Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Author: kingsanit.pvt.ltd@gmail.com

Graph Theory

Posted on by

Graph Theory is a branch of Discrete Mathematics and is the study of graphs that are mathematical structures which depicts model of vertices (nodes) and edges (links) and the relationship between them. Graph theory is used in Computer Science for modeling structures of nodes and links with the relationship between them. The following is a…

Read more

Carrier Sense Multiple Access

Posted on by

CSMA (Carrier Sense Multiple Access) technology is used in LAN devices to prevent collision. Collision happens when devices connected in a network of collision domain transmits at the same time which will cause interruption of data flow between devices. Carrier Sense enables the network devices to listen for traffic and if the channel is free, transmission…

Read more

Switching

Posted on by

A switch in a Local Area Network (LAN) is a hardware device that connects multiple devices through a process known as Switching which happens at the Data Link Layer (Layer 2) of the OSI layer. Data Link layer is where a system starts placing data in the transmission medium (wired or wireless) by adding a…

Read more

Collision Domain

Posted on by

A LAN is network segment (wired or wireless) connecting multiple devices which becomes a network domain. If two devices are transmitting data at the same time in a network domain, they will collide and cause transmission failure due to the collusion of data. This network segment where all devices connecting to it and when transmitting…

Read more

Computer Network

Posted on by

A Computer Network is a connection of multiple devices which can be wired or wireless that provides communication between various devices that is connected to the network. The network can within an organization or home or across a geography. “Computer” denotes here any Compute System that has a CPU, ALU, Memory and Storage. Thus, a…

Read more

Local Area Network (LAN)

Posted on by

A Local Area Network (LAN) is a network that connects multiple devices and users within a single building or a small campus or a home. LAN provides connectivity between devices and users, so that they can communicate between each other. LAN compromises devices like routers, switches, desktops all connected to a network which can b…

Read more

Kerberos Attack

Posted on by

Kerberos is a strong authentication protocol that can be used in an open unprotected network. Despite it’s strength, there are some attacks that can be done against Kerberos which are as follows: Kerberoasting is post-exploitation attack technique. In this attack, the attacker has a compromised authenticated user’s account in a domain and targets Service Accounts…

Read more

Post Exploitation

Posted on by

In the Cyber Security, Post Exploitation refers to the phase after exploiting a target system. Cyber Kill Chain is the progressive steps in which an attacker performs an attack on a target system. An attacker starts with reconnaissance, then builds an exploit payload and delivers it to the target through email, file sharing etc. The…

Read more

Kerberos

Posted on by

Kerberos is a network authentication protocol developed by Massachusetts Institute of Technology that provides strong authentication between client and server using cryptography in an open unprotected network. Key Aspects of Kerberos Architecture Key Distribution Center (KDC) is the core component of Kerberos which acts as the 3rd Party Authentication providing Central Authentication to the domain (realm)…

Read more

Authentication

Posted on by

Authentication is the process of validating and verifying the identity of a user or system trying to access a system or service before granting access. Authentication comes after the Identification process. Authentication can be done with the following ways What you know is where a user is authenticated with what they know like passwords, passphrase,…

Read more
  • Previous
  • 1
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • Next

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme