Skip to content
23 Mar, 2023
Latest News
DarkHotel
The Mirai Botnet
The OWASP Top 10

Cyberdirective

Your Cyber resource

  • Home
  • Privacy Policy
  • Home
  • Cyber Security

Category: Cyber Security

The Mirai Botnet

December 2, 2018December 2, 2018 Andre' du Toit

A DDoS[1] attack on US internet service provider Dyn took place on the 21st of October, 2016. The attack took the form of a botnet of internet connected devices (primarily Digital Video Recorders and Webcams) […]

Cyber Security, Cyber War, Hacking

The OWASP Top 10

November 28, 2018November 28, 2018 Andre' du Toit

The non-profit Open Web Application Security Project (OWASP – https://www.owasp.org/) provides a list of 10 Risks to Web Application Security to guide architects, developers and security practitioners on critical vulnerabilities commonly present in web applications […]

Cyber Security, Penetration Testing, Secure Coding

The ACSC Essential Eight

November 20, 2018 Andre' du Toit

Australia’s Cyber Security Centre (ACSC – https://www.acsc.gov.au/) provides a list of eight mitigation strategies (the Essential Eight) with practical guidelines for organisations to follow in order to mitigate cyber-attacks via prevalent attack vectors and to […]

Cyber Incident, Cyber Security

IoT device growth: Future Information Warfare and Cyber-Terrorism impacts

November 6, 2018November 7, 2018 Andre' du Toit

The worldwide transition of IT systems deployed in closed networks and in-house enterprise IT networks to the public facing Internet is accelerating at a disturbing pace, raising justified concerns about security. Increasing reliance on intelligent, […]

Cyber Incident, Cyber Security, Cyber Terrorism, Cyber War, HackingCyber Terrorism, Cyber War, Internet of Things, IoT

Confidentiality, Integrity and Availability (CIA) of data

November 6, 2018November 7, 2018 Andre' du Toit

The Confidentiality, Integrity and Availability (CIA) concept: The CIA Triad is a respected, recognized model for information security policy development which is utilised to identify problem spheres and significant solutions for information security. This paper […]

Cyber SecurityCIA Triad, Information Assurance, Information Security

Recent Posts

  • DarkHotel
  • The Mirai Botnet
  • The OWASP Top 10
  • The ACSC Essential Eight
  • IoT device growth: Future Information Warfare and Cyber-Terrorism impacts

Categories

  • Cloud Computing
  • Cyber Incident
  • Cyber Security
  • Cyber Terrorism
  • Cyber War
  • Hacking
  • Penetration Testing
  • Secure Coding
  • Uncategorized
Copyright © 2018 NeuraLimits - All rights reserved.
Magazine Plus by WEN Themes