Potential But Relatively Rare Threat Factors for 2025

Let’s look into some less known and less likely cyber threats for 2025 and onwards. Here are examples of uncommon cybersecurity threats, explained with hypothetical stories to illustrate how they might occur as well: 1. Watering Hole Attack Story: A small tech company frequently accesses a popular industry-specific forum to share ideas and resources. Unknown…

Threats for Software Systems and WordPress

Software systems, including WordPress, face a variety of cybersecurity threats. Here’s a detailed explanation of the real threat factors: General Software Threats Malware Malware encompasses various forms of malicious software designed to disrupt, damage, or gain unauthorized access to systems. This includes: Injection Attacks These attacks involve inserting malicious code or data into vulnerable applications: Social…

Calculate Risks in Cyber Space

Cybersecurity risk is typically calculated using the formula: Risk Score=Likelihood of Threat×Impact of Threat This basic formula can be adapted for more complex calculations by incorporating additional variables such as asset value, vulnerability severity, and exposure levels Factors to Calculate Risk Scores While severity and frequency (likelihood) are fundamental factors, other variables can enhance the accuracy of risk scoring: Additional…

Principle of Least Privilege

The principle of least privilege is a fundamental security control that helps maintain information privacy. However, least privilege starts to lose its effectiveness when too many users are given access to information. Data leaks commonly happen as information gets passed between people without oversight. NIST Special Publication (SP) 800-53 is a comprehensive framework for security…

Apply filters to SQL queries

Project description I am a security professional at a large organization. Part of my job is to investigate security issues to help keep the system secure. I recently discovered some potential security issues that involve login attempts and employee machines. My task is to examine the organization’s data in their employees and log_in_attempts tables. I’ll…

File permissions in Linux

Project description In this project, I am going to examine existing permissions on a file system. Then, I will report if the permissions match the authorization that was given. If they do not match, I’ll modify the permissions to authorize the appropriate users and remove any unauthorized access. Check file and directory details Here a…

Statefull and Stateless Firewalls in a nutshell

Here for you, a breef explanation of network firewalls, focusing on stateful and stateless firewalls, and a small discussion on the role of intrusion detection and prevention systems. Network Firewalls A network firewall is a security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier…