What is a Security Operations Center (SOC)?
  • By hjoshi@jamesknows.com
  • August 2, 2023
  • Cyber Security

What is a Security Operations Center (SOC)? In today's rapidly evolving digital landscape, businesses and organizations face an ever-increasing number of cybersecurity threats. The constant barrage of sophisticated cyberattacks poses…

What is OWASP? Top 10 Vulnerability in OWASP
  • By hjoshi@jamesknows.com
  • June 30, 2023
  • Cyber Security

What is OWASP? Top 10 Vulnerability in OWASP The OWASP (Open Web Application Security Project) Top 10 is a regularly updated list of the most critical security risks facing web…

Top 50 Cyber Security Interview Questions and Answers
  • By hjoshi@jamesknows.com
  • April 26, 2023
  • Cyber Security

Top 50 Cyber Security Interview Questions and Answers Cyber security is the practice of protecting internet-connected systems. It includes hardware, software, and data, from cyber threats. Cyber security measures are…

What is Social Engineering
  • By hjoshi@jamesknows.com
  • December 2, 2022
  • Cyber Security

What is social engineering? Social engineering is a term used for various malicious activities carried out through human interaction. Using psychological manipulation to trick users into failing security or providing…

Cyber Crime In India
  • By Surbhi nahta
  • September 3, 2022
  • Cyber Security

CYBER-CRIME IN INDIA   WHAT IS CYBERCRIME? Cybercrime is any criminal activity that involves a computer, network device, or network. While most cybercrimes are committed to generating profit for cybercriminals,…

  • By Surbhi nahta
  • August 6, 2022
  • Cyber Security

What is NFT? In simple terms, these cryptographic means are grounded on blockchain technology. They can not be changed or traded equally like other cryptographic means.   Like Bitcoin or…

ANTI-FORENSICS
  • By Surbhi nahta
  • August 1, 2022
  • Cyber Security

ANTI-FORENSICS   WHAT IS CYBER FORENSICS Cyber-forensics is an electronic discovery technique used to identify and uncover technical evidence of criminal activity. This often involves extracting data from on-premise and/or…

COMPUTER FORENSICS
  • By Surbhi nahta
  • July 4, 2022
  • Cyber Security

COMPUTER FORENSICS   What is computer forensics? Computer forensics is the use of investigations and analytical techniques to collect and store evidence from a particular computer system in a manner…

  • By Surbhi nahta
  • June 6, 2022
  • Cyber Security

FOOTPRINTS AND INFORMATION COLLECTION - Footprinting means gathering information about a target system that can be used to execute a successful cyber attack. To obtain this information, a hacker could…

SOCIAL ENGINEERING ATTACK AND PREVENTION
  • By Surbhi nahta
  • May 2, 2022
  • Cyber Security

SOCIAL ENGINEERING ATTACK AND PREVENTION - Social engineering is a term used for a broad range of malicious actions carried out through human interaction. It uses psychic deception to trick…

MALWARE AND ITS TYPE’S
  • By Surbhi nahta
  • April 4, 2022
  • Cyber Security

MALWARE AND ITS TYPE’S -   What is Malware What is Viruses, Worms and Trojans Types of Trojans Ransomeware protection   INTRODUCTION Malware:  Software that is specifically designed to disrupt,…