Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Indicator of Intrusion (IoI)

Posted on by

Indicator of Intrusion is the indicator that an intruder had gained or made attempts to gain un-authorized access to a system. Types of Indicator of Intrusion File System Intrusion By observing and assessing files in the system, we can detect intrusion by the following ways: Network Intrusion Indicator By monitoring the network activity, we can…

Read more

Clock Generator

Posted on by

Clock Generator generates digital signal for synchronizing all the activities across the computer performed by the CPU. The clock generator is a Crystal Oscillator that has the property of Piezoelectricity which is a phenomenon that happens when a certain matter generates an electric charge when subjected to mechanical stress or pressure.

Read more

Clock Rate

Posted on by

In computing, Clock Rate also known as Clock Speed is the number of frequencies generated by clock generator in a processor measured in Hertz which indicates the speed of the processor in the computing device. An unit of the Clock Rate is known as Clock Cycle or Clock Tick which is a combination of positive…

Read more

Session Hijacking

Posted on by

Session Hijacking is an act, where an attacker takes the control of an existing network or application session between two systems and gets the access to un-authorized information from the session. The end users who own the systems whose session has been hijacked are not aware that their session has been hijacked. Types of Session…

Read more

DoS And DDoS

Posted on by

DoS (Denial of Service) Attack DoS (Denial of Service) is the act, where an attacker makes a computer or network un-available to the users. It is done by flooding the computer or network with huge traffic which depletes the available resources which are CPU, Memory for a computing system and bandwidth for a network and…

Read more

TCP 3-Way Handshake

Posted on by

TCP is the primary transport layer protocol that is used to transport data between systems when communicating over a network. TCP is a connection oriented protocol that provides reliability, flow control, congestion control and multiplexing. TCP establishes a connection between the systems when they want to send data with a 3-way handshake. The client starts…

Read more

Piezoelectricity

Posted on by

Piezoelectricity is the property of certain matter to generate an electric charge when subjected to mechanical stress or pressure. Piezoelectric Effect When mechanical pressure is applied to a piezoelectric material, the internal structure of the piezoelectric material changes which causes a separation of positive and negative charges and this charge imbalance builds an electric field…

Read more

FLOPS

Posted on by

FLOPS (Floating Point Operations Per Second) is a performance metric that is used to measure the performance of a computer with respect to its ability to perform mathematical calculations of floating point numbers (numbers with decimal points) like addition, subtraction, multiplication, and division. Following are various FLOPS metrics used KiloFLOPS KFLOPS 1000 FLOPS MegaFLOPS MFLOPS…

Read more

Botnet

Posted on by

Botnet also known as roBOT NETwork is a network of compromised computers called bots also known as zombies that are infected with malware (virus, worms, trojan) and controlled remotely by a attacker. The bots in the network are controlled by the attacker and used to perform attacks DDoS (Distributed Denial of Service attack), data theft, data mining,…

Read more

Computer Zombies (Bots)

Posted on by

Zombies also known as Bots are computers that are connected to Internet which have been compromised by malware (viruses, worms, trojans) and is controlled remotely by an attacker. Attackers use Zombie is used to attack a target. The Zombie act individually but are mostly part of a bigger group known as Botnet. Attacker use Botnet…

Read more
  • Previous
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 13
  • Next

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme