Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Author: kingsanit.pvt.ltd@gmail.com

Industry

Posted on by

Industry is a part of Economy that manufactures and produces similar set of goods or services. Categories of Industries Industries are categorized into three categories which is known as three sector model. Primary Industry is the industry that extracts and collect raw materials from natural resources like agriculture, textile, mining. Secondary Industry is the industry…

Read more

Economy

Posted on by

An Economy is system within a geographical area that produces, distributes and consumes good or services. A market is where the trading of the goods or services happen between the sellers and buyers. An economy is usually a country and it’s government manages and monitors the economy. An Economy is measured by Gross Domestic Product (GDP) which…

Read more

Internet Of Things (IoT)

Posted on by

Internet of Things (IoT) is network of physical objects or things that are embedded with sensors that connect and communicate with other devices over Internet without human intervention. Things can be any physical object like car, fridge, pen, thermostat, HVAC. These physical objects have software and hardware and capable of processing data. These physical objects…

Read more

Bluetooth Attacks

Posted on by

Bluetooth is a short range wireless technology based on IEEE 802.15.1 that uses radio waves for data and voice communication. Bluetooth is used for Personal Area Network (PAN) for connecting personal devices on wireless. As bluetooth is communicated in an open space it’s susceptible for attacks. The following are various bluetooth attacks: Bluejacking – Unsolicited messages…

Read more

WI-FI Wireless Attacks

Posted on by

WI-FI Wireless uses radio waves for communication between wireless devices that are connected to the WI-FI network. As the wireless devices uses the open space for communication, it’s an open target for attacks. Attackers use WI-FI wireless attack methodologies before performing the actual attack. The following are the attacks performed on WI-FI wireless networks: DoS…

Read more

Wi-Fi Wireless Hacking Methodology

Posted on by

Wi-Fi uses wireless for communication in an open space which makes it easy target for attackers. Wi-Fi Network is available almost everywhere at streets, organizations, public infrastructure. An attacker just needs a computing device like a laptop or mobile to hack a Wi-Fi network. The following is the Wi-Fi wireless hacking methodology: Discover the Wi-Fi…

Read more

Wireless Security

Posted on by

Wireless Security is the security mechanism implemented in Wi-Fi Wireless network to protect it from un-authorized access performed by attackers. IEEE 802.11i is the security standard amendment for IEEE 802.11 wireless standard. Wired Equivalent Privacy (WEP) was the initial security algorithm used in IEEE 802.11. WEP was vulnerable and exploitable. Wi-Fi Alliance brought in WPA…

Read more

Ciphertext

Posted on by

Ciphertext is the encrypted form of the plaintext that is encrypted by an encryption algorithm. When a data needs to be transmitted but kept confidential, so that nobody can read the data while in transit, encryption process is used. On the sender side, the plaintext is given as input into encryption algorithm which does complex…

Read more

Wireless Network

Posted on by

Wireless Network is a Network that uses Wireless for Communication for data and voice transmission. Wireless Network doesn’t use physical cables for data transmission rather it uses radio waves to transmit data. Wireless Personal Area Network, Wireless Local Area Network (WLAN), Cellular Networks, Wireless Metropolitan Area Network (WMAN), Wireless Wide Area Network (WWAN) are various Wireless…

Read more

IEEE

Posted on by

Institute of Electrical and Electronics Engineers (IEEE) is a non-profit organization founded in 1963. It is the world largest technical professional organization of STEM (Science, Technology, Engineering, and Mathematics) engineers focusing on technology advancement and innovation. IEEE develops standards through it’s operating unit Institute of Electrical and Electronics Engineers Standards Association (IEEE SA). IEEE covers multiple areas like Computing,…

Read more
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 13
  • Next

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme