Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Category: Cloud

Cloud Attacks

Posted on by

Cloud Computing has revolutionized IT infrastructure with scalability, availability, and flexibility. Cloud Infrastructure is provisioned with automation and orchestration. This has brought a new set of Cyber Security Attacks to enterprise IT infrastructure that uses cloud computing resources. The following are the cyber security attacks: Data Exfiltration – The attacker gets the access of un-authorized…

Read more

Serverless Computing

Posted on by

Serverless Computing is a Cloud Service Model where the consumers can build and run applications without the need of provisioning and managing the underlying hardware and software resources like CPU, Memory, Storage, Operating System, Database and Networking. Serverless Computing are more suitable for developers who focusses more on application development rather managing and operating the…

Read more

Edge Computing

Posted on by

Edge Computing is decentralized computing architecture that is present in the edge network which has the data sources. The massive growth of IoT which produces lot of data has brought the need of Edge computing which is very close to the IoT Devices. Edge Computing and Fog Computing brings computing near to the end devices…

Read more

Fog Computing

Posted on by

Fog Computing also known Fog Networking or Fogging is a distributed computing architecture which provides computing processing and data storage. The Fog Computing sits between the edge devices and the cloud. It acts an intermediate later between cloud and end devices. The Fog Computing was created to address the enormous growth of IoT. The count…

Read more

Cloud Computing

Posted on by

Cloud Computing is a model of on-demand access of computing resources from a shared pool of resources like processing, memory, network, storage, applications and other computing services that can be rapidly provisioned and released. Essential Characteristics of Cloud Computing On-demand self-service – Provisioning of computing service can be done automatically without human intervention. Broad network…

Read more

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme