Showing posts with label Cyber Security. Show all posts
Showing posts with label Cyber Security. Show all posts

Sunday, July 30, 2023

how to setup password for an AWS EC2 running instance

The AWS EC2 Linux instance uses a .pem private key file to authenticate the default ubuntu user account.

Let us learn about how to set up a password on your running EC2 instance,

Prerequisites

  • You have ec2 instance running
  • You have root access to ec2 instance

Step 1

Connect to your Linux ec2 instance via putty (/ssh).

Step 2

Login to your running instance

Step 3

Execute below command:

sudo passwd ec2-user

And write the password

Step 4

Now it’s time to go to the directory

/etc/ssh

and follow below command

sudo vim sshd_config 

Step 5

After you apply the command, 

Press “i” and

Now go to the “passwordauthentication” and write “yes”

After change, it please save it

Perfect

Step 6

Last command is

sudo service sshd restart

and disconnect and login again using username and password 

Friday, February 17, 2023

Difference between Hub Switch Router & Firewall

 Hub

Hubs are used to connect multiple devices in a network. They’re less likely to be seen in business or corporate networks than in home networks. Hubs are wired devices and are not as smart as switches or routers.

Switches
Switches are wired devices that know the addresses of the devices connected to them and route traffic to that port/device rather than retransmitting to all devices.
Offering greater efficiency for traffic delivery and improving the overall throughput of data, switches are smarter than hubs but not as smart as routers

Router
Routers are used to control traffic flow on networks and are often used to connect similar networks and control traffic flow between them. Routers can be wired or wireless and can connect multiple switches. Smarter than hubs and switches, routers determine the most efficient “route” for the traffic to flow across the network.

Firewalls
Firewalls are essential tools in managing and controlling network traffic and protecting the network. A firewall is a network device used to filter traffic. It is typically deployed between a private network and the internet, but it can also be deployed between departments (segmented networks) within an organization (overall network). Firewalls filter traffic based on a defined set of rules, also called filters or access control lists.

Thursday, September 1, 2022

Sunday, May 15, 2022

Difference between Authentication & Authorization

Authentification can be defined as the verification of a claim of identity by a user, a process, or a device, often as a prerequisite to granting it access to resources within a system.  This can be done once or many times during a particular session, workday or other period of activity consisting of multiple steps & tasks.

Authorization is the real-time decision that a system-issued identity claiming to have access rights to that system can be verified to be a (a) System-issued valid identity which is (b) being used or presented by the subject it has been issued to.

Simply put, authentication is the process of verifying who someone is, whereas authorization is the process of verifying what specific applications, files & data a user has access to.

courtesy: http://medium.com





Thursday, May 5, 2022

Difference Between a Data Leak and a Data Breach

 A data breach is the outcome of a planned cyber attack, but a data leak is the accidental exposure of sensitive data by a business. Cybercriminals do not create data leaks, they discover them and then use them to launch data breach attacks. 

Data leaks tend to result from poor security practices. A business can also be impacted if any of its vendors have a data leak. Because these vulnerabilities occur throughout a vast attack landscape they’re difficult to detect and remediate before it’s too late. 

Without a sophisticated data protection solution, businesses will remain vulnerable to data breaches through their third-party network.

Courtesy - www.upgaurd.com 

Featured

TechBytes on Linux

This is a growing list of Linux commands which might come handy for the of Linux users. 1. Found out i had to set the date like this: ...

Popular Posts