Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Identification

Posted on by

Identification is the process of identifying a person or system in a realm (domain, organization, enterprise). The identification is the initial process before authenticating. Every user and system in a realm should have a unique identification, so that they can be authenticated & authorized for granting access and accounted for their actions.

Read more

Computing Clock Cycle

Posted on by

A clock cycle also known as machine cycle is the fundamental unit of time in a computer’s CPU. The clock cycle is driven by an internal clock signal within the central processing unit (CPU). The clock cycle is measured in Hertz (Hz). The following are the operations that are performed in a clock cycle. Fetching…

Read more

Instruction Set

Posted on by

An Instruction Set also known as Instruction set architecture (ISA) is the abstract model present in a computing machine that gives the instruction to the CPU present in a computer machine. The computing machine performs the required operations. The Operating System and Applications communicates to the computing hardware to perform an action through the Instruction…

Read more

MITRE ATT&CK

Posted on by

MITRE ATT&CK® is a knowledge base of adversary tactics and techniques based on real world observations published by MITRE. This knowledge base can be used as the foundation for understanding the Cyber Attack patterns. The MITRE Attack Matrices covers the following categories The MITRE Attack chain has 14 Tactics that will be executed in order by…

Read more

Buffer Overflow

Posted on by

Buffer Overflow is a vulnerability in software due to improper boundary checks, where an attacker exploits the target system by writing overwhelming data to the software memory buffer to overflow the buffer’s capacity and then making the malicious data to be written in the adjacent memory location giving un-authorized access.  There are two types of…

Read more

Threads

Posted on by

A Process is broken down into multiple threads. A program becomes a process when it’s loaded into the memory and each process has it’s own address space. A process is sub divided into multiple threads and each thread uses the allocated address space given to it’s parent process for execution enabling to run multiple threads…

Read more

Password Hacking    

Posted on by

Password Hacking is the process of breaking or cracking and obtaining passwords stored in the target system or when being transmitted between systems. The obtained passwords are used to access accounts on the target system to gain access and privilege access. Password Cracking, Password Breaking, Password Attack are other terms used for Password Hacking. The…

Read more

Process

Posted on by

A process is an instance of program being executed in the CPU. Application Software is collection of multiple programs. When we run an application, the programs are loaded in the CPU as sequential processes with an address space. This creates a kind virtual CPU for each process. The CPU loads multiple processes and keeps multiplexing…

Read more

Tactics, Techniques and Procedures (TTPs)

Posted on by

Tactics, Techniques and Procedures (TTPs) are the attributes that depicts the patterns and behavior of a cyber security attack. It helps cyber security professionals to understand how threat actors perform attacks on a target. A cyber security attack is done in multiple stages across a period of time which can some days or months. The…

Read more

Software

Posted on by

Software is a collection of programs that instructs the computer to perform an execution of a task. Software can be broadly classified as Operating System is software layer between the computer hardware and other application programs which provides resources to run the program and interface to the hardware. Application Software run on the top of…

Read more
  • Previous
  • 1
  • …
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • Next

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme