Articles

  • All
  • SEC
  • NET
  • QA
Security

OWASP Top 10

The Open Web Application Security Project (OWASP) is a nonprofit organization dedicated to improving the security of web applications and software. OWASP Top 10 is a recognized list of the top 10 most critical web application security risks.
Security

Red team vs Blue team

In cybersecurity, the red team and blue team approach is inspired by military strategies, where red team represents the aggressors and blue team represents the defenders...
QA

Black Box vs White Box testing

Black Box and White Box testing are two distinct approaches. In White Box, testing is done with knowledge of the internal code and system architecture, while in Black Box testing is focused on external behavior and does not require knowledge of internal code.
Security

Different levels of hackers

Hackers are proficient in identifying vulnerabilities, exploiting weaknesses, and bypassing security measures to gain unauthorized access to computer systems, networks, or digital devices.
Security

CIA triad

CIA stands for Confidentiality, Integrity, and Availability that are 3 core principles of information security.
Security

Cyber Security Terms

There are numerous terms and concepts used in the field of cybersecurity. Below is the list of some common cybersecurity terms...
Network

OSI Model vs TCP/IP Model

The OSI model and the TCP/IP model are two conceptual frameworks that describe how the network should work.