nevsec.dev
Open in
urlscan Pro
192.0.78.25
Public Scan
Submitted URL: http://adhdsecurity.dev/
Effective URL: https://nevsec.dev/
Submission: On December 09 via api from US — Scanned from US
Effective URL: https://nevsec.dev/
Submission: On December 09 via api from US — Scanned from US
Form analysis
1 forms found in the DOMPOST https://subscribe.wordpress.com
<form method="post" action="https://subscribe.wordpress.com" accept-charset="utf-8" style="display: none;">
<div>
<input type="email" name="email" placeholder="Enter your email address" class="actnbr-email-field" aria-label="Enter your email address">
</div>
<input type="hidden" name="action" value="subscribe">
<input type="hidden" name="blog_id" value="221898254">
<input type="hidden" name="source" value="https://nevsec.dev/">
<input type="hidden" name="sub-type" value="actionbar-follow">
<input type="hidden" id="_wpnonce" name="_wpnonce" value="4fd0b1e9cf">
<div class="actnbr-button-wrap">
<button type="submit" value="Sign me up"> Sign me up </button>
</div>
</form>
Text Content
Skip to content > NEVSEC Cybersecurity | Research | Podcast * W&R * About Me * Podcast * Contact * I TOOK THE IS-0906 WORKPLACE SECURITY AWARENESS COURSE BY FEMA The IS-0906 Workplace Security Awareness course objective was to identify potential risks in the workplace, improve security, and determine the actions to take during an incident event. The recap on threats, vulnerabilities, and consequences is relevant to the CIA triad. Confidentiality, Integrity, and Availability can all be compromised. But this course also reflects the human… * WIRESHARK PCAP ANALYSIS: CIS311 NETWORK SECURITY Wireshark can catch live traffic on a network that derives from packets, and the software is designed to output the information in the most readable format possible. Not only can live traffic be captured, but you can also download Pcap files. It is important to note that you need permission to scan a network, as… * OSI SEVEN-LAYER MODEL | IPV4 |IPV6 : CIS311 NETWORK SECURITY The OSI seven-layer model, also known as the Open System Interconnection, is designed as a blueprint for the way a network is designed. Just like looking at a vehicle wiring diagram, we can see that the OSI model works almost the same way. There is a total of seven layers, beginning with Physical, Data Link,… * DISTRIBUTED DENIAL-OF-SERVICE-ATTACK (DDOS): CIS311: NETWORK SECURITY Distributed denial-of-service-attack, or DDoS, is a widespread attack used by either troll or hacker groups trying to send a message. Mischievous hackers commit DoS attacks on servers like Xbox Live or PlayStation every Christmas to stop services. These types of targeted attacks are technically popular among gamers because they cannot play their devices during Christmas.… * ACCESS CONTROL LISTS (ACLS): CIS311: NETWORK SECURITY Access Control Lists (ACLs) allow administrators to control the access of individuals, groups, network traffic, or software. ACL is a critical security process for many companies, and policies are implemented to protect the company. It protects a company from insider trading by protecting PII by identifying users as least or most privileged. ACL can also… * 2.4 GHZ, 5 GHZ EXPLAINED: CIS311: NETWORK SECURITY Radio Frequency (RF) is the standard for wireless communications; when the average person thinks about radio frequencies, they think about FM and AM radio. But for a network administrator or engineer, we are thinking about WNICs and wifi routers. There are two types of channels to be familiar with, that is, 2.4 GHz and 5… * DIGITAL FORENSICS: WHAT IS CYBER CRIME? Cyber crime is when the internet is used to commit crimes online, using techniques like XSS Injections, phishing, vishing, social engineering, email fraud, theft of data, viruses, ransomware, and identity fraud are part of an extensive list of activities committed by cyber criminals. Currently popular by demand are phishing emails when a user is sent… * COMPARE AND CONTRAST DIFFERENT TYPES OF SOCIAL ENGINEERING TECHNIQUES. Phishing Phishing is a type of cybercrime in which an attacker poses as a legitimate entity in order to trick victims into divulging sensitive information, such as login credentials or financial information. This is typically done through the use of fake websites or emails that mimic the appearance of legitimate sites or communication from legitimate… * WEB APPLICATION SECURITY: EXPLAINED Web application security is the practice of protecting websites and web-based applications from malicious attacks, data breaches, and other security vulnerabilities. There are several key concepts that are important to understand when it comes to web application security, including: By understanding these concepts and implementing appropriate security measures, organizations can help to protect their web… * CIA TRIAD: EXPLAINED The CIA triad is a commonly used model in the field of cybersecurity that refers to the three main pillars of information security: confidentiality, integrity, and availability. These three principles are important for ensuring the security and reliability of information systems. By considering the CIA triad when designing and implementing information systems, organizations can help… > NEVSEC Create a website or blog at WordPress.com * Follow Following * > nevsec Sign me up * Already have a WordPress.com account? Log in now. * * > nevsec * Edit Site * Follow Following * Sign up * Log in * Report this content * View site in Reader * Manage subscriptions * Collapse this bar