Hashing & Security

To understand hashing and its related attack types, let’s follow the story of SecureTech, a growing software company, and their journey to protect their digital assets. The Hashing Fortress SecureTech uses hashing to secure user passwords and verify data integrity. Hashing is a process that converts input data of any size into a fixed-length string…

Brute Force Attacks

When I was a kid, I found an old briefcase in my father’s stash. It was locked with a double 3-digit combination. The secrecy of its contents made me more curious and determined. My childish mind whispered, “Why not try all possible combinations, one by one? Start with ‘000-000’, then ‘000-001’, then ‘000-002,’ and so…

Potential But Relatively Rare Threat Factors for 2025

Let’s look into some less known and less likely cyber threats for 2025 and onwards. Here are examples of uncommon cybersecurity threats, explained with hypothetical stories to illustrate how they might occur as well: 1. Watering Hole Attack Story: A small tech company frequently accesses a popular industry-specific forum to share ideas and resources. Unknown…

Threats for Software Systems and WordPress

Software systems, including WordPress, face a variety of cybersecurity threats. Here’s a detailed explanation of the real threat factors: General Software Threats Malware Malware encompasses various forms of malicious software designed to disrupt, damage, or gain unauthorized access to systems. This includes: Injection Attacks These attacks involve inserting malicious code or data into vulnerable applications: Social…

Calculate Risks in Cyber Space

Cybersecurity risk is typically calculated using the formula: Risk Score=Likelihood of Threat×Impact of Threat This basic formula can be adapted for more complex calculations by incorporating additional variables such as asset value, vulnerability severity, and exposure levels Factors to Calculate Risk Scores While severity and frequency (likelihood) are fundamental factors, other variables can enhance the accuracy of risk scoring: Additional…

Principle of Least Privilege

The principle of least privilege is a fundamental security control that helps maintain information privacy. However, least privilege starts to lose its effectiveness when too many users are given access to information. Data leaks commonly happen as information gets passed between people without oversight. NIST Special Publication (SP) 800-53 is a comprehensive framework for security…

Apply filters to SQL queries

Project description I am a security professional at a large organization. Part of my job is to investigate security issues to help keep the system secure. I recently discovered some potential security issues that involve login attempts and employee machines. My task is to examine the organization’s data in their employees and log_in_attempts tables. I’ll…

Statefull and Stateless Firewalls in a nutshell

Here for you, a breef explanation of network firewalls, focusing on stateful and stateless firewalls, and a small discussion on the role of intrusion detection and prevention systems. Network Firewalls A network firewall is a security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier…