Designing Reliable Systems

We already told a bit about designing reliable systems before. Today, we’ll go over how to design services to meet requirements for availability,durability, and scalability. We will also discuss how to implement fault-tolerant systems by avoiding single points of failure, correlated failures, and cascading failures. We will see how to avoid overload failures by using … Read more

TIL About Footprinting. Part 3: Username Enumeration

In short, footprinting refers to the process of collecting data over time in order to make a targeted cyberattack. Footprinting involves gathering information about a target—typically related to its network infrastructure, systems, and users—without actually committing an attack. Footprinting can be performed manually or using automated tools. It may involve scanning for open ports, identifying user accounts, … Read more

TIL About Footprinting. Part 2: Website Footprinting

In short, footprinting refers to the process of collecting data over time in order to make a targeted cyberattack. Footprinting involves gathering information about a target—typically related to its network infrastructure, systems, and users—without actually committing an attack. Footprinting can be performed manually or using automated tools. It may involve scanning for open ports, identifying user accounts, … Read more

TIL About Footprinting. Part 1: DNS Footprinting

In short, footprinting refers to the process of collecting data over time in order to make a targeted cyberattack. Footprinting involves gathering information about a target—typically related to its network infrastructure, systems, and users—without actually committing an attack. Footprinting can be performed manually or using automated tools. It may involve scanning for open ports, identifying user accounts, … Read more

How to create Security Requirements

Software Engineering, ensuring security from the beginning of the software development process is essential. By establishing security requirements, you safeguard the end product against potential threats. Here is a guide on creating security requirements for your software project and when this should occur. 1. Understanding the Importance of Security Requirements Security requirements define the necessary … Read more