VivianOWASP A01- Broken Access Control.I will be starting a series where I touch on the OWASP top 10. I will kick it off with Broken Access Control, which ranks no 1 on the list.Mar 9Mar 9
VivianSynergy in Cyber Attacks: The Relationship and Difference Between Exploits, Payloads, and Shells.The relationship between exploits, payloads, and shells is essential to understand in the context of cyberattacks. These three elements…Nov 10, 2023Nov 10, 2023
VivianDid You Know That Gmail Has a Confidentiality Feature?I needed a family member to fill out some information for me on a site, so I decided to send her my login credentials and the link to the…Aug 14, 2022Aug 14, 2022
VivianPrivilege Management In Information SystemsPrivileges are a vital aspect of Information Systems Security. According to the Oxford Learner’s Dictionary, a privilege is a special right…Jul 24, 2022Jul 24, 2022