Skip to main content

The Defense Against the Dark Arts


The Defense against the dark arts refers to defending yourself in the world Cyber against the Dark arts like hacking, data theft and social engineering attacks. Professor Snape for Hogwarts School of Witchcraft and Wizardry and Ilvermorny School of Witchcraft and Wizardry will teach the subject Defense against the Darks arts; ie Professor will teach how to protect your self from the Cyberworld.
“Your defences must, therefore, be as flexible and inventive as the arts you seek to undo”
  -Professor Snape

Rule 1:
“Don’t click unwanted links that you receive by E-Mails or by forwarded messages in Whats App”

Once a student of Hogwarts came to know about the chamber of secrets, We all know the curiosity that the students of Hogwarts had They started digging into mystery while searching for the mystery they found something like what they want without knowing they started reading the spell and that resulted in huge damage.
Rule 2:
“Don’t connect to public WI-FI’s until and unless it is secured connection”

As part of class Professor Snape started teaching black magic to students and students started trying the spell. Professor already warned them that this spells are un secure if you’re going into un secured line you will become vulnerable to dark magic
Rule 3:
“Update your PC or any software to get updated security patch”

Harry Potter learns that Sirius Black has escaped from the prison of Azkaban and is planning to kill him. Meanwhile, Hagrid is distraught when his hippogriff, Buckbeak, is sentenced to death. So Harry updated him self to fight against the Sirius black.
Rule 4:
“Please check your URL whether it is legitimate or not before giving the credentials”

·       
Rule 5:
“Please don’t show your personal data in social media, because it makes you vulnerable to others”

The important lesson that thought in the first class of Hogwarts is never showcase your wizard skills to Muggles.
“Hacking doesn’t require the computer it just require human emotions”


Comments

Popular posts from this blog

Can Blockchain be the Iron Man of Data Security?

  Recent incident in Cyber Space shown that how vulnerable the data is and how important data security is to the user or an organization. There are various mechanisms out in the market in terms of data protection. What may be the reason for Data Thefts and Loss of Data Privacy? Lack of privacy towards the system is becoming more vulnerable to data thefts. For example, using weak passwords and lack of application regarding Cryptography. Cyber Criminals are finding the vulnerabilities in the system like Thanos finding the Infinity stones. Blockchain is the Iron Man of the Data Security. Blockchain Architecture will help reduce data theft and data tempering. What is Blockchain? Blockchain is growing list of records called blocks which are cryptographically hashed with pervious block. Blockchain follows the Merkle tree Data Structure Merkle Tree : In  cryptography  and  computer science , a hash tree or Merkle tree is a  tree  ...

Cyber Kurukshetra – An inspiration from the Mahabharata.

  The Mahabharata is an ancient Indian epic where the main story revolves around two branches of a family - the Pandavas and Kauravas - who, in the Kurukshetra War, battle for the throne of Hastinapura. At 100,000 verses, it is the longest epic poem ever written, generally thought to have been composed in the 4th century BCE or earlier. The Mahabharata is written by the Ved Vyas Maharshi. Mahabharata teaches the way of living for a human being. As an inspiration, we can interlink Mahabharata to Cyber Space or Cyber World and take valuable life lessons. We can grab some quick lessons from Mahabharata that will help one in their Cyber Space to stay safe and secured from Cyberattacks. So, this blog will be helping one to stay safe and secure in the Cyberspace. Ashwathama hatha narova kunjarova Explanation: It means  Ashwathama  is dead. And kunjaraha means elephant. But this was used as a ploy to kill  Ashwathama's  father,  Dronacharya . Yudhisthir is kn...

Sherlock’s First Digital Case

In this blog, Sherlock is going solve his first cases by using a concept called live analysis of a computer Constable Clark:  Hello Mr.Sherlock!! We had a case for you. Sherlock:  Hmm!! Go on Clark.                            Constable Clark:  A company XYZ reported a data breach that happens to them, we are trying to solve this case but we are unable to find any clue we need your help Mr.Sherlock. Sherlock:  Watson!!! 1.      I need all the IDS records of the company In Digital forensics analysis plays a major role to get culprits. The major part of cases is done in IDS record analysis. 2. I want you to take the details of Previous pen-testing audit records and system repair details of the past few months. Watson :  What does an IDS record consists? Sherlock :  An Intrusion Detection System (IDS) is a system...