Data Analyst Vs Business Analyst Vs Data Engineer Vs BI Specialist

Image
  Data Science - Complete Track • Step 1 - Identify the business problem/value addition/question – ( Data Insights ) this has to be the starting point. • Step 2 - Data availability ( Data Governance ) - Have the structure of your data set defined – The real challenge starts here-                o Do we have the data?                o Do we have access to the required data? • Step 3 -Getting Data ( Data Mining / Data Pipeline ) – How to collect the data from different sources in the system • Step 4 - Data preparation (ETL / ELT) – Once you have data there will be lot of cleaning and preparation required, reduce/increase/combine/split the predictors, determine and eliminate outliers, populate missing values convert few categorical variables into numerical etc. • Step 5 –Exploratory Data Analysis (EDA) – In this step we do descriptive and diagnostic analysis of the existing data. We build multiple graphs that give us direction towards the next steps of predictive analytics. We migh

PASSIVE Vs ACTIVE INFORMATION GATHERING FOR WEBSITE RELIABILITY

 



Information Gathering is the First Step of Ethical Hacking.

Penetration Tester or even Hackers Gather Information on their target victims. 

Every Attack Begins with Information Gathering.


There are two types of Information Gathering that anyone can perform:

    1. Active Information Gathering
    2. Passive Information Gathering

Passive Information Gathering

Passive Information Gathering is when anyone gather information about a target without directly interacting with the target. 

This means that anyone do not send any type of request to the target and therefore the target has no way of knowing that anyone is gathering information on them. 

Generally passive information gathering uses public resources that have information on that target. Using public resources to gather information is called Open source intelligence (OSINT). 

Using OSINT anyone can gather things such as:

    1. Victim IP addresses
    2. Domain Name Information
    3. Technologies used by the website/web applications
    4. Other websites on the same server
    5. DNS records
    6. Unlisted files, subdomains and directories

Active Information Gathering

Active Information Gathering is when anyone interact directly with a computer system in order to gather system specific information about the target. 

Active Information Gathering relies on tools that will send different types of requests to the computer. 

The goal is to gather information about that device or other devices that are connected to it on the same network.

Active Information Gathering can be used to find out information such as:

    1. Open/Closed Ports
    2. OS of a Machine
    3. Services that are Running
    4. Banner Grabbing
    5. Discovering New Hosts
    6. Vulnerable Applications on a Host


The main drawback of Active Information Gathering compared to Passive Information Gathering is that direct interaction with the host has a chance of triggering the systems IDS/IPS and alerting peoples about the activity.


  • Intrusion Detection Systems (IDS): analyze and monitor network traffic for signs that indicate attackers are using a known cyberthreat to infiltrate or steal data from your network. IDS systems compare the current network activity to a known threat database to detect several kinds of behaviors like security policy violations, malware, and port scanners.
  • Intrusion Prevention Systems (IPS): live in the same area of the network as a firewall, between the outside world and the internal network. IPS proactively deny network traffic based on a security profile if that packet represents a known security threat.
difference-between-ids-ips

Information Gathering Websites

https://whois.domaintools.com
https://host.io/
https://ipinfo.io/
https://www.netcraft.com
https://www.robtex.com/
https://bing.com
ip: xxxxxxxxxxx
https://www.google.com


Advanced Query Operators for Google Search:

                    site:

                    intitle:

                    inurl:

                    intext:

                    intext:

                    filetype:












    




Comments

Popular Post

Covid 19 Rapid Antigen Test Kit

Portable Pulse Oximeter

NVIDIA DGX B200

KEY PERFORMANCE METRICS FOR BANKS

DATA ENGINEER CERTIFICATIONS

Essentials You Need to Know Before Investing in Stocks

Comparison between COVID-19 Vaccines