The Domain Name System- Security information

🔦The DNS stores information in Resource Records (RR). these records are separated by type, and each one stores different information about a domain. RFC1035 defines the variety of different RR types and classes, including the most common types: A, NS, and MX.¹¹ An A record maps a domain to an IP address. NS records provide the name of the […]

The Domain Name System (DNS)

This blog explains the fundamentals of  the domain name system, which is an.often overlooked component of the Web’s infrastructure, yet is crucial for nearly.every networked application. Many attcks, such as fast-flux and DNS application, take advantage of weaknesses in the DNS. design that emphasize efficiency over security. DNS is a fundamental piece of the  internet architecture. Knowledge […]

IP Address

🤔what is an ip?? Type of  ip: ➡️internet protocol:-The internet protocol is the principal communications protocol in the internet protocol suite for relayingdatagram across network boundaries. It is routing function enables internetworking, and essentially establishes the internet. IP has the task of delivering packets from the source host to the destination host soley based on […]

Basic of Cryptography

Cryptography 📣This blog provides information on Basic cryptography to explain the history and basic of ciphers.  📣The English word  cryptography  derives from Greek and translates roughly to “hidden writing.” For thousands of years,groups who wanted to communicate in secret developed methods to write their messages in a way that only the intended recipient could read. In the information […]

Cyber Security Fundamental

“cyber security funda” –––––––––––––––––––––––––––––––––––– 📣Network and Security Concepts: 🔦Information Assurance Fundamentals:- ➡️Authentication, authorization, and  nonrepudiation are tools that system designers can use to maintain system security with respect->confidentiality, integrity, and availability. ➡️There are three key concept,known as the CIA triad, which anyone who protects an information system must understand: confidentiality, integrity, and availability. 🔦Authentication:- ➡️Authentication is important […]

Cyber Security and Hacking

🤔What is Cyber?? 📣The word cyber mostly believe to originate the  Greek verb (kybereo)– “control-guide”. The word  cybernetics to define All computerised control system. Cybernetics deals with address the control of machine and communication results. Cyber world: The presence of human post-modern existence on earth. Cyber space: a dynamic artificial state formed by bits. Cyber domain: a precisely delineated domain […]