Abstract This purpose of this research is to provide a high-level survey of the Sarbanes-Oxley Act (SOx) of 2002 and…
Abstract The aim of this short study is to assess the difference between Information Assurance (IA) and cybersecurity. The first…
Abstract The aim of this qualitative study is to research the Zachman Framework (ZF). The first phase of this study involved…
Abstract The aim of this brief paper is to define digital forensics and to discuss the major steps involved in…
Complements of the Nmap org: Nmap 5.51 ( http://nmap.org ) Usage: nmap [Scan Type(s)] [Options] {target specification} TARGET SPECIFICATION: Can…
Port# Protocol Server Applications 22 SSH OpenSSH secure remote access utility, supporting encrypted tunnels and file transfers 23 Telnet telnetd…
Wordlists Name LinkExample Nmap Scan berzerk0/Probable-Wordlists https://github.com/berzerk0/Probable-Wordlists Daniel Miessler Password Lists https://github.com/danielmiessler/SecLists/ tree/master/Passwords CrackStation’s Password Cracking Dictionary https://crackstation.net/buy-crackstation-wordlist-password-cracking-dictionary.htm KoreLogic “Crack…
/bin /bin contains essential binaries (utilities) that must be available even if only the partition containing/is mounted. At a minimum,…
The Root Directory The Linux file system starts with the Root directory. The root directory is represented by the /.…
Comparative Analysis of TOGAF to the DoDAF and the Impact for Enterprise Architecture Cybersecurity Analysis Abstract The aim of this…