CATEGORY: Cybersecurity and
4.3 – Cyber-Warfare and Cyber-Terrorism
Cyber warfare and cyber terrorism in government documents, literature, and everyday use have been extremely different, emotionally loaded, and context-specific to make addressing the subject challenging. Cyber warfare is usually seen as a catch-all term to define harmful or illegal activity on a network perpetuated by one state against another. While cyber terrorism often has […]
4.2 – Testing Systems
There are three main testing frameworks in the broad nexus of cyberspace vulnerabilities. White Box Testing White Box Testing is a type of testing solution which gets full disclosure about the network prior to the penetration testing. This testing is also called glass box testing, clear box testing, structural testing or path driven testing. White […]
4.1 – Phases of Ethical Hacking
Hackers are often smart users with good computer knowledge, and capable of creating and exploring computer hardware and software. Their purpose can be either to dig into illegal activities or to gain knowledge. Ethical hackers are driven by the eagerness to know more while malicious hackers aim to steal the data. In general, there are […]
4.0 – Hacking and Ethical Hacking
Hacking is the practice of making a malicious alteration to a program for achieving a target outside the original purpose of the creator. A person who is involved in this activity is known as a Hacker. A hacker is basically an expert programmer who regards hacking as an art, and as a method to apply […]
3.4 – Network Vulnerabilities & Types of Attacks
In simple definition, vulnerability is a weakness in any security flaw which allows an attacker to attack an infrastructure and reduce the information security assurance. In the current era of technology, people and organizations use more technology in order to amplify their businesses and relationships with clients and social users. In order to do that, most […]






