Cloud, Data Analysis, Cybersecurity

Skip to content
Menu
  • Home
  • Explore
  • Cloud
  • Splunk
  • Consultancy
  • Contact Us

Author: Sumesh MS

TLS/SSL Certificate Installation for Apache on Ubuntu Server

by Sumesh MSPosted onDecember 25, 2019December 25, 2019

Configure Apache With TLS/SSL Certificate on Ubuntu Server Generate Certificate Create a directory place to store the file $ mkdir ~/certificates $ cd ~/certificates Generate…

Read More

CCISO Sample Questions (Part 2)

by Sumesh MSPosted onDecember 23, 2019

1.       Which wireless encryption technology makes use of temporal keys? Options are: Extensible Authentication Protocol (EAP) Wireless Equivalence Protocol (WEP) Wireless Application Protocol (WAP) Wifi…

Read More

Information Security Vulnerability List – 2

by Sumesh MSPosted onDecember 21, 2019

No Vulnerability 151 User id’s based on job description 152 No user identification and authentication 153 Weak password management system 154 Unrestricted use of system…

Read More

Information Security Vulnerability List – 1

by Sumesh MSPosted onDecember 21, 2019December 21, 2019

Information Security Vulnerability List – 1 No Vulnerability 1 Disposal or reuse of storage media without proper erasure 2 Inadequate change control 3 Inadequate network…

Read More

Useful KPIs for a Security Operation Center (SOC)

by Sumesh MSPosted onDecember 19, 2019December 19, 2019

Useful KPIs for a Security Operation Center (SOC) No KPI 1 The percentage of phishing emails opened by your end-users 2 Phishing emails informed by…

Read More

iTop Add a new field (Owner) to Configuration Item

by Sumesh MSPosted onDecember 19, 2019December 19, 2019

Here we are creating a custom module to add an additional field which is of object type contact  to the FunctionalCI Class which is the…

Read More

CCISO Sample Questions (Part 1)

by Sumesh MSPosted onDecember 18, 2019December 19, 2019

1.      The process of identifying and classifying assets is typically included in the Options are: Business Impact Analysis (Correct) Asset configuration management process Disaster Recovery…

Read More

Greenbone Vulnerability Manager 11 Installation on Ubuntu from Source

by Sumesh MSPosted onDecember 15, 2019December 16, 2019

Greenbone Vulnerability Manager 11 Installation on Ubuntu 19.04 from Source The Greenbone Security Assistant is a web application that connects to the OpenVAS Manager and…

Read More

Importance of Metrics in an IT Security Program

by Sumesh MSPosted onNovember 23, 2019November 23, 2019

Importance of metrics in an IT security program IT security metrics are widely used as the primary tools for decision making and evaluating accountability in…

Read More

Posts pagination

Previous Page Page 1 Page 2 Page 3 Page 4 … Page 6 Next Page
  • Contact us
  • Team
  • Privacy Policy

2023 | www.cloudcybersafe.com

Cambium Theme by BestBlogThemes ⋅ Powered by WordPress