Ethical hacking and penetration testing are common terms, popular in information security environment for a long time. Increase in cyber crimes and hacking create a great challenge for security experts and analyst and regulations over the last decade. This war between hacker and security professional become more popular.
A Virtual Private Cloud is a cloud computing model which offers on-demand configurable pool of shared computing resources allocated within a public cloud environment while providing a certain level of isolation from other users of the public cloud. Since the cloud (pool of resources) is only accessible to a single client in a VPC model, it therefore offers privacy with greater control and a secure environment where only the specified client can operate.
Let’s define a few terms before we start,
SIEM: SIEM is a software solution that collects log records of every endpoint and network activity, correlates these logs to identify indicators of compromise, and alerts security analysts when attacks are detected. They provide real-time analysis of security alerts generated by applications and network hardware. All modern SIEM provides
Malware gets a profit of the vulnerabilities in the operating system or the vulnerabilities brought in by you, by clicking on the malicious links. A malware program is functioning initially before the malware insert itself into the system.
The idea of programmable networks has newly re-gained substantial momentum due to the emergence of the Software-Defined Networking (SDN) paradigm. Outdated network architectures are ill-suited to meet the requirements of today’s enterprises, carriers, and end users. SDN often referred to as a key enabler that promises dramatically simplify network management and enable innovation through network programmability.
In a corporate network, if we talk about information security & security audits, the most common term “Pentester” is often used. Pentesters are the penetration testers having permission to penetrate a system. Penetration testing, in short, Pentesting is a penetrating process with the permission of the owner to evaluate security, hack value, Target of Evaluation (TOE), attacks vectors, exploits, zero-day vulnerability & other components such as threats,
Amazon Web Services is one of the global public cloud provider having a worldwide network of infrastructure that spans across 18 geographic Regions with 53 Availability Zones and 1 Local Region around the world, with further announced plans for 12 more Availability Zones and four more Regions in Bahrain, Hong Kong SAR, Sweden, and a second AWS GovCloud Region in the US. The main components that make up the
Do you know what is Overlay Transport Virtualization (OTV)?
It’s basically “Ethernet over MPLS over GRE over IP”.
Are you impressed?