Cybersecurity Terminology: A Comprehensive Guide to Understanding Key Concepts
-
Updated
Apr 28, 2023
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Cybersecurity Terminology: A Comprehensive Guide to Understanding Key Concepts
Supporting Cyber Threat Intelligence Tools
Powershell Scripts for POC and Windows AD Testing Tutoring
CyberSecurity Momentum. Sentiment analysis over CyberSecurity Information Community
Cybersecurity Competitions Writeups + HackademINT Website, Cybersecurity Club of Télécom SudParis
Browser Forensic Extractor
Chi sono, ma soprattutto cosa ci faccio su GitHub?
A sniffer that shows various events happening on your network.
[WIP] Docker image with Security Onion pre-installed on Ubuntu 16.04
Classificando dados anônimos de transações por cartão de crédito como fraudulentas ou genuínas
HACKING TOOLS
Azure environment set up and Elk Server deployment for Project 1
HushBrute is a python based SSH Bruteforcer. It can be used to bruteforce SSH logins. You need to Enter your Target IP, Port Number, Username and a Wordlist. And you will be able to crack the password if it matches one from the wordlist. This is just a basic password bruteforcer made for educational purposes only. Use it only if you have permiss…
A site for an IQT R&D initiative on software supply chain security.
Created by The cybersecurity community