CLOUDCYBERSAFE Examples

InfoSec Solutions, Thoughts and Innovation
We talk about Cloud Security Data Analysis CyberSecurity
Components used : ESP8266, MQTT Server with TLS, Google Spread Sheet, Python and OLED Display Whilst planning to make a
Read more
MQTT is a machine-to-machine messaging protocol, designed to provide lightweight publish/subscribe communication to IOT devices. It is commonly used for
Read more
LogonTracer associates a host name (or an IP address) and account name found in logon-related events and displays it as
Read more
Introduction Today, with advanced technology, there has been an increase in the number of cyber threats. Social engineering has become
Read more
Sophos received a report on April 22, 2020, at 20:29 UTC regarding an XG Firewall with a suspicious field value
Read more
ELK Stack processes events from a device via SNMP traps sent by the device. Configuring SNMP Server to send Threat
Read more
Outlook calendar is part of the Outlook messaging hub in Office 365 that also lets you manage emails and contacts,
Read more
Using Google Spreadsheets and GoogleFinance() function for Currency Meter Desktop Gadget This method show the steps to follow to use
Read more
Stay Healthy, Stay Secure : Work From Home Cybersecurity Tips Depending where in the world you live, you are either
Read more
Setting up a Zero Cost Threat Hunting Platform with Elastic Stack and Alienvault Reputation List Elastic Stack is an awesome
Read more
Configure Apache With TLS/SSL Certificate on Ubuntu Server Generate Certificate Create a directory place to store the file $ mkdir
Read more
1.       Which wireless encryption technology makes use of temporal keys? Options are: Extensible Authentication Protocol (EAP) Wireless Equivalence Protocol (WEP)
Read more
No Vulnerability 151 User id's based on job description 152 No user identification and authentication 153 Weak password management system
Read more
Information Security Vulnerability List - 1 No Vulnerability 1 Disposal or reuse of storage media without proper erasure 2 Inadequate
Read more
Useful KPIs for a Security Operation Center (SOC) No KPI 1 The percentage of phishing emails opened by your end-users
Read more
Here we are creating a custom module to add an additional field which is of object type contact  to the
Read more
1.      The process of identifying and classifying assets is typically included in the Options are: Business Impact Analysis (Correct) Asset
Read more
Greenbone Vulnerability Manager 11 Installation on Ubuntu 19.04 from Source The Greenbone Security Assistant is a web application that connects
Read more
Importance of metrics in an IT security program IT security metrics are widely used as the primary tools for decision
Read more
ASP.NET Weblogin Using Python ASP.net websites usually send state data in requests and responses in order to keep track of
Read more