Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Author: kingsanit.pvt.ltd@gmail.com

World Wide Web Consortium (W3C)

Posted on by

World Wide Web Consortium (W3C) is a non-profit organization that develops standards for World Wide Web (WWW) and HTTP. W3C was founded by Tim Berners-Lee in 1994 which comprises member organization.

Read more

Web Service

Posted on by

A Web Service (WS) is a software function provided over a network that allows different applications to communicate and exchange data using protocols. Standard protocols like XML, SOAP are used for the communications. Web Service Architecture Service Provider is the platform that provides services to the consumers. Service Requester is the client requesting for service…

Read more

Web Application

Posted on by

Web Application is a software that run in the browser on the client computing system which provides Graphical User Interface to the user to interact with the web servers for accessing, uploading, updating and processing the data. Web Application Architecture Web Application uses a 3-tier architecture which components which comprises the following: Web Server –…

Read more

HTTP

Posted on by

HTTP (Hypertext Transfer Protocol) is an application layer protocol which is the foundation of World Wide Web used for accessing and sharing information across Internet. Internet is a collection of Networks that was built to distribute and access information. Many application protocols are used in the Internet for distributing Information out of which HTTP is the…

Read more

Internet Engineering Task Force (IETF)

Posted on by

Internet Engineering Task Force (IETF) is a non-profit organization was founded in 1986 that develops and maintains standards for the Internet. There is no membership for IETF. Anyone can volunteer and contribute to IETF. IETF Mission “The overall goal of the IETF is to make the Internet work better.”“Its mission is to produce high quality,…

Read more

World Wide Web (WWW)

Posted on by

World Wide Web (WWW) is collection of Web Systems across Internet. Tim Berners-Lee invented Web in CERN during 1989. Web allows documents and other media to be published on web servers that can be accessed by users across Internet using HTTP protocol. Internet is a collection of networks which evolved to share information. Web is…

Read more

Web Server Attacks

Posted on by

A Web Server is a computer system that host information and provides it to users who accesses through HTTP using web browser. Web Service is most used service on Internet and hence is the most targeted by attacker. The following the various attacks performed on Web Server: Directory Transversal Attack is where the attacker exploits…

Read more

Web Server

Posted on by

A web server is computer system that stores, processes, and delivers web content, like HTML pages, images, and videos to clients through web browser using Hypertext Transfer Protocol (HTTP) protocol. The Web Server Software is responsible for receiving the HTTP request and responding back with requested information.

Read more

Tarpit

Posted on by

Tarpits are computer systems that are used to absorb and delay incoming connections and sessions from an attacker. Tarpits doesn’t prevent cyber security attacks instead they listen and engage with the attacker but respond slowly. This makes the attacker efforts ineffective. Types of Tarpits Layer 7 Tarpits engage with Layer 7 Applications requests of HTTP…

Read more

Honeypot

Posted on by

Honeypots are decoy system that are placed in infrastructure to attract and deflect attackers. Honeypots simulate and look like real system having applications and services running on it with vulnerabilities intentionally being kept open which makes it as a trap and lures the attackers towards it. Honeynet is collections of Honeypots. Types of Honeypots Production…

Read more
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 13
  • Next

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme