<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Koenig Solutions</title>
    <description>The latest articles on DEV Community by Koenig Solutions (@koenigsolutions).</description>
    <link>https://dev.to/koenigsolutions</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F331807%2F2d205299-b7b0-46dc-bbb2-698751ca1acf.jpg</url>
      <title>DEV Community: Koenig Solutions</title>
      <link>https://dev.to/koenigsolutions</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/koenigsolutions"/>
    <language>en</language>
    <item>
      <title>Importance of CEH Exam</title>
      <dc:creator>Koenig Solutions</dc:creator>
      <pubDate>Fri, 07 Feb 2020 11:37:50 +0000</pubDate>
      <link>https://dev.to/koenigsolutions/importance-of-ceh-exam-251n</link>
      <guid>https://dev.to/koenigsolutions/importance-of-ceh-exam-251n</guid>
      <description>&lt;p&gt;With the emergence of security related issues across the world, the multinational organizations are looking for more number of professional and certified ethical hackers. Followed by this demand, CEH Exam is conducted to prepare and train certified ethical hackers, who can serve the MNCs for their security needs.&lt;/p&gt;

&lt;p&gt;Importance of CEH Exam&lt;/p&gt;

&lt;p&gt;In the digital world, breaching of security is not a much unknown phenomenon, and in order to get past these kinds of issues, one requires some special skills and training. Traditional textbooks cannot enable one with these kinds of skills, as these skills go beyond the traditional boundary of software engineering, network engineering, or mobile technologies.&lt;/p&gt;

&lt;p&gt;How to Get Ethical hacking Certification?&lt;/p&gt;

&lt;p&gt;The people, who can save the other from these kinds of security breaches, are called ethical hackers, and various multinational organizations recruit a large number of certified ethical hackers. These are the people, who have an in-depth knowledge of network engineering, mobile technology, database system, software engineering, and cyber law. However, anybody and everybody cannot be a specialized ethical hacker, as it requires focused training and guidance. For that reason, examinations, like  CEH certification exam , are conducted for preparing an ethical hacker.&lt;/p&gt;

&lt;p&gt;How to Prepare for the Exam?&lt;/p&gt;

&lt;p&gt;There are several areas, which are taught and evaluated during the course of this exam. Following are those areas:&lt;/p&gt;

&lt;p&gt;Tools and Programs&lt;/p&gt;

&lt;p&gt;Under this category, you can learn the basic programming and scripting languages, basic and advanced network technologies, various features and background operations of operating systems, networking hardware design, antivirus technologies, security features of operating systems, and database modules.&lt;/p&gt;

&lt;p&gt;Security Features&lt;/p&gt;

&lt;p&gt;Under this category, you can learn the various security-related technologies required to protect a system or a network. It includes the technologies like cryptography, firewalls, validation techniques, wireless technologies, and other physical verification technologies.&lt;/p&gt;

&lt;p&gt;Analysis&lt;/p&gt;

&lt;p&gt;CEH certification exam aspirants should be ready to learn the basics of system analysis, the technical analysis and risk analysis of an existing system.&lt;/p&gt;

&lt;p&gt;Regulatory Framework&lt;/p&gt;

&lt;p&gt;For successful completion of the ethical hacking certification, it is required to know the regulatory framework regarding the existing cyber laws, cyber compliances, code of conduct, and the boundaries of a hacker.&lt;/p&gt;

&lt;p&gt;These are the basic skills required for being an ethical hacker. Once these skills are evaluated successfully, one can earn the title of certified ethical hacker.&lt;/p&gt;

</description>
      <category>ceh</category>
      <category>cehexam</category>
      <category>ethicalhacking</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>7 Things You Must Know About Cyber Security in the Cloud</title>
      <dc:creator>Koenig Solutions</dc:creator>
      <pubDate>Fri, 07 Feb 2020 11:18:07 +0000</pubDate>
      <link>https://dev.to/koenigsolutions/7-things-you-must-know-about-cyber-security-in-the-cloud-1fnk</link>
      <guid>https://dev.to/koenigsolutions/7-things-you-must-know-about-cyber-security-in-the-cloud-1fnk</guid>
      <description>&lt;p&gt;General Risk : There are humongous amount of risk ranging from Data breach to data leakage which need to be prioritized when we are selecting the provider, every provider is having their own way of dealing with the control, Consumer needs to prioritized and select based on their concerned area’s the best suitable provider, there is a way which we can use like understanding client’s requirement , assessing what provider is offering you , then selection of the appropriate framework which will help you to implement control according to your requirement and then assessing any control gap which might help you understand whether the risk is with in appetite level.&lt;/p&gt;

&lt;p&gt;Vendor lock : It is another issue which most of the consumer is going to face if the initial due diligence effort horribly fails, in this case most of consumer fails to understand the technology used by provider or initial contract which will results consumer locked with provider and they can’t leave provider.&lt;/p&gt;

&lt;p&gt;Provider Exit : financial stability of the provider also matters most, what about after making so much investment on the technology provider run away from the market, along with provider data as well which belongs to consumer, so as like other risk it needs to be treated equally and stability of the provider needs to verified before doing a large investment.&lt;br&gt;
Cloud Security Training&lt;/p&gt;

&lt;p&gt;Multitenant : Because of the shared nature of cloud (Multitenant) Side channel attack is also the concern area of consumer; Needs to be prioritized and rectified. Multitenancy also create a severe issue on privacy along with security, the reason along with your workload other tenant workload is also running and operating from the same hardware so if the underlying infrastructure is not secure it may create a issue of isolation failure which results to data and service breach.&lt;/p&gt;

&lt;p&gt;Virtualization : is the base of cloud or we can say without virtualization there is no cloud, Multiple attack has been discovered against well-known hypervisor like ESXI it needs to be tested and rectified as well, we need to have a secure virtual platform on which we can build the secure service. Multiple malwares and rootkits are there which can exploit the weak virtual platform. so secure virtual platform selection is also the key part of secure cloud.&lt;/p&gt;

&lt;p&gt;VM-HOPPING :  Attacker target the less secure virtual machine and from there target the virtual platform and finally the other tenant data and workload, this attack technically called as VM-Hopping attack, these attacks normally can occur because of insecure operating system and insecure virtual platform.&lt;/p&gt;

&lt;p&gt;API : On cloud because most of the services we are assessing through either web console or CLI , in both of the case one of the primary service to assess all the services is through API(application program interface) ; the API simply accept the request and forward that request to relative underlying service to get the things done and provide the result back to the requestor. Because for all the interaction we are very much dependent on API so this will create a new attack vector for the cloud computing and needs to secure with proper control (authentication, authorization along with encryption) so user request and response can be safe.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>cloudcomputing</category>
      <category>ethicalhacking</category>
      <category>ceh</category>
    </item>
  </channel>
</rss>
