Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Category: Cyber Security Fundamentals

Virtualization

Posted on by

Virtualization is the process of creating virtual software-based computing resources from the underlying physical hardware. Virtualization creates an abstraction layer over computer hardware. It divides s single physical system into multiple virtual machines having their computing resources such as processors, memory, networks and storage. Each VM will have its own operating system (OS). History of Virtualization Virtualization emerged…

Read more

 ITU

Posted on by

ITU (International Telecommunication Union) is a special agency of United Nations that is responsible for governing matters related to Information and Communication Technologies (ICT). It was established in 1865 to support and help governing Telegraphic Networks globally. ITU has member states across the globe. Each country manages the radio spectrum within their country. The management…

Read more

Tactics, Techniques and Procedures (TTPs)

Posted on by

Tactics, Techniques and Procedures (TTPs) are the attributes that depicts the patterns and behavior of a cyber security attack. It helps cyber security professionals to understand how threat actors perform attacks on a target. A cyber security attack is done in multiple stages across a period of time which can some days or months. The…

Read more

Cyber Kill Chain

Posted on by

The Cyber Kill Chain framework developed by Lockheed Martin explains attacker’s progressive steps when attacking a target which can be used to identify and prevent cyber threat. The Cyber Kill Chain has seven stages as following: Reconnaissance This is the initial phase, where the attacker gather’s information about the target. Scanning, Foot printing and Enumeration is…

Read more

VPN

Posted on by

Virtual Private Network (VPN) is process of creating a virtual tunnel over a shared network that can be accessed by anyone. The virtual tunnel provides protection for the data being sent over the shared network. The data should be protected for it’s confidentiality and integrity. A virtual tunnel can provide protection of confidentiality or integrity…

Read more

Adversary

Posted on by

The attacker who is performing the cyber attack on the target with a motive.

Read more

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme