East Bay Cyber
Category

FAQs

Plain answers to the cybersecurity questions practitioners actually ask.

18 entries

FAQs

How Do I Create a Strong Password?

Create a strong password by making it long, unique, random, and stored in a password manager with MFA enabled.

FAQs

How Do I Do Digital Forensics on Linux?

Linux digital forensics starts with preservation, imaging, timeline analysis, and log review. Follow a practical, defensible workflow.

FAQs

How do I do digital forensics on macOS?

Learn how to approach macOS digital forensics, including preservation, collection, key artifacts, and common mistakes.

FAQs

Is it safe to use public Wi-Fi?

Public Wi-Fi can be used more safely with precautions, but it carries risks like fake hotspots, interception, and session theft.

FAQs

What certifications matter most for a SOC analyst?

Learn which certifications matter most for SOC analysts, what each signals to employers, and which ones are worth prioritizing.

FAQs

What Is a Zero-Day Exploit?

A zero-day exploit abuses an unpatched software flaw before defenders can fix it, making fast detection and mitigation critical.

FAQs

What Is Dependency Confusion?

Dependency confusion is a supply chain attack where a package manager installs a malicious public package instead of an internal one.

FAQs

What is FIDO2?

Learn what FIDO2 is, how it works, and why it enables phishing-resistant login with passkeys and security keys.

FAQs

What is just-in-time access?

Learn what just-in-time access is, how it works, and why it reduces standing privileges and administrative risk.

FAQs

What is OIDC?

Learn what OIDC is, how it works with OAuth 2.0, and why it is used for modern login and single sign-on.

FAQs

What Is PCI DSS and Who Must Comply?

PCI DSS protects payment card data. Learn who must comply, what counts as scope, and why outsourcing payments may not remove responsibility.

FAQs

What Is the Blast Radius of a Credential?

A credential's blast radius is the damage possible if it is compromised. Learn how to assess and reduce credential exposure.

FAQs

What Is the Diamond Model of Intrusion Analysis?

Learn the Diamond Model of Intrusion Analysis, its four core elements, and why analysts use it in investigations.

FAQs

What is the difference between CVE and CVSS?

Learn the difference between CVE and CVSS: one identifies a vulnerability, the other scores its severity.

FAQs

What Is the Difference Between EDR and Antivirus?

EDR adds endpoint visibility, detection, and response. Antivirus mainly blocks known malware on devices.

FAQs

What Is Typosquatting in Package Registries?

Typosquatting in package registries tricks developers into installing malicious packages with misspelled or lookalike names.

FAQs

What Is WebAuthn?

WebAuthn is a web standard for phishing-resistant sign-in using passkeys or security keys instead of passwords.

FAQs

What Should I Do After a Ransomware Attack?

What to do after ransomware: isolate systems, preserve evidence, contain access, notify key parties, and recover from clean backups.