1.I've been Documenting all my journey both online and offline.
2. I haven't seen the link for the lazarus news but I made a research online and found lazarus as a group of unknown numbers of hackers
1.I've been Documenting all my journey both online and offline.
2. I haven't seen the link for the lazarus news but I made a research online and found lazarus as a group of unknown numbers of hackers
Information assets is any data or information that holds the value of individual or an organization.
Types personal information
Intellectual property
Financial information
Business strategy
Trade secrets
Etc.
Information assets is any data or information that holds the value of individual or an organization.
Types personal information
Intellectual property
Financial information
Business strategy
Trade secrets
Etc.
Cryptography✅
Encryption and it's type ✅
Hashing ✅
Digital Signatures✅
SSL AND TLS✅
Cryptography✅
Encryption and it's type ✅
Hashing ✅
Digital Signatures✅
SSL AND TLS✅
Why Cybersecurity is important :
Preventing cyber attacks (masking sure that we are safe online)
Protecting sensitive info (things like customer data in hotel, patient documents in hospital)
Why Cybersecurity is important :
Preventing cyber attacks (masking sure that we are safe online)
Protecting sensitive info (things like customer data in hotel, patient documents in hospital)
#Cybersecurity #GirlsInTech #100daysofcode #100daysofTech #100daysofcybersecurity
#Cybersecurity #GirlsInTech #100daysofcode #100daysofTech #100daysofcybersecurity
Threat and attack:
Any potential danger to information and exploiting the vulnerabilities to steal or damage data.
I have an assignment on this but my network is failing, I'll do it later.
Threat and attack:
Any potential danger to information and exploiting the vulnerabilities to steal or damage data.
I have an assignment on this but my network is failing, I'll do it later.
thehackernews.com/2025/09/adob...
#devops #100DaysOfCode #100DaysOfCyberSecurity #Cybersecurity #CybersecurityNews #CyberSecurityAwareness #100daysofcodechallenge #100DaysOfCode #Adobe #Magento #magento2
thehackernews.com/2025/09/adob...
#devops #100DaysOfCode #100DaysOfCyberSecurity #Cybersecurity #CybersecurityNews #CyberSecurityAwareness #100daysofcodechallenge #100DaysOfCode #Adobe #Magento #magento2
Already covered
✅ NIST RMF
✅ RMF 7 Steps
✅ Risks, threats and
vulnerabilities
Already covered
✅ NIST RMF
✅ RMF 7 Steps
✅ Risks, threats and
vulnerabilities
#100DaysOfCyberSecurity
Threats VS Attacks:
Threats are potential warning or danger.
Attack is when the harmful action actually happens.
#100DaysOfCyberSecurity
Threats VS Attacks:
Threats are potential warning or danger.
Attack is when the harmful action actually happens.
Today we covered OSI Seven Layers
✅ Applications Layer
✅ Presentation Layer
✅ Session Layer
✅ Network Layer
✅ Transport Layer
✅ Data Link Layer
✅ Physical Layer
Today we covered OSI Seven Layers
✅ Applications Layer
✅ Presentation Layer
✅ Session Layer
✅ Network Layer
✅ Transport Layer
✅ Data Link Layer
✅ Physical Layer
✅ Graded Assignment passed!
✅ Certified by Google
✅ Graded Assignment passed!
✅ Certified by Google