TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
Cyber Security
FOLLOW
Computer security, also known as cyber security or IT security, is the protection of computer systems from the theft or damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide.
Articles
(48)
Blogs
(13)
Resources
(0)
Videos
(1)
News
(16)
Ask a question
New
Top
Hot
Popular
Filter
Articles
Blogs
Videos
News
Interviews
Forums
Recent Post
Recaptcha Admin
Jefferson S. Motta
Oct 15, 2024
1.1k
What is SaaS Security? Why SaaS Security is important in 2025
Subham Ray
Oct 07, 2024
631
How DMARC Will Revolutionize Email Authentication in 2025
Subham Ray
Sep 30, 2024
2.1k
What is the role of social engineering in cyber attacks, and how can organizations defend against it?
Naresh Beniwal
Aug 16, 2024
101
How do you implement and manage security controls in a hybrid IT environment?
Naresh Beniwal
Aug 16, 2024
118
What are the core components of a secure network architecture?
Naresh Beniwal
Aug 16, 2024
93
Describe a supply chain attack and how an organization can mitigate this risk.
Naresh Beniwal
Aug 16, 2024
119
Describe the use of intrusion detection systems (IDS) and intrusion prevention systems (IPS).
Naresh Beniwal
Aug 16, 2024
133
What is a vulnerability scanner, and how is it used in cybersecurity?
Naresh Beniwal
Aug 16, 2024
83
Define and differentiate between risk, threat, and vulnerability.
Naresh Beniwal
Aug 16, 2024
88
How do endpoint protection solutions differ from network security solutions?
Naresh Beniwal
Aug 16, 2024
83
What is cloud encryption, and what are some methods for implementing it?
Naresh Beniwal
Aug 16, 2024
96
How do you secure data in a cloud environment?
Naresh Beniwal
Aug 16, 2024
73
Describe the shared responsibility model in cloud security.
Naresh Beniwal
Aug 16, 2024
72
What is multi-factor authentication (MFA), and why is it important?
Naresh Beniwal
Aug 16, 2024
113
Describe a man-in-the-middle attack and how it can be mitigated.
Naresh Beniwal
Aug 16, 2024
93
Describe the process of a handshake in SSL/TLS.
Naresh Beniwal
Aug 16, 2024
95
What are some of the common Cyberattacks?
Naresh Beniwal
Aug 16, 2024
110
What is a firewall, and how does it work? Describe different types of firewalls.
Naresh Beniwal
Aug 16, 2024
75
Learn to protect your PC connected with IPv6
Jefferson S. Motta
Aug 02, 2024
716
What's the most important metric for website security? And how we can ensure it?
Atif Shahab
Jul 30, 2024
77
Understanding the Types of Malware
Abhinav Shakya
Jul 30, 2024
1.2k
The Evolution of Cyber Threats and How to Stay Protected
Douglas Wagner
Jul 26, 2024
645
Understanding TLS and SSL: Securing Your Digital Communications
Priyanshu Agnihotri
Jul 24, 2024
534
The Rise of Mobile Malware
Kanishk Kumar
Jul 21, 2024
302
Leaderboard
10.8k
Subham Ray
177
10.8k
809k
21.5k
Sandeep Mishra
88
21.5k
1.1m
876
Kanishk Kumar
903
876
4.3k
TRENDING UP
10 Must Tips to Build Secure Websites for Software Developers
Cyber Security - A Big Opportunity For Developers
Top 10 Web Application Security Risks In 2017
What Is DMARC ? | Why DMARC Is Important ? | Understanding DMARC Records
Cookie Injection
A Checklist To Holistically Mitigate Cross Site Scripting (XSS) In An ASP.NET Application
What is BIMI?
Command Injection Exercise - Starting Netcat
Location Analysis
A Beginner's Guide to Cyber Security
Learn Python
Challenge yourself
Azure Fundamentals Skill
E-Book Download
Get Certified
JavaScript Developer
Ask a question
*
Select a Category
.NET
.NET Core
.NET MAUI
.NET Standard
Active Directory
ADO.NET
Agile Development
AI
AJAX
AlbertAGPT
Alchemy
Alexa Skills
Algorand
Algorithms in C#
Android
Angular
ArcObject
ASP.NET
ASP.NET Core
Augmented Reality
Avalanche
AWS
Azure
Backbonejs
Big Data
BizTalk Server
Blazor
Blockchain
Bootstrap
Bot Framework
Business
Business Intelligence(BI)
C#
C# Corner
C# Strings
C, C++, MFC
Career Advice
Careers and Jobs
Chapters
ChatGPT
Cloud
Coding Best Practices
Cognitive Services
COM Interop
Compact Framework
Copilot
Cortana Development
Cosmos DB
Cryptocurrency
Cryptography
Crystal Reports
CSS
Current Affairs
Custom Controls
Cyber Security
Data Mining
Data Science
Databases & DBA
Design Patterns & Practices
DevExpress
DevOps
DirectX
Dynamics CRM
Enterprise Development
Entity Framework
Error Zone
Exception Handling
F#
Files, Directory, IO
Flutter
Games Programming
GDI+
Generative AI
GO
Google Cloud
Google Development
Graphics Design
Graphite Studio
Hardware
Hiring and Recruitment
HoloLens
How do I
HTML 5
Infragistics
Internet & Web
Internet of Things
Ionic
Java
Java and .NET
JavaScript
JQuery
JSON
JSP
Knockout
Kotlin
Langchain
Leadership
Learn .NET
Learn iOS Programming
LINQ
Machine Learning
Metaverse
Microsoft 365
Microsoft Fabric
Microsoft Office
Microsoft Phone
Microsoft Teams
Mobile Development
MongoDB
MuleSoft
MySQL
NEAR
NetBeans
Networking
NFT
NoCode LowCode
Node.js
Office Development
OOP/OOD
Open Source
Operating Systems
Oracle
Outsourcing
Philosophy
PHP
Polygon
PostgreSQL
Power Apps
Power Automate
Power BI
Power Pages
Printing in C#
Products
Progress
Progressive Web Apps
Project Management
Public Speaking
Python
Q#
QlikView
Quantum Computing
R
React
React Native
Reports using C#
Robotics & Hardware
RPA
Ruby on Rails
RUST
Salesforce
Security
Servers
ServiceNow
SharePoint
SignalR
Smart Devices
Software Architecture/Engineering
Software Testing
Solana
Solidity
SQL
SQL Server
Startups
Stratis Blockchain
Swift
SyncFusion
Threading
Tools
TypeScript
Unity
UWP
Visual Basic .NET
Visual Studio
Vue.js
WCF
Wearables
Web API
Web Design
Web Development
Web3
Windows
Windows Controls
Windows Forms
Windows PowerShell
Windows Services
Workflow Foundation
WPF
Xamarin
XAML
XML
XNA
XSharp
Upload Source Code:
Select only zip and rar file.