This is how long you should wait to follow up after applying for a job
It sounds a bit blunt, but the reality is that if you try to contact a hiring manager more than once to follow up on your...
What are the common types of cyber security attacks ?
A cyberattack is a malicious and deliberate attempt by an individual or organization to breach the information system of...
Differentiate between Vulnerability Assessment and Penetration Testing
Vulnerability assessment and penetration testing are two different phrases that both serve the same purpose: to secure the...
What do you mean by honeypots ?
Honeypots are attack targets that are set up to see how different attackers attempt exploits. Private firms and governments...
What do you mean by a botnet ?
A botnet is a collection of internet-connected devices, such as servers, PCs, and mobile phones, that are infected with...
What are the benefits of Cyber Security ?
The following are some of the advantages of putting cybersecurity in place and keeping it up to date: Businesses are...
What is a Firewall ?
A firewall serves as a barrier between a LAN and the Internet. It allows private resources to remain private while reducing...
Differentiate between threat, vulnerability and risk.
Threat: A threat is any form of hazard that has the potential to destroy or steal data, disrupt operations, or cause harm in...
Explain CIA triad
CIA stands for Confidentiality, Integrity, and Availability. CIA is a model that is designed to guide policies for...
What is the difference between IDS and IPS ?
IDS is Intrusion Detection System and it only detects intrusions and the administrator has to take care of preventing the...
What is the difference between Symmetric and Asymmetric encryption ?
Difference between Symmetric and Asymmetric encryption Basis of Comparison Symmetric Encryption Asymmetric Encryption...
How to secure database passwords in PHP ?
When a PHP application makes a database connection it of course generally needs to pass a login and password. If I’m...
Are HTTP cookies port specific ?
I have two HTTP services running on one machine. I just want to know if they share their cookies or whether the browser...
How to create .pfx file from certificate and private key ?
I need .pfx file to install https on website on IIS. I have two separate files: certificate (.cer or pem) and private key...
Are HTTPS headers encrypted ?
When sending data over HTTPS, I know the content is encrypted, however I hear mixed answers about whether the headers are...
How to prevent SQL injection in PHP ?
If user input is inserted without modification into an SQL query, then the application becomes vulnerable to SQL injection,...
What is a VPN ? What is its use in Cyber Security ?
VPN is an acronym that stands for Virtual Private Network. It creates a safe encrypted tunnel across the internet by...
What is the main purpose of Hashing ?
Hashing is required when we have to compare a huge amount of data. We can create different hash values for different data,...
What is the difference between virus and worm ?
A virus is a piece of harmful executable code that is attached to another executable file and can modify or erase data. When...
What is a Brute Force Attack ? How can you prevent it ?
Brute Force is a way of finding out the right credentials by repetitively trying all the permutations and combinations of...