Skip to content

Tag Archives: Cyber-security

Network Security:  Network Security is the measures taken by any enterprise or organization to secure its computer network and data using both hardware and software… Read More
Ethical Hacking is compromising computer systems for assessing their security and acting in good faith by informing the vulnerable party. Ethical hacking is a key… Read More
Spear Phishing and Whaling both are different type of Email phishing attacks that attackers use to steal your confidential information. This confidential information might include… Read More
Cyber System Security as the name suggests, it protects our system from cyber attacks, malicious attacks. It is basically to advance our security of the… Read More
Illegally seeking control of a website by taking over a domain is known as Web Jacking. In web jacking attack method hackers compromises with the… Read More
Computers serve a major role in crime which is usually referred to as “Cybercrime”. This cybercrime is performed by a knowledgeable computer user who is… Read More
Juice Jacking is a type of Cyber Attack which involves data theft during the charging of devices on public places. You might have seen a… Read More
Reconnaissance, It is the first step that is involved in the process of ethically hacking or penetrating a Cyber Asset. Reconnaissance is the process in… Read More
Pre-Requisite: Types of Security Mechanism Network Security refers to the measures taken by any enterprise or organization to secure its computer network and data using… Read More
Two-factor Authentication refers to the use of any two self-reliant methods from the various authentication methods. Two-factor authentication is used to ensure that the user… Read More
Malware is a software that gets into the system without user consent with an intention to steal private and confidential data of the user that… Read More
Zed Attack Proxy is an open-source security software written in Java programming language and released in 2010. It is used to scan web applications and… Read More
As we know the Data encryption standard (DES) uses 56 bit key to encrypt any plain text which can be easily be cracked by using… Read More
Broken Authentication is in one of the OWASP Top 10 Vulnerabilities. The essence of Broken Authentication is where you (Web Application) allow your users to… Read More
In a recent study by Verizon, 63% of the confirmed data breaches are due to either weak, stolen, or default passwords used. There is a… Read More

Start Your Coding Journey Now!