To understand hashing and its related attack types, let’s follow the story of SecureTech, a growing software company, and their journey to protect their digital assets. The Hashing Fortress SecureTech uses hashing to secure user passwords and verify data integrity. Hashing is a process that converts input data of any size into a fixed-length string […]
Category: Cyber Security
Brute Force Attacks
When I was a kid, I found an old briefcase in my father’s stash. It was locked with a double 3-digit combination. The secrecy of its contents made me more curious and determined. My childish mind whispered, “Why not try all possible combinations, one by one? Start with ‘000-000’, then ‘000-001’, then ‘000-002,’ and so […]
Attack Surfaces and Attack Vectors
To understand attack surfaces and attack vectors, let’s follow the story of TechCorp, a growing software company. The Digital Fortress of TechCorp TechCorp prides itself on its innovative software products. As the company expands, so does its digital infrastructure. This expansion inadvertently increases TechCorp’s attack surface – the sum of all potential vulnerabilities an attacker […]
Potential But Relatively Rare Threat Factors for 2025
Let’s look into some less known and less likely cyber threats for 2025 and onwards. Here are examples of uncommon cybersecurity threats, explained with hypothetical stories to illustrate how they might occur as well: 1. Watering Hole Attack Story: A small tech company frequently accesses a popular industry-specific forum to share ideas and resources. Unknown […]
Threats for Software Systems and WordPress
Software systems, including WordPress, face a variety of cybersecurity threats. Here’s a detailed explanation of the real threat factors: General Software Threats Malware Malware encompasses various forms of malicious software designed to disrupt, damage, or gain unauthorized access to systems. This includes: Injection Attacks These attacks involve inserting malicious code or data into vulnerable applications: Social […]
Calculate Risks in Cyber Space
Cybersecurity risk is typically calculated using the formula: Risk Score=Likelihood of Threat×Impact of Threat This basic formula can be adapted for more complex calculations by incorporating additional variables such as asset value, vulnerability severity, and exposure levels Factors to Calculate Risk Scores While severity and frequency (likelihood) are fundamental factors, other variables can enhance the accuracy of risk scoring: Additional […]
How to Protect a Castle – A Tale of Authentication and Authorization
Greetings, noble castle guard! Let me regale you with a tale of authentication and authorization in our grand fortress, and how it relates to the mystical realm of cyber security. The Tale of Sir Locksley and the Castle’s Defenses In our fair castle, you, brave guard, stand at the gates, tasked with the crucial duty […]
Principle of Least Privilege
The principle of least privilege is a fundamental security control that helps maintain information privacy. However, least privilege starts to lose its effectiveness when too many users are given access to information. Data leaks commonly happen as information gets passed between people without oversight. NIST Special Publication (SP) 800-53 is a comprehensive framework for security […]
Apply filters to SQL queries
Project description I am a security professional at a large organization. Part of my job is to investigate security issues to help keep the system secure. I recently discovered some potential security issues that involve login attempts and employee machines. My task is to examine the organization’s data in their employees and log_in_attempts tables. I’ll […]
Statefull and Stateless Firewalls in a nutshell
Here for you, a breef explanation of network firewalls, focusing on stateful and stateless firewalls, and a small discussion on the role of intrusion detection and prevention systems. Network Firewalls A network firewall is a security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier […]