Tag: remote work

Tag: remote work

Use Defensive Cybersecurity to Mitigate Cyber attack
July 28, 2021 Cyber defense, cybersecurity, Online security, System security admin

Wired.com reported that the Kaseya was warned by the Dutch Institute for Vulnerability Disclosure that there was a potential vulnerability in its system. In this case, Kaseya did not ignore the warning, but Kaseya did not move first to patch up the exposure. The impact of this attack on Kaseya is enormous because it is

Read More
Security Implication of Web Frameworks
May 18, 2021 Cyber defense, cybersecurity, Elearning, Online security, Penetration testing, Pentest, System security, Web frameworks admin

Web application frameworks provide a structure for building and developing applications through the provision of predefined classes, modules, and functions. The predefined classes and modules help to manage system hardware, software and to manage the streamlining of the application development process. The framework in this discussion includes application frameworks such as Angular.js or Django and

Read More
Gathering Information for Penetration Testing Using Search Engines Discovery and OWASP ZAP
April 20, 2021 Cyber defense, cybersecurity, Online security, Penetration testing, System security admin

Using a search engine discovery is another great option for gathering intelligence about a penetration testing target. A search engine query can be direct or indirect. The direct method is where the search engine can be sued to dig into the indexes and contents from caches. The indirect method is where sensitive information such as

Read More
Selection of Tools for Penetration Testing
June 30, 2020 Elearning, Online security admin

There are several types of tools for penetration testing. The number of available tools is so many that it will be practically impossible to learn all of them. Using the wrong set of tools can be a problem because the pen tester would have wasted so much time trying to gather the wrong information. As

Read More
Planning for Penetration Testing
June 23, 2020 Elearning, Online security admin

In the last episode, I described the need to test your systems to assess if it has any vulnerability, and then use the report to fix up and patch the crucial areas of importance. Penetration testing is also referred to as ethical hacking. Though both refer to the same concept, there is a difference between

Read More
Penetration Testing as a Cybersecurity Survival Technique
June 5, 2020 Elearning, Online security admin

It does not matter how strong you made your security controls and policies, if you have tested to see if it can withstand the doom day attack, then you need to think again. You may need to find out if it meets your expectation or other industry standards. Penetration testing can be considered as an

Read More
Security Challenges in Elearning Systems
May 20, 2020 Challenges of Elearning, Challenges of Remote Work, Online security admin

As eLearning is emerging as a good alternative for leaning in situations where learners and instructors cannot meet in a physical location, the need to ensure confidentiality, integrity, and availability of eLearning systems are growing just as the demand for eLearning is growing. Elearning depends on the internet and its availability and suffers the same

Read More
Online Security and Privacy for Elearners and Remote Workers
May 12, 2020 Challenges of Elearning, Challenges of Remote Work, Online security admin

Using the Internet can be very interesting, exciting, especially for new users. There are many exciting things to do online. The excitement of using the Internet can be marred by malicious hackers and other groups that want to collect personal information about online users. Though some organizations use some of the information they collect about

Read More
Responsibilities of Web Users in a Digital Society
May 8, 2020 Challenges of Elearning, Challenges of Remote Work admin

Though many of us work and interact with others through the web, a lot of people are yet to understand the change that has taken place in the world as a result of digital interaction. Living and working in a digital world does not make users to be equipped with the standard etiquette that governs

Read More