Professional Documents
Culture Documents
Notes On Cyber Security
Notes On Cyber Security
Log 4j makes it possible for remote code execution and access of servers using the java logging
library.
-https://youtu.be/H4bLUpdFDYo
- threat intelligence and vulnerability: cyberkill chiain model and picerl process
-cryptography: An example of basic cryptography is a encrypted message in which letters are
replaced with other characters. Cryptography technique is known as CIA.
-Mitre attack :