cissp
16.5K subscribers
955 photos
66 videos
1.73K files
4.8K links
@cissp
International channel 4 Transmission Knowledge In the Field of Cyber Security with a Focus on the Content of the CISSP-ISC2 Course
- - - - - - - - - -
+also group: https://t.me/cisspgroup
—————————
@alirezaghahrood
Download Telegram
OODA!
official new SANS MGT521 course on Security Culture. If you are an experienced Awareness Officer or senior Security Leader looking to develop your culture, join us 23/24 Feb in San Francisco. https://lnkd.in/e8vxuSf

👍🏽👌🏽
What Is Personally Identifiable Information (PII)?

Personally identifiable information (social security numbers, addresses, names, etc.) is frequently targeted during cyber-attacks.

A DEFINITION OF PERSONALLY IDENTIFIABLE INFORMATION

The United States Department of Labor defines personally identifiable information as: “Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred be either direct or indirect means.

https://digitalguardian.com/blog/what-personally-identifiable-information
If you have ever contacted Microsoft for support in the past 14 years, your technical query, along with some personally identifiable information might have been compromised.

Unprotected Database Exposed 250 Million Microsoft Customer Support Records Online

https://thehackernews.com/2020/01/microsoft-customer-support.html
Attack -Cloud:

Service Hijacking using Social Engineering Attacks
Session Hijacking using XSS Attack
Domain Name System (DNS) Attack
SQL Injection Attack
Wrapping Attack
Service Hijacking using Network Sniffing
Session Hijacking using Session Riding
Side Channel Attack or Cross-guest VM Breaches
Cryptanalysis
Dos / DDoS Attacks
IoT Hacking
IoT Attacks:

DDoS Attack
Rolling Code Attack
BlueBorne Attack
Jamming Attack
Backdoor
Eavesdropping
Sybil Attack
Exploit Kits
Man-in-the-Middle Attack
Replay Attack
Forged Malicious Devices
Side Channel Attack
Ransomware Attack
Dear Connections , Friends

Do you feel that in Next 5 years Traditional Networking devices will be replaced by SDN (software defined networking)?
If yes,
then what you and your organisation is doing about it? 👌🏽👍🏽
@cisspgroup
CVE-2019-18426

WhatsApp for Web and Desktop contained multiple vulnerabilities, which, when combined together, could have even allowed remote attackers to read files from a victim's local file-system just by sending messages.

Read details:
https://thehackernews.com/2020/02/hack-whatsapp-web.html
Dear Connections, Friends

I am planning of coming up with a flow chart, that will help you to take decisions for transition from current job (IT only) to cyber security. Please send your current skill in the MSG linkedin
Or pm to me at telegram @alirezaghahrood
👌🏽🙏👍🏽
Crack ing Password:
Passwords are the go to way for providing authentication in many applications.
Assess how strong your password is by looking at the chart below.