SOC and Incident Response
The process of investigating, minimizing, and mitigating the impacts of a security problem is known as incident response.
The process of investigating, minimizing, and mitigating the impacts of a security problem is known as incident response.
What is SOC? Security Operations Center is referred to as SOC. Cybersecurity experts monitor and evaluate a company’s networks and systems for security risks in a physical or virtual SOC, where they also react to security issues as they happen.
Introduction Virtual Network Computing also known as VNC, is defined as graphical desktop-sharing system. It is used for controlling another computer remotely, by transmitting the keyboard and mouse input from one computer to another, relaying on the graphical-screen updates, over a network.
Introduction One of the most popular communication protocols for remotely controlling systems is the Remote Desktop Protocol (RDP).
Introduction Netsh, in its full name Network Shell, is a command-line tool, for listing and configuring various network settings.
Introduction IPv6 is an Internet Protocol version 6, that was made to replace IPv4. Like IPv4, it is intended for routing data over the Internet.
The fact that cars are a target to hackers is not surprising. Discovering a vulnerability in a car brings fame to ethical hackers, while unethical hackers can sell their finding to automotive gangs.
IPv6 address consists of 3 parts: Global Routing Prefix, Subnet ID and Interface ID. Interface ID identifies an interface of particular node and is unique within the subnet.
Introduction Windows 10 Timeline is a relatively new forensic artefact, which was introduced in Windows 10 version 1803.