+91 9116117170

Category: Cyber Security Terminology


Owasp Top 10:A2: Broken Authentication (Impact and Mitigation)

By Annu Choudhari 0 Comment July 9, 2019

Owasp Top 10: Broken Authentication (Impact and Mitigation) What is Broken Authentication ? Broken Authentication is a vulnerability, it usually found when the web application gives you unauthorized access to the web application. It may be User authentication credentials Or session IDs and so on. Authentication and session management having all aspects of handling user […]

ISO 27001

ISO 27001 Framework : How to implement ISO 27001?

By Annu Choudhari 0 Comment June 15, 2019

At present, corporate information security is not only a complex of technical means, such as anti-viruses or firewalls, it is already an integrated approach to managing the company’s assets in general and with information – in particular. Companies have different approaches to solving these problems. Today we would like to talk about the implementation of […]


What is ISO 27001:Information Security Management System

By Annu Choudhari 0 Comment June 12, 2019

What is ISO 27001? ISO 27001 – Information security (IS) issues for a modern organization are vital.The presence of an information security management system in accordance with the requirements of ISO / IEC 27001 will help an organization save its assets and ensure the integrity, reliability and confidentiality of information. Since 2005, more than 25 […]

CIA Triad - Cyberops

What is CIA Triad of Information Security?

By Annu Choudhari 0 Comment June 11, 2019

Modern hackers are able to hack absolutely everything, from airplanes, cars, sensor equipment and ending with locks with TSA function, voting booths and medical devices. The overall picture is even worse. Former director of the National Security Agency, Mike McConnell, suspects that China has cracked “all major corporations” of the United States. Edward Snowden found […]

What is DHCP?

By Shaurya Sharma 0 Comment December 18, 2018

DHCP is a dynamic host configuration protocol. As the name implies, DHCP isdesigned to configure a host through a remote server. DCHP is supported bydefault by most modern operating systems, and this protocol acts as anexcellent alternative to the routine manual configuration of network parametersfor a server or a connected device. This protocol works on the […]

error: Content is protected by Cyberops !!