Secure Your Digital Life Careers in Information Security

Careers in Information Security

With the evolving technology around the world, the need for security has also drastically increased. As the need for security has increased, so has the thirst for the security professionals. To accommodate the need for security, the corporate world has introduced the following fields: Security Analyst :- The professionals who analyse and find vulnerabilities in a system or a network are called Security Analyst. Their responsibilities are growing day by day, due to the growing number of attack on the systems…

Read More Read More

Secure Your Digital Life Network Reconnaissance

Network Reconnaissance

In my earlier post, I had mentioned about Network Reconnaissance; so lets start by knowing about network. A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media. The best-known computer network is the Internet. Network computer devices that originate, route and terminate the data are called…

Read More Read More

Secure Your Digital Life DNS Interrogation

DNS Interrogation

DNS is a distributed database used to map IP addresses to hostnames, and vice-versa. If DNS is configured insecurely, you might possibly obtain revealing information about the organization or you can be redirected to malicious website through a genuine link/domain. Zone Transfers A zone transfer allows a secondary master server to update its zone database from the primary master. If a system administrator allows an untrusted Internet user to perform a zone transfer then that user may use this vulnerability to…

Read More Read More

Secure Your Digital Life Who manages the Internet?

Who manages the Internet?

Before we go ahead to DNS interrogation (see previous post) we need to clear out some important concept i.e., Who manages the Internet? Well I know most of you guys had thought about it or at-least tried to get an answer to it. Well I have got an answer for you. The core functionality of internet is managed by ICANN (Internet Corporation for Assigned Names and Numbers), an non-profit organization. ICANN is responsible for coordinating the maintenance and procedures of several databases related…

Read More Read More

Secure Your Digital Life Footprinting


Footprinting (or Digital Footprinting or reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to like an individual, group of individuals or an organisation. The information is very useful for the hacker who is trying to get in to your computer/network. Footprinting is one of the pre-attack phase and a very essential part for an attacker. In this phase the attacker would gather as much as information he/she could gather, because in later stages of attack…

Read More Read More

Advertisment ad adsense adlogger