Category: MS Cyber Security Architect Expert

Worms

 tonyhughes  May 15, 2023

A computer worm is a type of malicious software (malware) that spreads itself from one computer to another, typically over…

Diamond Model of Intrusion Analysis

 tonyhughes  May 15, 2023

The Diamond Model of Intrusion Analysis is a framework used in cybersecurity to analyze and understand cyber threats and intrusions….

.sh Shell Script file extension

 tonyhughes  May 12, 2023

Explain in detail file extension .sh use examples and use casesChatGPT The file extension .sh is associated with shell scripts,…

Common Secure Network Ports

 tonyhughes  May 12, 2023

Secure network ports are used for encrypted communication to ensure the confidentiality and integrity of data transmitted over a network….

Just Enough Administration (JEA)

 tonyhughes  April 21, 2023

Just Enough Administration (JEA) is a security technology in Windows Server PowerShell that allows administrators to delegate administrative tasks to…

Bastion / Jump Server

 tonyhughes  April 21, 2023

Bastion or Jump Server is a secure gateway server that provides access to resources on a private network from an…

Least privilege administrative models

 tonyhughes  April 21, 2023

Least privilege administrative models, also known as the principle of least privilege or the principle of least authority, is a…

Active Directory Key Distribution Service (KDS)

 tonyhughes  April 20, 2023

Active Directory KDS stands for Key Distribution Service. It is a feature introduced in Windows Server 2012 that enhances the…

Active Directory Keberos

 tonyhughes  April 20, 2023

Kerberos is a network authentication protocol that uses tickets to authenticate users and services in a Windows Active Directory environment….