Tag cybersecurity

List of Password Recovery Tools

This post contains a list of password recovery tools, also known as password cracking tools. List of password recovery tools: Passware Kit Forensic ( WINDOWS PASSWORD RECOVERY TOOL ULTIMATE ( Stellar Phoenix Password Recovery ( Windows Password Recovery Tool (…

Cloud Deployment Models

This post features different types of clouds. This post is part of the introduction to cloud computing. Virtual Private Cloud (VPC) Featured Cloud Deployment Models Cloud Deployment Models: Private Cloud: A private cloud, also known as internal or corporate cloud,…

Types of Wi-Fi Connections

Encryption algorithms: Encryption protocols: Wi-Fi security modes: Authentication options supported by WPA, WPA2 and WPA3: PSK is the use of a static fixed password or authentication. ENT enables the leveraging of and existing AAA (Authentication, Authorization and Accounting) service to…

Cybersecurity Attack Phases

According to EC-Council EC-Council identify in the CEH course 5 hacking phases: Reconnaissance Scanning Gaining Access Maintaining Access Clearing Tracks According to ISACA ISACA identify 8 phases in a cybersecurity generalized attack processs: Perform reconnaissance Create attack tools Deliver malicious…