Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security Fundamentals
    • Security Principles
    • Information Security
  • Hacking
    • Reconnaissance
      • Footprinting
      • Scanning
      • Enumeration
      • Vulnerability Analysis
    • Privilege Escalation
    • Ethical Hacking
  • Governance, Risk And Compliance (GRC)
    • Risk Management
  • Security Architecture And Engineering
    • Cryptography
    • Identity Access Management
  • Security Operations
    • Security Assessment
      • Vulnerability Management
        • Threat Intelligence
    • Intrusion Detection And Prevention
  • Cyber Security Attacks and Threats
    • DoS
    • Password Hacking
    • Web Attacks
    • Web Applications Attacks
    • WI-FI Wireless Attacks
    • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Category: Cryptography

Ciphertext

Posted on by

Ciphertext is the encrypted form of the plaintext that is encrypted by an encryption algorithm. When a data needs to be transmitted but kept confidential, so that nobody can read the data while in transit, encryption process is used. On the sender side, the plaintext is given as input into encryption algorithm which does complex…

Read more

Integrity

Posted on by

Integrity is making sure, that the data is intact without any changes. This can be achieved by hashing the data. When data is being received or processed, the hashes can be validated against the original hash to make sure, the data has not been compromised.

Read more

Confidentiality

Posted on by

Confidentiality is process of making sure that only authorized subject (person or entity) can access the data. This can be achieved by encrypting data, providing access to only authorized using authentication, privilege levels.

Read more

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme