Yaksas CSC

Your Guardian in the Cyber World

  • Yaksas CSC Home
  • Home
  • About Us
    • Overview
    • Why Yakṣas?
  • Got a Question?
    • Cyber Security Basics
    • Cyber Security Education & Career
    • How to stay safe?
  • Get Invloved
    • Write for Us
    • YCSC QnA Dialogue
    • Translate Articles
  • Contact Yakṣas
  • Press Release
    • NCSAM 2015 Champion
    • STOP. THINK. CONNECT. Partner

Why Yakṣas?

Yakshas (Sanskrit: यक्ष Yakṣas), were believed to be benevolent nature-spirits as per the Hindu, Jain and Buddhist Literature. The folklore portrays them as the care takers of the natural treasures hidden in the earth and tree roots. In Indian art, they are mostly depicted as fearsome warriors. The texts also speak of their dark side in which they haunted, waylaid and devoured wilderness and travelers.

Cyber Security Professionals (CSPs) have an uncanny resemblance to that of Yakṣas. Yakṣas were the guardians of hidden treasures, CSPs too are the guardians of hidden treasures, except that for CSPs the hidden treasure is data or information which reside in the Cyber World rather than in the earth or tree roots.

The second most striking similarity is the dual personality. Just as Yakṣas could use their powers to cause destruction, CSPs too are capable of using their knowledge and skills to cause destruction and chaos in the Cyber World. The texts named such Yakṣas as Rakṣasas. The Cyber World calls them Black Hats.

Yakṣas had to fight with various mythical creatures and powerful demons in order to protect the treasure. A CSP’s task is no less. Given the virtual and pseudo-anonymous nature of the Cyber World, a CSP too has to fight against demons which are, in a way, as mythical and powerful. These demons manifest themselves in form of crackers, cyber criminals, bullies, stalkers etc.

Treasure, be it hidden in the earth or in computers, needs to be protected. Additionally, the Cyber World poses risk to people as well. They need to be guarded against exploitation in the virtual world. To carry on the legacy of Yakṣas, we came up with Yakṣas Cyber Security Champions (CSC), an organization of CSPs, dedicated to protect you and your assets in the Cyber World. 

 

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security Cybersecurity books Cybersecurity Cannon domain enumeration Edward Snowden forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Mobile Security Narendra Modi NSA offensive security Online Safety Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Media user enumeration Wifi

Top Posts

  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know
  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView
  • Red Team Operations Attack Lifecycle
    Red Team Operations Attack Lifecycle

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress