Soojin ParkCIS Control 18: Penetration TestingPenetration testing is as equally important as a vulnerability assessment. The term penetration testing can be defined as a cyber attack…Jul 1, 2021Jul 1, 2021
Soojin ParkWhat is Incident Response?Any event that might cause a disruption to an organization’s operations including system breaches, any threats to harm to the CIA triad, or…Jun 24, 2021Jun 24, 2021
Soojin ParkCIS Control 10 — Data Recovery Capabilities v7.1Have you ever lost a paper that you’re working on because you forgot to save and your system crashed? It is critical for organizations to…Jun 17, 2021Jun 17, 2021
Soojin ParkBrute Force AttackIf you may recall from the previous Cyber Kill Chain blog, an attacker collections information during the reconnaissance phase and tries to…Jun 13, 2021Jun 13, 2021
Soojin ParkDifferent Types of MalwareWhat is malware? It means malicious software — any software that is created to cause disruption, damage or to get unauthorized access to…Jun 6, 2021Jun 6, 2021
Soojin ParkTCP vs UDPWhat is TCP and UDP? It is a protocol that exists in the Transport layer (layer 4) of the OSI model. Transmission Control Protocol (TCP)…May 27, 2021May 27, 2021
Soojin ParkThe Cyber Kill ChainThe Cyber Kill Chain is a model developed by Lockheed Martin which helps organizations to identify and defend against cyber attacks. This…May 23, 2021May 23, 2021
Soojin ParkHow to prepare for a Cybersecurity technical interviewI have recently been through my first technical interview with a company. I was given four broad topics — network, offensive, defensive…May 11, 2021May 11, 2021
Soojin ParkData LeakageWhat is data leakage? This term can be taken literally — when data has been leaked outside of the organization, but usually without…May 4, 2021May 4, 2021
Soojin ParkOpen Compliance and Ethics GroupOCEG stands for Open Compliance and Ethics Group. OCEG is a nonprofit organization group that started out to help improve compliance and…Apr 30, 2021Apr 30, 2021