting: Gathering information about the target without directly interacting with it. This includes collecting data from publicly available sources such as websites, social media, and public records.


Security Principles

CIA Triad Confidentiality: Keeping data secret or private. Integrity: Ensuring the legitimacy of data so it can be trusted. Availability: Ensuring networks, systems, and applications are up and running.


Significant Virus Events

1971 - The Creeper Virus: created by Bob Thomas, is often considered the first computer virus. It was designed as an experimental self-replicating program that infected ARPANET systems, displaying the message “I’m the creeper: catch me if you can.