■Shoulder Surfers in Poem■

In a crowded place, where eyes wander free, A subtle threat looms for all to see.

Shoulder surfing, the art of intrusion and infiltration, A surreptitious act causing confusion.

Eyes peering over, catching glimpses in the air, Looking for clues secrets to ensnare.

From what you know to what you have and what you are, they seek to steal,
Personal information, a coveted deal.

In cafes, airports and gatherings, where people roam, Shoulder surfers work, their intentions unknown.

A skilled observer, they watch with precision, Waiting for their chance, a moment's decision they pull a trigger.

They blend in the crowd, disguised among the rest,Their eyes sharp, their motives suppressed.

Stealing glances, gathering scraps of insight, Unbeknownst to the victims, caught in their sight.

But fear not, for there are ways to defend, Shielding our secrets, let us comprehend.

Guard screens and keyboards with privacy filter, angles obscure, Protecting our information making it secure.

Stay vigilant, aware of those around, Shield your actions, let privacy abound.

In this digital realms, where threats can arise, Shoulder surfing, a cautionary guise.

So be mindful of your surroundings, stay aware, Keep your secrets safe with utmost care.

For shoulder surfers may lurk in disguise, But our caution and wisdom can make them despise.

©️ Rotimi Abdul Basit

I always encourage people to learn something new because I'm a knowledge seeker. So don't give up yet.

#CyberPoetry #CyberPeom #Shouldersurf #Cybersecurity #socialengineering

In the world of networks where data flow, wired and wireless teleport to different destinations.

The OSI Model, its layers bestow.
From physical to application, each one unrolls, A framework of communication, enjoining our hearts.

👉 Layer one,
The foundation, physical and raw,
Bits and bytes, in cables they defect.
Electric impulses, signals they carry,
Setting the stage for connections to engage.

👉 Layer two,
Data link, where frames find their way, MAC addresses guide like stars in the candy way. Error detection, a vigilant check, Ensuring integrity, a safety net.

👉Layer three,
Network with routers and routes,
IP addresses secure, like winding routes.
Packet forwarding, across networks vast,
Routing protocols, a quest to broadcast.

👉 Layer four,
Transport where connections thrive,
TCP and UDP their protocols drive.
Reliable delivery for bytes to travel,
Seamless streams no matter the unravel.

👉 Layer five,
Session, a bridge in the mist,
Establishing and managing connections, it persists.

Allowing sessions, strings of communication,
controlled and organized, like a symphony's creation.

👉 Layer six,
Presentation, a translator supreme,
Encodes and decodes, the data's dream.
Encryption and compression, its key affair,
Translating information, beyond compare.

👉 Layer seven,
Application, where humans flex,
Web browsers and emails become our guide. Interacting with services, like a dance, Empowering users with a fruitful enhance.

The OSI Model, a harmonious blend,
Layer upon layer, its message to send.
From physical to application, it unfolds,
A network's grand tapestry, where wonders behold.

The legend all the tech geeks struggle with and the attacker's hideout.

©️ Rotimi Abdul Basit

Don't give up yet, Nobody promise is gonna be easy-peasy.

#CyberPoetry #CyberPeom #osimodel #Cybersecurity #Learning_Continua

Zero-day attack, a stealthy foe,
Infiltrating systems, flood a network out of the know.

Exploiting vulnerabilities, unseen by all,Creating chaos, leaving systems fall over backward.

No time to react, no warning to heed, no charges repel, Zero-day attack, a sinister hatch.

Deceptive and brazen, it strikes from within,Leaving us vulnerable, hearts in spin.

Wisdom and foresight, we'll defend,
Against this pervasive and undying trend.

With diligence and protection, we'll prevail,
For zero-day attack, our resilience shall prevail.

©️ Rotimi Abdul Basit

#CyberPeom #CyberPoetry #Cybersecurity #zeroday #Learning_Continua