Soojin ParkCIS Control 18: Penetration TestingPenetration testing is as equally important as a vulnerability assessment. The term penetration testing can be defined as a cyber attack…2 min read·Jul 1, 2021----
Soojin ParkWhat is Incident Response?Any event that might cause a disruption to an organization’s operations including system breaches, any threats to harm to the CIA triad, or…2 min read·Jun 24, 2021----
Soojin ParkCIS Control 10 — Data Recovery Capabilities v7.1Have you ever lost a paper that you’re working on because you forgot to save and your system crashed? It is critical for organizations to…2 min read·Jun 17, 2021----
Soojin ParkBrute Force AttackIf you may recall from the previous Cyber Kill Chain blog, an attacker collections information during the reconnaissance phase and tries to…2 min read·Jun 13, 2021----
Soojin ParkDifferent Types of MalwareWhat is malware? It means malicious software — any software that is created to cause disruption, damage or to get unauthorized access to…2 min read·Jun 6, 2021----
Soojin ParkTCP vs UDPWhat is TCP and UDP? It is a protocol that exists in the Transport layer (layer 4) of the OSI model. Transmission Control Protocol (TCP)…2 min read·May 27, 2021----
Soojin ParkThe Cyber Kill ChainThe Cyber Kill Chain is a model developed by Lockheed Martin which helps organizations to identify and defend against cyber attacks. This…2 min read·May 23, 2021----
Soojin ParkHow to prepare for a Cybersecurity technical interviewI have recently been through my first technical interview with a company. I was given four broad topics — network, offensive, defensive…3 min read·May 11, 2021----
Soojin ParkData LeakageWhat is data leakage? This term can be taken literally — when data has been leaked outside of the organization, but usually without…2 min read·May 4, 2021----
Soojin ParkOpen Compliance and Ethics GroupOCEG stands for Open Compliance and Ethics Group. OCEG is a nonprofit organization group that started out to help improve compliance and…4 min read·Apr 30, 2021----