top of page

WOORKK BLOGS
Welcome to SecureSphere
Step into the realm of digital guardianship. Explore the latest in cybersecurity strategies, dive deep into blue-team labs, and fortify your defenses against digital threats. Welcome to your sanctuary in the world of security
Search
Assessing the Risk in an Enterprise
Facilitated Data Gathering: Collecting information about organizational assets, their descriptions, security threats they face,...
Jul 8, 20241 min read


Enterprise Risk Management Model
Enterprize Risk Management Review Process: Risk Identification: Identify potential events or situations that could occur within a...
Jul 8, 20242 min read


Security & Risk Management Pre-requisites
Types of Risk Analysis Quantitative Identify and value assets: Identify and assess the value of all assets (physical, intellectual, etc.)...
Jul 8, 20243 min read


Security & Risk Management Concepts
Critical Assets in an Enterprise Asset is anything of value: Physical Assets & Logical Assets • People and skills • Goodwill • Hardware/...
Jul 8, 20245 min read


Introduction to Risk Analysis, RiskAssessment & Risk Mitigation
Information Security & Risk Management Information Security: Ensures the confidentiality, integrity, availability, and safety of...
Jul 8, 20243 min read


COBIT 5 (PART-4)
Implementing Information Security Initiatives When implementing information security initiatives, COBIT 5 for Information Security...
Jul 8, 20242 min read


COBIT 5 (PART-3)
COBIT 5 for Information Security Information Information is a key resource for all enterprises. It is created, used, retained, disclosed,...
Jul 8, 20244 min read


COBIT 5 (PART-2)
COBIT 5 Implementation: Step-Ahead Approach Implementing COBIT 5 involves a structured and iterative approach to ensure comprehensive...
Jul 8, 20242 min read


COBIT 5
COBIT (Control Objectives for Information and Related Technologies) is a best-practice framework developed by the international...
Jul 8, 20242 min read


Boss of the SOC v1: Threat Hunting with Splunk
Connecting to Splunk: Visit either of these websites: Splunk Site 1 or Splunk Site 2. Use the login credentials: username "student1" and...
May 24, 20244 min read
Unmasking the Digital Guardians: The Basics of Security Operations Centers (SOCs)
In today’s digital age, where cyber threats lurk around every corner, organizations need robust defenses to protect their sensitive data....
May 23, 20243 min read
CEH V11
module 1: Information security is well being of information and infrastructure where the possibility of theft, etc is less. Major five:...
Mar 14, 20224 min read


Android Security
Smart phones are becoming primary target for cyber crimes as it is easy to target and can provide a lot of information and are rarely...
Nov 25, 20213 min read


Data Security
Why is the computer security usually fail against attacks? The reason is that system users are often unaware of the threats they're...
Sep 21, 20212 min read


Cyber War
The first cyber war broke out in 2007 when China attacked Germany and the US soon after Estonia became victim of another wave of cyber...
Sep 11, 20212 min read


Online privacy
The privacy is threatened by cyber criminals. These cyber criminals should be classified into two characteristics; Skills Motivations...
Sep 7, 20213 min read
Gather Information
You can gather information through mypast.com and intelius.com. These sites allow you to search people information through internet. You...
Aug 28, 20212 min read
Trends Of IT
The first catalyst for the change is the birth of the technology society; The internet or specifically social networking sites, have made...
Aug 14, 20211 min read
Popular Myths-2
5. Thanks to the technology, you don't need physical protection or security policy: This is false. People deny the simple truth can the...
Aug 12, 20212 min read
Popular Myths
Let's start by reaching back in history to get a better picture of the origins of these false assumptions The first 32 bit microprocessor...
Aug 10, 20212 min read
bottom of page