This is in continuation of https://www.googlinux.com/understanding-the-risk-management-process/ Considering Vulnerabilities, Threats, and Risks Confidentiality, Integrity, and Availability (CIA) factors span the risk management assessments of vulnerabilities, threats, and risks. Assets can be categorized as data, systems, facilities, and people. Concerning information assets, the enterprise should consider vulnerabilities, threats,
Thoughts, stories and ideas to share :)
In this series of articles, I will discuss the Risk Management process, its elements and challenges. The first fundamental element of successful cybersecurity architecture is the risk management process. The risk management process can act as a starting point and can be adapted to specific enterprise needs. The risk management
This hands-on guide will help you understand how networking works with Docker and containers in linux. Learn in these simple steps how to customise and create user defined network. When you install Docker, it creates three networks automatically. You can list *these networks using the docker network ls command: root@
Soon after Ansible turned five, version 2.3 was released. There are a lot of new features in this version specifically related to networking. Like, Persistent connections framework, network_cli connection plugin and netconf connection plugin. There are 280+ new modules available in Ansible 2.3. Below is the list
Hadoop software library is a framework that allows for the distributed processing of large data sets across clusters of computers using simple programming models. It is designed to scale up from single servers to thousands of machines, each offering local computation and storage. Installing, configuring and adding new datanodes to
WHAT IS ANSIBLE?Ansible was originally written by Michael DeHaan in Python with its first release on February 20, 2012. It was later acquired by Red Hat. Ansible is an open source configuration management and orchestration utility. It helps to automate deployment or softwares and configurations of multiple remote hosts.
OpenStack takes care of Instance scheduling automatically for us depending on flavour selected during Nova instance boot, however, many times, we might need to populate the instance on a specific hypervisor / Nova compute node. To achieve this we need to specify the compute node at the stage, you select Flavour,
ip command in Linux is used to show / manipulate routing, devices, policy routing and tunnels. It is a provided by iproute2 package. ifconfig command which is provided by net-tools package has been around since long and will stay around. ip is more powerful and modern and will eventually replace it.
MITMf is a Framework for Man-In-The-Middle attacks. MITMf aims to provide a one-stop-shop for Man-In-The-Middle and network attacks while updating and improving existing attacks and techniques. Originally built to address the significant shortcomings of other tools (e.g Ettercap, Mallory), it's been almost completely re-written from scratch to provide a
DOCKER SEARCHTo search a image on docker remote registry you can use docker search command. Example: firstname.lastname@example.org:~# docker search ubuntu NAME DESCRIPTION STARS OFFICIAL AUTOMATED ubuntu Ubuntu is a Debian-based Linux operating s... 4482 [OK] ubuntu-upstart Upstart is an event-based replacement for ... 65 [OK] rastasheep/ubuntu-sshd Dockerized SSH
In this series of Shell Scripting, today we discuss about command line arguments also know as positional parameters. To handle options on the command line, we use a facility in the shell called positional parameters. Positional parameters are a series of special variables ($0 through $9) that contain the contents
No programming language is perfect. There is not even a single best language; there are only languages well suited or perhaps poorly suited for particular purposes. --Herbert MayerThe default shell in most of todays linux distribution is Bash (Bourne-Again shell). A shell script is a "quick-and-dirty" of completing long and
ABOUT DMESGdmesg is used to examine or control the kernel ring buffer. The main purpose of dmesg is to display kernel and boot messages. This simple commands can help you save & clear your old dmesg buffer. root@fa498b2ed935:~# dmesg |tail [0.000000] device veth0624ab4 left promiscuous mode [0.000000]