Skip to content

Cyber Security Blog

Open Menu

Day: January 20, 2020

20/01/2020

Cloud Fundamentals and Cyber Security Assessment -4

Cloud Security

Major attacks • Back-door: A back-door attack takes place using asynchronous external connections or dial-up modems. Here, the strategy is to gain access to a…

Jemima
20/01/2020

Cloud Fundamentals and Cyber Security Assessment -3

Cloud Security

Security threats 1. Misuse of Cloud Computational Resources: In order to conduct cyber-attacks on computer systems, a large amount of computing power is required. So,…

Jemima
20/01/2020

Cloud Fundamentals and Cyber Security Assessment -2

Cloud Security

Cloud Delivery Models In a IaaS model too, infrastructure is provided to run applications. The cloud computing approach provides a pay-per-use model for the client…

Jemima
20/01/2020

Top 5 Web Predictions for Year 2020

Web Security

We at Valency Networks, keep on studying various attack patters, while performing application security penetration testing for our customers. We also keep an eagle’s eye…

Prashant

Search by keywords

History

  • January 2025 (1)
  • December 2024 (1)
  • November 2024 (1)
  • October 2024 (1)
  • September 2024 (3)
  • August 2024 (1)
  • June 2024 (4)
  • May 2024 (1)
  • April 2024 (2)
  • March 2024 (2)
  • January 2024 (2)
  • December 2023 (2)
  • November 2023 (3)
  • September 2023 (4)
  • August 2023 (5)
  • July 2023 (11)
  • June 2023 (16)
  • May 2023 (2)
  • April 2023 (10)
  • February 2023 (4)
  • November 2022 (1)
  • July 2022 (5)
  • June 2022 (4)
  • January 2022 (1)
  • December 2021 (1)
  • April 2021 (3)
  • March 2021 (1)
  • January 2021 (10)
  • December 2020 (3)
  • August 2020 (1)
  • July 2020 (1)
  • April 2020 (13)
  • March 2020 (2)
  • February 2020 (17)
  • January 2020 (80)
January 2020
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
2728293031  
    Feb »
© 2025 Cyber Security Blog
 / Theme: Really Simple / License: GPLv3