What is discretionary access control?
Discretionary Access control is an access control model in cybersecurity which allow any individual to keep complete control on any object. The individual one own the along with the programs…
Online Portal for Geeks
Discretionary Access control is an access control model in cybersecurity which allow any individual to keep complete control on any object. The individual one own the along with the programs…
Access control is a solution in network security which help to protect from attack and to control the authorise users who can access resource/services in your network. It is to…
Phishing is a type of attacks where scammer attempts to obtain sensitive information by sending fraudulent communication that appear to come from a reputable source. The Phishing attacks can be…
Shellcode is defined as a set of instructions injected and then executed by an exploit. It is used to directly manipulate the logs and functionality of an exploit, even ensuring…
Transport Layer Security or TLS is a security protocol which is designed to provide or facilitate privacy and data security for communication over the Internet service. The mainly use of…
Datagram Transport Layer Security (DTLS) is a protocol used to secure datagram-based communications. It is based on the stream based Transport layer Security which providing similar level of security. It…
Port Scanning is the technique used to identify open ports and service available on a host. The outsider use port scanning to find information that can be helpful to exploit…
Encryption and Hashing are used to convert the human readable date to unreadable format which is not to be understanding format of actual data. Encryption is a process which scramble…