Social engineering

  • Post author:
  • Post category:KSH

In a world where information systems are protected by military-grade encryption layers, cybercriminals have realized that it’s far easier to ask for the key than to break the lock. Welcome…

Continue ReadingSocial engineering

Audit

  • Post author:
  • Post category:KSH

What is a security audit? A computer security audit is an analysis carried out to check whether a company’s information systems are properly protected and whether security rules are correctly…

Continue ReadingAudit

Pentest

  • Post author:
  • Post category:KSH

What is a Pentest? A pentest, short for penetration test, is a method used to assess the security of an information system.A company voluntarily asks specialists to test its systems…

Continue ReadingPentest

Hashing

  • Post author:
  • Post category:KSH

Result of a mathematical calculation applied to a password in order to avoid storing it in plain text. Advantages: Data is never stored in plain text. Non-reversible.Very useful when it…

Continue ReadingHashing

Ebios vs nist 2

  • Post author:
  • Post category:KSH

1. Overview of EBIOS Risk Manager EBIOS (Expression of Needs and Identification of Security Objectives) is a French cyber risk analysis and management methodology developed by ANSSI (the French National…

Continue ReadingEbios vs nist 2

Directories

  • Post author:
  • Post category:KSH

Authentication is an essential mechanism in cybersecurity. It allows the verification of a user’s identity before granting access to a system, an application, or sensitive data. With the increase in…

Continue ReadingDirectories

Authentication

  • Post author:
  • Post category:KSH

Authentication is a central pillar of information system security. It makes it possible to verify a user’s identity before granting access to a service, an application, or sensitive data.Today, in…

Continue ReadingAuthentication