Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Category: Internet

IEEE

Posted on by

Institute of Electrical and Electronics Engineers (IEEE) is a non-profit organization founded in 1963. It is the world largest technical professional organization of STEM (Science, Technology, Engineering, and Mathematics) engineers focusing on technology advancement and innovation. IEEE develops standards through it’s operating unit Institute of Electrical and Electronics Engineers Standards Association (IEEE SA). IEEE covers multiple areas like Computing,…

Read more

Web Application Attacks

Posted on by

Web Application is the major application used across the Internet to distribute and access data and hence it’s targeted a lot by attackers. The following are web application attacks: Directory Transversal – Attackers can transverse web directories by exploiting vulnerabilities and access directory that is not supposed to be accessed. Hidden Manipulation – Web Application…

Read more

Web Application Threats

Posted on by

Web Applications are the most used applications on the Internet for sharing, distributing and accessing information. There are various threats with respect to Web Applications which are as following: Broken Access – Attackers bypass access control and access information in an un-authorized manner. Cryptographic failures – Cryptography is used to encrypt data. Improper cryptography implementation…

Read more

ISO (International Organization for Standardization)

Posted on by

ISO (International Organization for Standardization) is an independent, non-governmental, international standard development organization which has of member globally from different countries. ISO was founded on 23 February 1947 and consists of many technical committees and sub-committees. More than 25000+ standards has been developed and published. It has 170+ members and 800+ committees and sub-committees. ISO…

Read more

SGML (Standard Generalized Markup Language)

Posted on by

Standard Generalized Markup Language (SGML) is a standard developed by ISO for creating markup language documents. It defines the structures to be used for markup language documents. SGML was foundation from which standards like HTML and XML emerged. Reference ISO 8879:1986 – Information processing — Text and office systems — Standard Generalized Markup Language (SGML)

Read more

OASIS

Posted on by

OASIS (Organization for the Advancement of Structured Information Standards) is a non-profit organization that develops open standards for Internet and Information Technology specifically in the area of Web and Applications. OASIS was founded under the name “SGML Open” in 1993. It began by developing and supporting projects for SGML. Later with the movement of Internet…

Read more

XML (Extensible Markup Language)

Posted on by

XML (Extensible Markup Language) is markup language that is used to store, transmit, and reconstruct data in a human-readable and machine-readable format. XML was developed by World Wide Web Consortium. Key Characteristics of XML Extensible – Users can define and use their own tags to describe the structure data. Self-Descriptive – XML is simple and…

Read more

World Wide Web Consortium (W3C)

Posted on by

World Wide Web Consortium (W3C) is a non-profit organization that develops standards for World Wide Web (WWW) and HTTP. W3C was founded by Tim Berners-Lee in 1994 which comprises member organization.

Read more

Web Service

Posted on by

A Web Service (WS) is a software function provided over a network that allows different applications to communicate and exchange data using protocols. Standard protocols like XML, SOAP are used for the communications. Web Service Architecture Service Provider is the platform that provides services to the consumers. Service Requester is the client requesting for service…

Read more

Web Application

Posted on by

Web Application is a software that run in the browser on the client computing system which provides Graphical User Interface to the user to interact with the web servers for accessing, uploading, updating and processing the data. Web Application Architecture Web Application uses a 3-tier architecture which components which comprises the following: Web Server –…

Read more
  • 1
  • 2
  • 3
  • Next

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme