Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Category: Information Technology

SQL (Structured query language)

Posted on by

SQL (Structured query language) is a programming language used by Relational Database Management System (RDBMS) for storing, accessing, adding, updating and deleting data. SQL is a declarative language where it tells what to do not how to do. In the 1970s, IBM scientists Donald Chamberlin and Raymond Boyce developed and introduced SQL. It originated from…

Read more

Web Application Attacks

Posted on by

Web Application is the major application used across the Internet to distribute and access data and hence it’s targeted a lot by attackers. The following are web application attacks: Directory Transversal – Attackers can transverse web directories by exploiting vulnerabilities and access directory that is not supposed to be accessed. Hidden Manipulation – Web Application…

Read more

Web Application Threats

Posted on by

Web Applications are the most used applications on the Internet for sharing, distributing and accessing information. There are various threats with respect to Web Applications which are as following: Broken Access – Attackers bypass access control and access information in an un-authorized manner. Cryptographic failures – Cryptography is used to encrypt data. Improper cryptography implementation…

Read more

ISO (International Organization for Standardization)

Posted on by

ISO (International Organization for Standardization) is an independent, non-governmental, international standard development organization which has of member globally from different countries. ISO was founded on 23 February 1947 and consists of many technical committees and sub-committees. More than 25000+ standards has been developed and published. It has 170+ members and 800+ committees and sub-committees. ISO…

Read more

SGML (Standard Generalized Markup Language)

Posted on by

Standard Generalized Markup Language (SGML) is a standard developed by ISO for creating markup language documents. It defines the structures to be used for markup language documents. SGML was foundation from which standards like HTML and XML emerged. Reference ISO 8879:1986 – Information processing — Text and office systems — Standard Generalized Markup Language (SGML)

Read more

OASIS

Posted on by

OASIS (Organization for the Advancement of Structured Information Standards) is a non-profit organization that develops open standards for Internet and Information Technology specifically in the area of Web and Applications. OASIS was founded under the name “SGML Open” in 1993. It began by developing and supporting projects for SGML. Later with the movement of Internet…

Read more

XML (Extensible Markup Language)

Posted on by

XML (Extensible Markup Language) is markup language that is used to store, transmit, and reconstruct data in a human-readable and machine-readable format. XML was developed by World Wide Web Consortium. Key Characteristics of XML Extensible – Users can define and use their own tags to describe the structure data. Self-Descriptive – XML is simple and…

Read more

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme