What are the common types of cyber security attacks ?
A cyberattack is a malicious and deliberate attempt by an individual or organization to breach the information system of...
Differentiate between Vulnerability Assessment and Penetration Testing
Vulnerability assessment and penetration testing are two different phrases that both serve the same purpose: to secure the...
What do you mean by honeypots ?
Honeypots are attack targets that are set up to see how different attackers attempt exploits. Private firms and governments...
What do you mean by a botnet ?
A botnet is a collection of internet-connected devices, such as servers, PCs, and mobile phones, that are infected with...
What are the benefits of Cyber Security ?
The following are some of the advantages of putting cybersecurity in place and keeping it up to date: Businesses are...
What is a Firewall ?
A firewall serves as a barrier between a LAN and the Internet. It allows private resources to remain private while reducing...
Differentiate between threat, vulnerability and risk.
Threat: A threat is any form of hazard that has the potential to destroy or steal data, disrupt operations, or cause harm in...
Explain CIA triad
CIA stands for Confidentiality, Integrity, and Availability. CIA is a model that is designed to guide policies for...
What is the difference between IDS and IPS ?
IDS is Intrusion Detection System and it only detects intrusions and the administrator has to take care of preventing the...
What is the difference between Symmetric and Asymmetric encryption ?
Difference between Symmetric and Asymmetric encryption Basis of Comparison Symmetric Encryption Asymmetric Encryption...