nevsec.dev Open in urlscan Pro
192.0.78.25  Public Scan

Submitted URL: http://adhdsecurity.dev/
Effective URL: https://nevsec.dev/
Submission: On December 09 via api from US — Scanned from US

Form analysis 1 forms found in the DOM

POST https://subscribe.wordpress.com

<form method="post" action="https://subscribe.wordpress.com" accept-charset="utf-8" style="display: none;">
  <div>
    <input type="email" name="email" placeholder="Enter your email address" class="actnbr-email-field" aria-label="Enter your email address">
  </div>
  <input type="hidden" name="action" value="subscribe">
  <input type="hidden" name="blog_id" value="221898254">
  <input type="hidden" name="source" value="https://nevsec.dev/">
  <input type="hidden" name="sub-type" value="actionbar-follow">
  <input type="hidden" id="_wpnonce" name="_wpnonce" value="4fd0b1e9cf">
  <div class="actnbr-button-wrap">
    <button type="submit" value="Sign me up"> Sign me up </button>
  </div>
</form>

Text Content

Skip to content


> NEVSEC

Cybersecurity | Research | Podcast

 * W&R
 * About Me
 * Podcast
 * Contact




 * I TOOK THE IS-0906 WORKPLACE SECURITY AWARENESS COURSE BY FEMA
   
   The IS-0906 Workplace Security Awareness course objective was to identify
   potential risks in the workplace, improve security, and determine the actions
   to take during an incident event. The recap on threats, vulnerabilities, and
   consequences is relevant to the CIA triad. Confidentiality, Integrity, and
   Availability can all be compromised. But this course also reflects the human…
   
   


 * WIRESHARK PCAP ANALYSIS: CIS311 NETWORK SECURITY
   
   Wireshark can catch live traffic on a network that derives from packets, and
   the software is designed to output the information in the most readable
   format possible. Not only can live traffic be captured, but you can also
   download Pcap files. It is important to note that you need permission to scan
   a network, as…
   
   


 * OSI SEVEN-LAYER MODEL | IPV4 |IPV6 : CIS311 NETWORK SECURITY
   
   The OSI seven-layer model, also known as the Open System Interconnection, is
   designed as a blueprint for the way a network is designed. Just like looking
   at a vehicle wiring diagram, we can see that the OSI model works almost the
   same way. There is a total of seven layers, beginning with Physical, Data
   Link,…
   
   


 * DISTRIBUTED DENIAL-OF-SERVICE-ATTACK (DDOS): CIS311: NETWORK SECURITY
   
   Distributed denial-of-service-attack, or DDoS, is a widespread attack used by
   either troll or hacker groups trying to send a message. Mischievous hackers
   commit DoS attacks on servers like Xbox Live or PlayStation every Christmas
   to stop services. These types of targeted attacks are technically popular
   among gamers because they cannot play their devices during Christmas.…
   
   


 * ACCESS CONTROL LISTS (ACLS): CIS311: NETWORK SECURITY
   
   Access Control Lists (ACLs) allow administrators to control the access of
   individuals, groups, network traffic, or software. ACL is a critical security
   process for many companies, and policies are implemented to protect the
   company. It protects a company from insider trading by protecting PII by
   identifying users as least or most privileged. ACL can also…
   
   


 * 2.4 GHZ, 5 GHZ EXPLAINED: CIS311: NETWORK SECURITY
   
   Radio Frequency (RF) is the standard for wireless communications; when the
   average person thinks about radio frequencies, they think about FM and AM
   radio. But for a network administrator or engineer, we are thinking about
   WNICs and wifi routers. There are two types of channels to be familiar with,
   that is, 2.4 GHz and 5…
   
   


 * DIGITAL FORENSICS: WHAT IS CYBER CRIME?
   
   Cyber crime is when the internet is used to commit crimes online, using
   techniques like XSS Injections, phishing, vishing, social engineering, email
   fraud, theft of data, viruses, ransomware, and identity fraud are part of an
   extensive list of activities committed by cyber criminals. Currently popular
   by demand are phishing emails when a user is sent…
   
   


 * COMPARE AND CONTRAST DIFFERENT TYPES OF SOCIAL ENGINEERING TECHNIQUES.
   
   Phishing Phishing is a type of cybercrime in which an attacker poses as a
   legitimate entity in order to trick victims into divulging sensitive
   information, such as login credentials or financial information. This is
   typically done through the use of fake websites or emails that mimic the
   appearance of legitimate sites or communication from legitimate…
   
   


 * WEB APPLICATION SECURITY: EXPLAINED
   
   Web application security is the practice of protecting websites and web-based
   applications from malicious attacks, data breaches, and other security
   vulnerabilities. There are several key concepts that are important to
   understand when it comes to web application security, including: By
   understanding these concepts and implementing appropriate security measures,
   organizations can help to protect their web…
   
   


 * CIA TRIAD: EXPLAINED
   
   The CIA triad is a commonly used model in the field of cybersecurity that
   refers to the three main pillars of information security: confidentiality,
   integrity, and availability. These three principles are important for
   ensuring the security and reliability of information systems. By considering
   the CIA triad when designing and implementing information systems,
   organizations can help…
   
   




> NEVSEC

Create a website or blog at WordPress.com


 * Follow Following
    * > nevsec
      
      Sign me up
    * Already have a WordPress.com account? Log in now.

 *  * > nevsec
    * Edit Site
    * Follow Following
    * Sign up
    * Log in
    * Report this content
    * View site in Reader
    * Manage subscriptions
    * Collapse this bar