by Subin Shrestha | Dec 21, 2022 | Blog
Network assessment is the process of evaluating the performance, security, and configuration of a computer network. It involves identifying and analyzing the hardware, software, and protocols used in the network. In addition it includes the examination of the...
by Subin Shrestha | Dec 20, 2022 | Blog
A Threat Intelligence & Defense Operation. In the context of cyber security, SOC (Security Operations Center) is a security organization. It responsible for monitoring and defending an organization’s information systems and networks against cyber threats. A...
by Subin Shrestha | Dec 19, 2022 | Blog
The OSI model (Open Systems Interconnection model) is a framework for understanding how communications protocols work. It divides the process of transmitting data across a network into seven different layers. Each of the layers performs a specific function. The OSI...
by Subin Shrestha | Dec 17, 2022 | Blog
Security Information and Event Management (SIEM) is a cybersecurity strategy that involves the collection, analysis, and reporting of security-related data from multiple sources. The goal of SIEM is to provide organizations with a comprehensive view of their security...
by Subin Shrestha | Dec 15, 2022 | Blog
What is ARP(Address Resolution Protocol)? Address Resolution Protocol is a layer 2 protocol that finds MAC address of unknown host from its known IP address. The IP address as well as the MAC address is required for this communication. The Data link layer is...
by Subin Shrestha | Oct 21, 2022 | Blog
Cyber security procedures are security standards that enable enterprises to employ safe security measures in order to reduce the number of effective cyber security attacks. Furthermore, cyber security protects key systems and sensitive data from a growing number of...