Srujan Kumar AakurathiNetwork Security ZoningOne single vulnerability is all an attacker needs — Window Snyder, Chief Security Officer, Fastly3 min read·Oct 26, 2020----
Srujan Kumar AakurathiHow to Become an Ethical HackerNow-a-days, most of the people are fascinated about the word Ethical Hacking and to pursue their career in Ethical Hacking. Ethical…5 min read·Jul 5, 2020----
Srujan Kumar AakurathiPhases of Ethical HackingThe following are the phases of Ethical Hacking which has five phases5 min read·Jul 1, 2020----
Srujan Kumar AakurathiHacking, Hacker and Hacker ClassesNow, Let us learn about the following4 min read·Jun 29, 2020----
Srujan Kumar AakurathiDifferent Types of Attacks on a SystemBefore discussing different types of attacks on a system, let us define the following3 min read·Jun 27, 2020----
Srujan Kumar AakurathiCategories of Information Security ThreatsHere, we will discuss about the categories of information security threats. Now let us define the following terms2 min read·Jun 26, 2020----
Srujan Kumar AakurathiThe Security, Functionality, and Usability TriangleLevel of Security in any system can be defined by the strength of three components:1 min read·Jun 24, 2020----
Srujan Kumar AakurathiElements of Information SecurityInformation Security is defined as “a state of well-being of information and infrastructure in which the possibility of theft, tampering…1 min read·Jun 24, 2020----
Srujan Kumar AakurathiTop Information Security Attack VectorsFollowing are the list of top information security attack vectors through which an attacker can gain access to a computer or network…4 min read·Jun 24, 2020----
Srujan Kumar AakurathiEssential Terminology in Information SecurityHack Value:- It is the notion among hackers that “something is worth doing” or is interesting.1 min read·Jun 24, 2020----