🕵 یک ابزار عالی برای موبایل فارنزیک
🕵mobile digital forensics
📎 github.com/AvillaDaniel/AvillaForensics
#forensics
// code logy
کانال آموزش کامپیوتر
@Engineer_Computer
🕵mobile digital forensics
📎 github.com/AvillaDaniel/AvillaForensics
#forensics
// code logy
کانال آموزش کامپیوتر
@Engineer_Computer
Cyber risk is calculated by considering the identified security threat, its degree of vulnerability, and the likelihood of exploitation. At a high level, this can be quantified as follows:
Cyber risk = Threat x Vulnerability x Information Value
In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.
How to Measure Anything in Cybersecurity Risk
Second Edition
DOUGLAS W. HUBBARD
RICHARD SEIERSEN
Logo: Wiley
Copyright © 2023 by John Wiley & Sons, Inc. All rights reserved.
https://lnkd.in/euz7HM8Y
-Business Secure Continuity-
1402.03.21
#cybersecurity #job #training #help #university #future #security #business #sansinstitute #eccouncil #iso22301 #nistcybersecurityframework #isaca #cissp
#isc2 #redteam #blueteam #csirt #forensics #splunksecurity #siem #otsecurity
@Engineer_Computer
Cyber risk = Threat x Vulnerability x Information Value
In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.
How to Measure Anything in Cybersecurity Risk
Second Edition
DOUGLAS W. HUBBARD
RICHARD SEIERSEN
Logo: Wiley
Copyright © 2023 by John Wiley & Sons, Inc. All rights reserved.
https://lnkd.in/euz7HM8Y
-Business Secure Continuity-
1402.03.21
#cybersecurity #job #training #help #university #future #security #business #sansinstitute #eccouncil #iso22301 #nistcybersecurityframework #isaca #cissp
#isc2 #redteam #blueteam #csirt #forensics #splunksecurity #siem #otsecurity
@Engineer_Computer
lnkd.in
LinkedIn
This link will take you to a page that’s not on LinkedIn
This media is not supported in your browser
VIEW IN TELEGRAM
#ProgrammingLanguage
The most common programming languages since 2000
-Business Secure Continuity-
1402.03.23
#cybersecurity #job #training #university #future #security #business #sansinstitute #eccouncil #iso22301 #nistcybersecurityframework #isaca #cissp
#isc2 #redteam #blueteam #csirt #forensics #splunksecurity #siem #otsecurity
#tenable #nessus #ibm #emc #vmware #pentesting #eccouncil #sans #microsoft #cisco #ise
https://www.linkedin.com/posts/diyako-secure-bow_programminglanguage-cybersecurity-job-activity-7074428330229293056-52kk?utm_source=share&utm_medium=member_ios
@Engineer_Computer
The most common programming languages since 2000
-Business Secure Continuity-
1402.03.23
#cybersecurity #job #training #university #future #security #business #sansinstitute #eccouncil #iso22301 #nistcybersecurityframework #isaca #cissp
#isc2 #redteam #blueteam #csirt #forensics #splunksecurity #siem #otsecurity
#tenable #nessus #ibm #emc #vmware #pentesting #eccouncil #sans #microsoft #cisco #ise
https://www.linkedin.com/posts/diyako-secure-bow_programminglanguage-cybersecurity-job-activity-7074428330229293056-52kk?utm_source=share&utm_medium=member_ios
@Engineer_Computer
🔏Digital Forensics Script for Linux🐧
Advanced Bash script for conducting digital forensics on Linux systems
🌐https://github.com/vm32/Digital-Forensics-Script-for-Linux
#linux #forensics
@Engineer_Computer
Advanced Bash script for conducting digital forensics on Linux systems
🌐https://github.com/vm32/Digital-Forensics-Script-for-Linux
#linux #forensics
@Engineer_Computer
GitHub
GitHub - vm32/Digital-Forensics-Script-for-Linux: Advanced Bash script designed for conducting digital forensics on Linux systems
Advanced Bash script designed for conducting digital forensics on Linux systems - vm32/Digital-Forensics-Script-for-Linux
⭕️ ابزاری برای Malware Detection و Threat Hunting توسعه داده شده که قابلیت جمع آوری موارد مورد نیاز و شناسایی بد افزار های اجرایی را دارد.
از قبیل تکنیک های قابل شناسایی میتوان به موارد زیر اشاره کرد:
#BlueTeam #MalwareAnalysis #Forensics
@Engineer_Computer
از قبیل تکنیک های قابل شناسایی میتوان به موارد زیر اشاره کرد:
replaced/injected PEs, shellcodes, hooks, and other in-memory patches.
Detects inline hooks, Process Hollowing, Process Doppelgänging, Reflective DLL Injection, etc.
PE-sieve is meant to be a light-weight engine dedicated to scan a single process at the time. It can be built as an EXE or as a DLL. The DLL version exposes a simple API and can be easily integrated with other applications.
#BlueTeam #MalwareAnalysis #Forensics
@Engineer_Computer
GitHub
GitHub - hasherezade/pe-sieve: Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected…
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches). - hasherezade/pe-sieve
👩🏼💻hollows_hunter
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
تمام فرآیندهای در حال اجرا را اسکن می کند.
https://github.com/hasherezade/hollows_hunter/
#windows #process #forensics
@Engineer_Computer
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
تمام فرآیندهای در حال اجرا را اسکن می کند.
https://github.com/hasherezade/hollows_hunter/
#windows #process #forensics
@Engineer_Computer
GitHub
GitHub - hasherezade/hollows_hunter: Scans all running processes. Recognizes and dumps a variety of potentially malicious implants…
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches). - hasherezade/hollows_hunter