siemxpert

siemxpert

tcp vs udp

What are TCP and UDP transport protocols

SPLUNK TRAINING WITH REAL-TIME LAB ACCESS TCP (Transmission Control Protocol): The translation control protocol (TCP)  is just a connection-oriented, reliable protocol.  TCP explicitly defines connection establishment,  data transfer,  and connection tear-down phases to offer a connection-oriented service. TCP uses a combination of GBN and SR protocols to offer reliability. To achieve this goal, TCP uses …

What are TCP and UDP transport protocols Read More »

cyber kill chain & its process

Cyber Kill Chain

What is Cyber Kill Chain? The cyber kill chain is also a variation of the military’s kill chain, which can be a step-by-step approach that identifies and stops the attacker’s activity. Originally factory-made by Lockheed Martin in 2011, the cyber kill chain outlines the various stages of many common cyberattacks and, by extension, the points wherever the data security team will Prevent, detect or intercept attackers. The cyber …

Cyber Kill Chain Read More »

splunk architecture

Splunk Architecture

What is Splunk? Splunk is a well-developed and advanced software tool designed for organizations to perform indexing and searching log files stored in a system. It analyzes machine-generated data in real-time. It also searches, monitors, and examines machine-generated data via a web-style interface. Apart from examining machine-generated data it also captures, indexes, and correlates the …

Splunk Architecture Read More »

Cross-site scripting

Cross-site scripting XSS attack Types of Attack & Preventions

What is Cross-site Scripting (XSS) Cross-site scripting is often referred to or abbreviated as XSS because it occurs on the client-side. Here the attacker aims to inject some malicious scripts into the user’s web browser, by sending a link to the user and provoking the user to click it. If any action is performed by …

Cross-site scripting XSS attack Types of Attack & Preventions Read More »

qradar training

What is Qradar & Its Architecture

What is Qradar? IBM QRadar is an enterprise security information and event management (SIEM) product. It collects log data from an enterprise, its network devices, host assets and os (Operation System), applications, vulnerabilities, and user activities and behaviors. IBM QRadar Security Information and Event Management (SIEM) helps security teams accurately detect and prioritize threats across the …

What is Qradar & Its Architecture Read More »

Functionality & Characteristics of OSI model

Functionality & Characteristics of OSI model

Functionality & Characteristics of OSI model Functions of each layer in OSI model: 1) Physical Layer It specifies the transmission media between two connecting devices. In addition, it specifies the information rate(number of bits sent each second) within the defined media. It defines the topology of the network. The topology might be Bus, Ring, Star, …

Functionality & Characteristics of OSI model Read More »

OSI MODEL INTERVIEW QUESTIONS

OSI MODEL INTERVIEW QUESTIONS AND ANSWERS

OSI Model Most Frequently asked Interview Questions & Answers What is OSI Model? OSI means Open System Interconnection. You can find 7 layers in the OSI model and each layer includes a different capability. OSI model helps networking professionals in understanding information flow from source to destination. Even though the OSI model not performing any …

OSI MODEL INTERVIEW QUESTIONS AND ANSWERS Read More »

OSI MODEL & ITS 7 LAYERS

What is OSI Model & 7 Layers of the OSI Model Explained

What is OSI Model & It’s Definition? The Definition of OSI(Open Systems Interconnection Model) is just a layered and conceptual model that allows communication between all forms of the computer system. It has 7 layers of the OSI network model. The OSI model was introduced by ISO(International Organization for Standardization) in 1984. Primary computer and …

What is OSI Model & 7 Layers of the OSI Model Explained Read More »