Network Security Channel
2.73K subscribers
5.34K photos
3.42K videos
5.58K files
4.44K links
⭕️Start Channel From 2017⭕️
Security Operation Center (SOC)
Bug Bounty
Vulnerability
Pentest
Hardening
Linux
Reasearch
Security Network
Security Researcher
DevSecOps
Blue Team
Red Team
Download Telegram
Cyber risk is calculated by considering the identified security threat, its degree of vulnerability, and the likelihood of exploitation. At a high level, this can be quantified as follows:
Cyber risk = Threat x Vulnerability x Information Value

In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.

How to Measure Anything in Cybersecurity Risk
Second Edition
DOUGLAS W. HUBBARD
RICHARD SEIERSEN
Logo: Wiley
Copyright © 2023 by John Wiley & Sons, Inc. All rights reserved.
https://lnkd.in/euz7HM8Y

-Business Secure Continuity-
1402.03.21
#cybersecurity #job #training #help #university #future #security #business #sansinstitute #eccouncil #iso22301 #nistcybersecurityframework #isaca #cissp
#isc2 #redteam #blueteam #csirt #forensics #splunksecurity #siem #otsecurity

@Engineer_Computer
🛡 End-to-End Web Security Architecture: FortiWeb WAF + FortiGate in Reverse Proxy Mode
Recently completed a comprehensive lab implementation and full documentation of a production-grade web security architecture using FortiWeb as a Web Application Firewall behind FortiGate, deployed on PNETLAB with KVM-based VMs.
🔹 Traffic Flow Architecture:
Client → FortiGate (WAN/VIP) → FortiWeb (WAF Inspection) → Apache2 Real Server → Response back to Client
🔹 Key Implementation Highlights:
Linux Web Server hardening with Apache2 and static IP configuration via Netplan
FortiWeb interface setup across three segments (Real Server / Client-LAN / Management)
Complete WAF policy chain: Virtual IP → Server Pool → Virtual Server → Server Policy
FortiGate perimeter configuration with DNAT Virtual IP (100.100.100.50192.168.100.50)
Firewall policy with full session logging for HTTP/HTTPS/PING traffic
CLI-based traffic logging activation on FortiWeb (a step many engineers miss!)
End-to-end verification through Forward Traffic logs on both devices
🔹 Why Reverse Proxy Mode?
It provides deep HTTP/HTTPS inspection, granular WAF policy enforcement, and clean separation between perimeter firewalling (FortiGate) and application-layer protection (FortiWeb) — a layered defense approach aligned with Zero Trust principles.
🔹 Key Lesson Learned:
The order of WAF policy configuration matters → Virtual IP must exist before the Server Pool, which must exist before the Virtual Server, which must exist before the Server Policy. Skipping the sequence breaks the binding chain.

💼 Currently exploring new opportunities in Network & Cybersecurity Engineering — open to on-site, hybrid, or remote roles. I deliver hands-on services in network design, firewall deployment (Fortinet, Cisco), WAF implementation, ICS/OT security (IEC 62443, NIST), and infrastructure hardening.

#CyberSecurity #FortiWeb #FortiGate #WAF #NetworkSecurity #Fortinet #ReverseProxy #InfoSec #OpenToWork #NetworkEngineer #PenetrationTesting #ICS #OTSecurity

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
2