Anish Regmi7 Layers Of OSI ModelThe OSI (Open Systems Interconnection) model is a conceptual framework used to understand how different networking protocols and…Nov 6, 2023Nov 6, 2023
Anish RegmiCryptographic AttackCryptographic attacks are techniques used by malicious actors to exploit vulnerabilities or weaknesses in cryptographic systems. These…Jul 31, 2023Jul 31, 2023
Anish RegmiSupply Chain AttacksSupply chain attacks are a type of cyber attack that target vulnerabilities in the supply chain of a product or service to compromise its…Jul 31, 2023Jul 31, 2023
Anish RegmiAdversarial Artificial IntelligenceAdversarial Artificial Intelligence, often referred to as Adversarial AI or AI adversaries, is a concept in the field of artificial…Jul 31, 2023Jul 31, 2023
Anish RegmiPhysical Attacks Including Skimming & Card CloningPhysical attacks are a category of security threats that involve gaining unauthorized access to a system or facility by physically…Jul 26, 2023Jul 26, 2023
Anish RegmiVarious Password Attacks 2023Password attacks are techniques used by malicious individuals or hackers to gain unauthorized access to user accounts and systems. These…Jul 26, 2023Jul 26, 2023
Anish RegmiLogic BombA logic bomb is a type of malicious code that is intentionally inserted into a software program or system with the purpose of triggering a…Jul 24, 2023Jul 24, 2023
Anish RegmiBots & Botnets1. Bots: Bots, short for “robots” or “web robots,” are automated software applications or scripts that perform tasks on the internet…Jul 24, 2023Jul 24, 2023
Anish RegmiSpywareSpyware is a type of malicious software designed to secretly collect information from a user’s computer or device without their knowledge…Jul 24, 2023Jul 24, 2023