Skip to main content

Posts

Mental Post: 1 #NTS

  A list of frameworks provided by Thinkful #ACheggService as I was looking over some publicly documented notes for #cybersecurity in planning your assessment(s) especially for ethical hacking. Please comment below (hopefully, without any malware) for other known or unknown frameworks. So depending on your stable grounds on utilizing tools, collecting data (really just being a stalker (more obsessively in CyberSECURITY)), retaining problems, and then responding, with our focus to launch in care and for the better of an organization, here are some frameworks. 1) MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) Framework, or knowledge base that categorizes real-world adversary behaviors. Click for IBM link -> https://lnkd.in/g2MXRxwY 2) OWASP (Open Web Application Security Project) Framework, or Website penetration testing methodology. 3) NIST (National Institute of Standard and Technology) CSF (Cybersecurity Framework), educated by the US department age...

Understanding DNS and Nameservers: A Complete Guide

The Domain Name System (DNS) is the silent backbone of the internet. It transforms human-friendly domain names into machine-readable IP addresses, allowing users to access websites, send emails, and more without having to memorize numerical addresses. In this article, we break down the components of DNS, how they interact, and why nameservers play such a crucial role. 1. DNS (Domain Name System) DNS, or Domain Name System, works like an internet phonebook. When a user types a domain name like example.com into a browser, DNS translates it into an IP address like 192.0.2.1 , which computers use to locate and connect to each other. 2. Name Server A nameserver is a specialized server that holds the DNS records for a domain. It responds to DNS queries by providing the necessary information to route traffic correctly. For example, if you own friza.net , you might use Cloudflare's nameservers like: abby.ns.cloudflare.com matt.ns.cloudflare.com These servers hold all records...

Modern Websites And Business

In today’s economy, a website isn’t just a digital brochure—it’s the core operational hub of a business. It sells products, handles transactions, processes identities, and often stores customer trust in the form of data. But just like a gleaming flagship store or corporate headquarters, a website must do more than attract visitors—it must protect its assets, enforce policies, and stand resilient under attack. The difference between a secure and vulnerable site isn’t just technical—it’s strategic. Security must be treated as an operational imperative and designed into the website’s foundation with the same attention a Fortune 500 CEO gives to financial controls, supply chains, and brand reputation.  1. Authentication: Gatekeeping the Front Lobby In a physical business, not everyone can walk into executive offices without clearance. Similarly, a website’s authentication system acts as a digital gatekeeper , validating the identity of users, vendors, and staff. Encrypted protocols ...

Conditions or really, the Access Control List: Firewall

More references for more information below: Title Link What Is a Firewall? Cloudflare Access Control Lists (ACLs) Cisco Firewall vs ACL Explained GeeksForGeeks Dynamic ACLs & Firewalls Microsoft Azure Docs Firewall Penetration Testing Offensive Security 🔐 Firewalls and ACLs: The Digital Bouncer Guarding the Network Party In the world of cybersecurity and network infrastructure, firewalls are often the  first line of defense  — but at their core, a firewall is simply an  automated Access Control List (ACL) . To understand how they function, imagine a  VIP party , where only  invited guests  are allowed past the velvet rope. 🎉 The Party Analogy: ACL as the Guest List A  firewall  acts like a  professional bouncer  standing at the door of a high-profile event. But this bouncer doesn't work alone — they use a  guest list  (the ACL) to check who’s allowed in. Like if you're white and you where sunglasses with none dark circles...

APIs: NahamSec Video referencing for more information.

The Waiters of the Web: APIs   Imagine you're at a restaurant. You sit at your table, look at the menu, and decide what you'd like to order. However, you're not going to cook the meal yourself. Instead, you tell the waiter what you want, and the waiter takes the order to the kitchen, where the chef prepares your dish. Then, the waiter brings it back to your table. In the digital world, an API (Application Programming Interface) acts like that waiter. It’s the messenger that takes requests from one system, passes them on to another system, and then brings back the response. APIs enable different software systems to communicate with each other and share data, allowing them to work together even if they're built in different programming languages or running on different devices. What Is an API? An API is a set of rules and protocols that allows one software application to talk to another. It defines how requests are made, what data can be accessed, and what the res...

Short brief presentation about AI

🧠 Cybersecurity & AI: The New Human #AIByCalculation Before machines, there were tally marks on stone walls . Humans counted, tracked, remembered. Over time, we built tools to help— abacuses, ledgers, locks, passwords . Each invention pushed the burden of memory and protection away from our hands. Then came automation. Scripts, programs, firewalls—machines that watched for us. But still, we wrote the rules. Still, we told them how to think. Until now. AI is not a tool we use. AI is a tool that builds tools. A machine that automates automation itself. It doesn’t just follow logic—it generates it . It doesn’t wait for our command—it calculates on instinct . 🔐 Cybersecurity Meets the Synthetic Mind In this new age, threats evolve in real-time . Phishing scams mimic your writing style. Malware morphs after every download. Ransomware thinks. You can’t write rulebooks fast enough. So we gave that job to AI. AI watches millions of logs, decodes patterns, flags anomalies— b...

The pretty and elegant woman that people may be curious of what she sees (Unfortunately, but not ultimately)

🔐 The Secret Cabinet: What Cybersecurity Really Protects She moves with quiet confidence. Red nails gleam as her hand slides a drawer shut— a sleek, obsidian cabinet clicks closed with a satisfying lock. A few passing coworkers glance her way, curious, maybe even envious. What’s in that drawer? A beauty secret? A confidential plan? A hidden flaw? They don’t know. And they never will —because what matters is not what's inside , but the fact that she protects it like it matters. And that’s exactly what cybersecurity does. 🧠 What Is Cybersecurity? Cybersecurity is the discipline of protecting digital assets , just like locking a file cabinet to keep prying eyes, greedy hands, or careless accidents from exposing what should stay private. Whether it's: Personal messages Banking information Proprietary code National secrets ...if it’s valuable, private, or powerful , it needs protecting. 🔒 Let’s Break Down the Cabinet Analogy Imagine the internet is a hig...