Alabi Erioluwacyberspace007.hashnode.dev·Oct 30, 2023Introduction To Cyber Security(V): The OSI Model.THE DATA LINK LAYER This is the layer that defines the format of data, it organizes bits into frames. This is the second layer of the OSI model, the data link layer provides node-to-node data transfer, a link between two directly connected nodes on a...Discuss#cybersecurity
HackeraceforHackerace Blog Posthackeraceblog.hashnode.dev·Oct 28, 2023Exploring Blockchain's Impact on CybersecurityIn the ever-evolving landscape of cybersecurity, staying one step ahead of malicious actors is paramount. Traditional security measures have their limitations, and as cyber threats become increasingly sophisticated, it's crucial to adopt innovative s...Discussncsam
Alabi Erioluwacyberspace007.hashnode.dev·Oct 28, 2023Introduction To cyber Security(IV): The OSI Model.PHYSICAL LAYER This is the first layer of the OSI Model. The physical layer is responsible for the physical cable or wireless connection between network nodes. It defines the connector, the electrical cable or wireless technology connecting the devic...Discuss#cybersecurity
HackeraceforHackerace Blog Posthackeraceblog.hashnode.dev·Oct 26, 2023A Checklist of Cybersecurity Best PracticesIt is essential to understand the basics and best practices for staying safe in today's digital world. Without a doubt, cybersecurity is all about defending our digital lives from dangers and securing sensitive data. For both people and businesses, a...Discussncsam
Alabi Erioluwacyberspace007.hashnode.dev·Oct 23, 2023Introduction To CyberSecurity(I): Meaning and terms usedCyber Security What is Cyber Security? First, I would like to break the two words down “Cyber” and “Security”. Cyber: This is something that pertains to or has to do with the internet (computer networks). Security: This can be defined as the state of...Discuss#cybersecurity
Fatimredopsinsights.hashnode.dev·Oct 22, 2023Command and Control Frameworks: A New Pentester's Guide to Covert Operations🕵️♂️Welcome to the world of Pentesting, where you get to play the role of a digital spy! Imagine having secret agents (we call them "agents") on different computers, doing your bidding while you stay hidden in your command center (the C2 Server). In this...DiscussCybersecurityAwareness
HackeraceforHackerace Blog Posthackeraceblog.hashnode.dev·Oct 18, 2023Navigating the Realm of IoT SecurityThe Internet of Things (IoT) is a technology that allows for the interconnection of different devices in an inert object thereby aiding communication between the devices and the cloud. As much as IoT has rapidly changed the way we interact with t...Discussncsam
Stella Jacobitgeeks.hashnode.dev·Oct 18, 2023Social Engineering Attacks: How to Recognize and Prevent ThemHello, dear readers! I'm Stella, and I'm thrilled to have the opportunity to share some vital insights with you today. In today's digital age, where information is at our fingertips, we often find ourselves vulnerable to various online threats. One s...Discusscybersecurity
HackeraceforHackerace Blog Posthackeraceblog.hashnode.dev·Oct 16, 2023Cybersecurity for Remote WorkIn the spirit of the National Cybersecurity Awareness Month (NCSAM) 2023, we’ll discuss various ways of ensuring cyber security for remote workers. SECURING DEVICES One of the most important things remote workers should do is to ensure their devices ...Discussncsam
Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Oct 16, 2023Guarding Against Social Engineering and Phishing: A Comprehensive Guide to Online SecuritySocial engineering and phishing attacks are becoming increasingly sophisticated and prevalent, making it essential for individuals and organizations to be aware of them and take steps to protect themselves. We will explore the critical facets of cybe...DiscussChronicles of CyberSafetyOnline security