Harkirat MannOSI MODEL : Functions on each layer, protocols and attacksPhysical Layer: The physical layer is responsible for transmitting raw data over the network medium. Attacks at this layer include…May 3, 2023May 3, 2023
Harkirat MannSome Cyber Security important guides:Escaping is a secure coding technique that ensures that any system commands are not processed and executed as actual commands; instead…Mar 30, 2023Mar 30, 2023
Harkirat MannFew important terms:A retrovirus is also referred to as an anti-anti-virus virus. This means that it tries to attack and disable any anti-virus or protective…Mar 27, 2023Mar 27, 2023
Harkirat MannPHARMINGPharming is a type of social engineering cyberattack in which criminals redirect internet users trying to reach a specific website to a…Mar 18, 2023Mar 18, 2023
Harkirat MannDRP Site plans:Hot site : Active infrastructure, active people and working data center. Replica of normal site.High CostMar 18, 2023Mar 18, 2023
Harkirat MannTYPES OF ATTACKS :ADVANCED PERSISTENT THREAT : Conduct sophisticated series of related attacks taking place over an extended period of time . Typically well…Mar 18, 2023Mar 18, 2023
Harkirat MannBLUETOOTH ATTACKS :BLUEJACKING : Pranksters push unsolicited messages to engage or annoy other nearby bluetooth through a loophole in bluetooth messaging…Mar 18, 2023Mar 18, 2023
Harkirat MannINJECTION ATTACKS :SQL injection: It is a common attack vector that uses malicious SQL code for backend database manipulation to access information that was…Mar 18, 2023Mar 18, 2023
Harkirat MannCARD CLONNING AND SKIMMING :Card Clonning : Card Clonnig is capturing information from cards used for access like RFID and magnetic stripe cards.Mar 18, 2023Mar 18, 2023
Harkirat MannCryptomalware : Ransomware that encrypts files stored on a computer or mobile device in order to…Potentially unwanted programs (PUPs) : a program that may be an unwanted app, often delivered alongside a program the user wants. PUPs…Mar 18, 2023Mar 18, 2023