top of page

WOORKK BLOGS
Welcome to SecureSphere
Step into the realm of digital guardianship. Explore the latest in cybersecurity strategies, dive deep into blue-team labs, and fortify your defenses against digital threats. Welcome to your sanctuary in the world of security
Search
Assessing the Risk in an Enterprise
Facilitated Data Gathering: Collecting information about organizational assets, their descriptions, security threats they face,...
Jul 8, 20241 min read
2
0


Enterprise Risk Management Model
Enterprize Risk Management Review Process: Risk Identification: Identify potential events or situations that could occur within a...
Jul 8, 20242 min read
1
0


Security & Risk Management Pre-requisites
Types of Risk Analysis Quantitative Identify and value assets: Identify and assess the value of all assets (physical, intellectual, etc.)...
Jul 8, 20243 min read
2
0


Security & Risk Management Concepts
Critical Assets in an Enterprise Asset is anything of value: Physical Assets & Logical Assets • People and skills • Goodwill • Hardware/...
Jul 8, 20245 min read
1
0


Introduction to Risk Analysis, RiskAssessment & Risk Mitigation
Information Security & Risk Management Information Security:Â Ensures the confidentiality, integrity, availability, and safety of...
Jul 8, 20243 min read
2
0


COBIT 5 (PART-4)
Implementing Information Security Initiatives When implementing information security initiatives, COBIT 5 for Information Security...
Jul 8, 20242 min read
2
0


COBIT 5 (PART-3)
COBIT 5 for Information Security Information Information is a key resource for all enterprises. It is created, used, retained, disclosed,...
Jul 8, 20244 min read
1
0


COBIT 5 (PART-2)
COBIT 5 Implementation: Step-Ahead Approach Implementing COBIT 5 involves a structured and iterative approach to ensure comprehensive...
Jul 8, 20242 min read
3
0


COBIT 5
COBIT (Control Objectives for Information and Related Technologies)Â is a best-practice framework developed by the international...
Jul 8, 20242 min read
4
0


Boss of the SOC v1: Threat Hunting with Splunk
Connecting to Splunk: Visit either of these websites: Splunk Site 1Â or Splunk Site 2. Use the login credentials: username "student1" and...
May 24, 20244 min read
41
0
Unmasking the Digital Guardians: The Basics of Security Operations Centers (SOCs)
In today’s digital age, where cyber threats lurk around every corner, organizations need robust defenses to protect their sensitive data....
May 23, 20243 min read
3
0
CEH V11
module 1: Information security is well being of information and infrastructure where the possibility of theft, etc is less. Major five:...
Mar 14, 20224 min read
49
2


Android Security
Smart phones are becoming primary target for cyber crimes as it is easy to target and can provide a lot of information and are rarely...
Nov 25, 20213 min read
3
0


Data Security
Why is the computer security usually fail against attacks? The reason is that system users are often unaware of the threats they're...
Sep 21, 20212 min read
3
0


Cyber War
The first cyber war broke out in 2007 when China attacked Germany and the US soon after Estonia became victim of another wave of cyber...
Sep 11, 20212 min read
1
0


Online privacy
The privacy is threatened by cyber criminals. These cyber criminals should be classified into two characteristics; Skills Motivations...
Sep 7, 20213 min read
0
0
Gather Information
You can gather information through mypast.com and intelius.com. These sites allow you to search people information through internet. You...
Aug 28, 20212 min read
2
0
Trends Of IT
The first catalyst for the change is the birth of the technology society; The internet or specifically social networking sites, have made...
Aug 14, 20211 min read
0
0
Popular Myths-2
5. Thanks to the technology, you don't need physical protection or security policy: This is false. People deny the simple truth can the...
Aug 12, 20212 min read
0
0
Popular Myths
Let's start by reaching back in history to get a better picture of the origins of these false assumptions The first 32 bit microprocessor...
Aug 10, 20212 min read
15
0
bottom of page