You are here:-Cyber security

Cyber Security Briefing – Report

1.    Introduction The information being processed in every organization is meant to be secured from the unauthorized person for various reasons including, leakage interpretation. The organizations are also focusing on implementing best practices that could ensure the security of information that they store for different processes, like for prognosis or for record keeping. In order

Threat Modeling And Vulnerability Assessment – Walmart

1.                Abstract Threat modeling and vulnerability assessment are new methodologies that are being adopted in the development of applications and information systems in order to protect the information in a better way. In this paper, we will talk about why Walmart needs these methodologies despite its security programs and how the company can benefit from

CyberStalking and Child Pornography – Case Analysis

Report On 14th August 2014, a cybercriminal named Michael Martinez was arrested on a charge of multiple charges that he had been committing from October 2013. The suspect was charged with sextortion, cyberstalking, and child exploitation with one minor charge. The arrest of the suspect as “Del Rio Man Arrested on Federal Cyberstalking and Child

Cyber Security Principles – Question Answer

Malware has been around for a long. You are asked to investigate a particular malware and answering the following questions (in complete sentences) based on Internet research: What is the common name and any pseudonyms or variant names? The malware dyreza has been a threat to the banks as it tries to steal the credentials

McAfee Antivirus – Assessment

McAfee antivirus McAfee antivirus is the first antivirus program ever introduced in computer market in order to keep the computer running without any interruption by the viruses. It sold around 1 million copies for its first antivirus. Now it has been acquired by Intel and now has been renamed as Intel Security. Intel decided to