Skip to main content

Posts

Showing posts with the label Cyber Security

how to setup password for an AWS EC2 running instance

The AWS EC2 Linux instance uses a .pem private key file to authenticate the default ubuntu user account. Let us learn about how to set up a password on your running EC2 instance, Prerequisites You have ec2 instance running You have root access to ec2 instance Step 1 Connect to your Linux ec2 instance via putty (/ssh). Step 2 Login to your running instance Step 3 Execute below command: sudo passwd ec2-user And write the password Step 4 Now it’s time to go to the directory /etc/ssh and follow below command sudo vim sshd_config Step 5 After you apply the command,  Press “i” and Now go to the “passwordauthentication” and write “yes” After change, it please save it Perfect Step 6 Last command is sudo service sshd restart and disconnect and login again using username and password 

Difference between Hub Switch Router & Firewall

  Hub Hubs are used to connect multiple devices in a network. They’re less likely to be seen in business or corporate networks than in home networks. Hubs are wired devices and are not as smart as switches or routers. Switches Switches are wired devices that know the addresses of the devices connected to them and route traffic to that port/device rather than retransmitting to all devices. Offering greater efficiency for traffic delivery and improving the overall throughput of data, switches are smarter than hubs but not as smart as routers Router Routers are used to control traffic flow on networks and are often used to connect similar networks and control traffic flow between them. Routers can be wired or wireless and can connect multiple switches. Smarter than hubs and switches, routers determine the most efficient “route” for the traffic to flow across the network. Firewalls Firewalls are essential tools in managing and controlling network traffic and protecting the network. A f...

Happy to share my certificate of completion for API Security Architect

 Happy to share my certificate of completion for API Security Architect provided by API academy Certification program .  

Difference between Authentication & Authorization

Authentification can be defined as the verification of a claim of identity by a user, a process, or a device, often as a prerequisite to granting it access to resources within a system.  This can be done once or many times during a particular session, workday or other period of activity consisting of multiple steps & tasks. Authorization is the real-time decision that a system-issued identity claiming to have access rights to that system can be verified to be a (a) System-issued valid identity which is (b) being used or presented by the subject it has been issued to. Simply put, authentication is the process of verifying who someone is, whereas authorization is the process of verifying what specific applications, files & data a user has access to. courtesy: http://medium.com

Difference Between a Data Leak and a Data Breach

  A   data breach is the outcome of a planned cyber attack , but a data leak is the accidental exposure of sensitive data by a business. Cybercriminals do not create data leaks, they discover them and then use them to launch data breach attacks.   Data leaks tend to result from poor security practices. A business can also be impacted if any of its vendors have a data leak. Because these vulnerabilities occur throughout a vast attack landscape they’re difficult to detect and remediate before it’s too late.  Without a sophisticated data protection solution, businesses will remain vulnerable to data breaches through their third-party network. Courtesy - www.upgaurd.com