Tag Archives: Information-Security

User authentication is the first most priority while responding to the request made by the user to the software application. There are several mechanisms made… Read More
Prerequisite – Protocols in Application Layer  Network Time Protocol (NTP) is a protocol that helps the computers clock times to be synchronized in a network.… Read More
Web Scripting Virus is malware that has the capacity to breach web browser security.  When it breaches the web browser security, it injects some malicious… Read More
Phishing : It is a way to gather personal information using deceptive e-mails and websites. It is a very regular practice done in every field,… Read More
Introduction : In the field of cybersecurity, incident management can be defined as the process of identifying, managing, recording, and analyzing the security threats and… Read More
Secure Shell : Secure Shell is designed to be very simple and cost-effective for secure network communications. SSH Client and server applications are widely available… Read More
Phishing is a type of cybersecurity attack that attempts to obtain data that are sensitive like Username, Password, and more. It attacks the user through… Read More
This attack is used to target any specific organization or an individual for unauthorized access. These types of attacks are not initiated by any random… Read More
Trust is now the most important factor in anything. In business, we require trust with the customer who is using the product and there are… Read More
Race condition occurs when multiple threads read and write the same variable i.e. they have access to some shared data and they try to change… Read More
1. Kerberos : Kerberos is a protocol that assists in network authentication. This is used for validating clients/servers in a network using a cryptographic key.… Read More
1. Lightweight Directory Access Protocol (LDAP) : LDAP stands for Lightweight Directory Access Protocol. It is a protocol that’s used for locating anyone to locate… Read More
1. Lightweight Directory Access Protocol (LDAP) : LDAP stands for Lightweight Directory Access Protocol. It is a protocol that’s used for locating anyone to locate… Read More
1. Lightweight Directory Access Protocol (LDAP) : LDAP stands for Lightweight Directory Access Protocol. It is a protocol that is used for locating anyone to… Read More
Privacy, Data Privacy, Digital Privacy, Social Media Privacy, privacy from trackers, privacy from government, All these things have became very important these days. One of… Read More