Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security Fundamentals
    • Security Principles
    • Information Security
  • Hacking
    • Reconnaissance
      • Footprinting
      • Scanning
      • Enumeration
      • Vulnerability Analysis
    • Privilege Escalation
    • Ethical Hacking
  • Governance, Risk And Compliance (GRC)
    • Risk Management
  • Security Architecture And Engineering
    • Cryptography
    • Identity Access Management
  • Security Operations
    • Security Assessment
      • Vulnerability Management
        • Threat Intelligence
    • Intrusion Detection And Prevention
  • Cyber Security Attacks and Threats
    • DoS
    • Password Hacking
    • Web Attacks
    • Web Applications Attacks
    • WI-FI Wireless Attacks
    • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Category: Security Principles

Authentication

Posted on by

Authentication is the process of validating and verifying the identity of a user or system trying to access a system or service before granting access. Authentication comes after the Identification process. Authentication can be done with the following ways What you know is where a user is authenticated with what they know like passwords, passphrase,…

Read more

Identification

Posted on by

Identification is the process of identifying a person or system in a realm (domain, organization, enterprise). The identification is the initial process before authenticating. Every user and system in a realm should have a unique identification, so that they can be authenticated & authorized for granting access and accounted for their actions.

Read more

Integrity

Posted on by

Integrity is making sure, that the data is intact without any changes. This can be achieved by hashing the data. When data is being received or processed, the hashes can be validated against the original hash to make sure, the data has not been compromised.

Read more

Confidentiality

Posted on by

Confidentiality is process of making sure that only authorized subject (person or entity) can access the data. This can be achieved by encrypting data, providing access to only authorized using authentication, privilege levels.

Read more

CIA Triad

Posted on by

CIA stands for Confidentiality, Integrity and Availability. Confidentiality is process of making sure that only authorized subject (person or entity) can access the data. This can be achieved by encrypting data, providing access to only authorized using authentication, privilege levels. Integrity is making sure, that the data is intact without any changes. This can be…

Read more

Cyber Security

Posted on by

Cyber Security is the means to protect computer systems, network and data from un-authorized access ensuring confidentiality, integrity and availability.

Read more

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme