Skip to content

Ismaïl ALTAS

Portfolio & Blog

  • CategoriesExpand
    • Cyber Security
    • Software Testing
    • Web
    • Linux
  • LanguagesExpand
    • English
    • Français
    • Türkçe
  • Certificates
  • Resources
Ismaïl ALTAS
Portfolio & Blog
  • Cyber Security

    Hashing & Security

    To understand hashing and its related attack types, let’s follow the story of SecureTech, a growing software company, and their journey to protect their digital assets. The Hashing Fortress SecureTech uses hashing to secure user passwords and verify data integrity. Hashing is a process that converts input data of any size into a fixed-length string…

    Read More Hashing & SecurityContinue

  • Cyber Security

    Brute Force Attacks

    When I was a kid, I found an old briefcase in my father’s stash. It was locked with a double 3-digit combination. The secrecy of its contents made me more curious and determined. My childish mind whispered, “Why not try all possible combinations, one by one? Start with ‘000-000’, then ‘000-001’, then ‘000-002,’ and so…

    Read More Brute Force AttacksContinue

  • Cyber Security

    Attack Surfaces and Attack Vectors

    To understand attack surfaces and attack vectors, let’s follow the story of TechCorp, a growing software company. The Digital Fortress of TechCorp TechCorp prides itself on its innovative software products. As the company expands, so does its digital infrastructure. This expansion inadvertently increases TechCorp’s attack surface – the sum of all potential vulnerabilities an attacker…

    Read More Attack Surfaces and Attack VectorsContinue

  • Cyber Security

    Potential But Relatively Rare Threat Factors for 2025

    Let’s look into some less known and less likely cyber threats for 2025 and onwards. Here are examples of uncommon cybersecurity threats, explained with hypothetical stories to illustrate how they might occur as well: 1. Watering Hole Attack Story: A small tech company frequently accesses a popular industry-specific forum to share ideas and resources. Unknown…

    Read More Potential But Relatively Rare Threat Factors for 2025Continue

  • Cyber Security

    Threats for Software Systems and WordPress

    Software systems, including WordPress, face a variety of cybersecurity threats. Here’s a detailed explanation of the real threat factors: General Software Threats Malware Malware encompasses various forms of malicious software designed to disrupt, damage, or gain unauthorized access to systems. This includes: Injection Attacks These attacks involve inserting malicious code or data into vulnerable applications: Social…

    Read More Threats for Software Systems and WordPressContinue

  • Cyber Security

    Calculate Risks in Cyber Space

    Cybersecurity risk is typically calculated using the formula: Risk Score=Likelihood of Threat×Impact of Threat This basic formula can be adapted for more complex calculations by incorporating additional variables such as asset value, vulnerability severity, and exposure levels Factors to Calculate Risk Scores While severity and frequency (likelihood) are fundamental factors, other variables can enhance the accuracy of risk scoring: Additional…

    Read More Calculate Risks in Cyber SpaceContinue

  • Cyber Security

    How to Protect a Castle – A Tale of Authentication and Authorization

    Greetings, noble castle guard! Let me regale you with a tale of authentication and authorization in our grand fortress, and how it relates to the mystical realm of cyber security. The Tale of Sir Locksley and the Castle’s Defenses In our fair castle, you, brave guard, stand at the gates, tasked with the crucial duty…

    Read More How to Protect a Castle – A Tale of Authentication and AuthorizationContinue

  • Cyber Security

    Principle of Least Privilege

    The principle of least privilege is a fundamental security control that helps maintain information privacy. However, least privilege starts to lose its effectiveness when too many users are given access to information. Data leaks commonly happen as information gets passed between people without oversight. NIST Special Publication (SP) 800-53 is a comprehensive framework for security…

    Read More Principle of Least PrivilegeContinue

  • Cyber Security

    Apply filters to SQL queries

    Project description I am a security professional at a large organization. Part of my job is to investigate security issues to help keep the system secure. I recently discovered some potential security issues that involve login attempts and employee machines. My task is to examine the organization’s data in their employees and log_in_attempts tables. I’ll…

    Read More Apply filters to SQL queriesContinue

  • Linux

    File permissions in Linux

    Project description In this project, I am going to examine existing permissions on a file system. Then, I will report if the permissions match the authorization that was given. If they do not match, I’ll modify the permissions to authorize the appropriate users and remove any unauthorized access. Check file and directory details Here a…

    Read More File permissions in LinuxContinue

Page navigation

Previous PagePrevious 1 2 3 4 … 8 Next PageNext

© 2025  | Ismaïl ALTAS

  • Categories
    • Cyber Security
    • Software Testing
    • Web
    • Linux
  • Languages
    • English
    • Français
    • Türkçe
  • Certificates
  • Resources
Search