Jump to content

Cyber Security


Discuss methods to keep software and the development cycle free of threats.

Discuss ways to protect the confidentiality and integrity of data.

Discuss policies and practices used to secure network infrastructures from unauthorized access.

Discuss methods and techniques for gathering information, discovering vulnerabilities, creating/using exploits, and maintaining access.

Social engineering is a manipulation technique that exploits human psychology to gain confidential information, access, or permissions that would otherwise be unavailable. This method often involves tricking individuals into breaking normal security procedures, such as by impersonating trusted figures or creating scenarios that prompt the victim to divulge sensitive information or grant access. Social engineering is commonly used in cybersecurity attacks, such as phishing scams, but can also be employed in various contexts where manipulating human behavior is advantageous.

Open Source Intelligence (OSINT) refers to the process of collecting and analyzing information from publicly available sources for intelligence purposes. It encompasses a wide range of sources such as media, internet, public government data, professional and academic publications, and other publicly accessible information. OSINT is used in various fields including national security, law enforcement, business intelligence, and cybersecurity to gather insights without resorting to clandestine or covert methods.

No posts here yet

  • Create New...