Secure Your Digital Life IoT –The world of the Morrow

IoT –The world of the Morrow

Internet of Things (IoT) is an ecosystem of connected physical objects that are accessible through the internet. The ‘things’ in IoT could be a person with a Wi-Fi enabled heart monitor or a car with inbuilt navigator and digital dashboard or even your smart house, i.e. objects that have been assigned an IP address and have the ability to collect and transfer data over a network without manual assistance or intervention. The embedded technology in the objects helps them to…

Read More Read More

Secure Your Digital Life Careers in Information Security

Careers in Information Security

With the evolving technology around the world, the need for security has also drastically increased. As the need for security has increased, so has the thirst for the security professionals. To accommodate the need for security, the corporate world has introduced the following fields: Security Analyst :- The professionals who analyse and find vulnerabilities in a system or a network are called Security Analyst. Their responsibilities are growing day by day, due to the growing number of attack on the systems…

Read More Read More

Secure Your Digital Life Network Reconnaissance

Network Reconnaissance

In my earlier post, I had mentioned about Network Reconnaissance; so lets start by knowing about network. A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media. The best-known computer network is the Internet. Network computer devices that originate, route and terminate the data are called…

Read More Read More

Secure Your Digital Life DNS Interrogation

DNS Interrogation

DNS is a distributed database used to map IP addresses to hostnames, and vice-versa. If DNS is configured insecurely, you might possibly obtain revealing information about the organization or you can be redirected to malicious website through a genuine link/domain. Zone Transfers A zone transfer allows a secondary master server to update its zone database from the primary master. If a system administrator allows an untrusted Internet user to perform a zone transfer then that user may use this vulnerability to…

Read More Read More

Secure Your Digital Life Who manages the Internet?

Who manages the Internet?

Before we go ahead to DNS interrogation (see previous post) we need to clear out some important concept i.e., Who manages the Internet? Well I know most of you guys had thought about it or at-least tried to get an answer to it. Well I have got an answer for you. The core functionality of internet is managed by ICANN (Internet Corporation for Assigned Names and Numbers), an non-profit organization. ICANN is responsible for coordinating the maintenance and procedures of several databases related…

Read More Read More

Advertisment ad adsense adlogger