The Baeldung logo
  • The Baeldung LogoCS Sublogo
  • Start Here
  • About ▼▲
    • Full Archive

      The high level overview of all the articles on the site.

    • About Baeldung

      About Baeldung.

Security

The security aspects of an application are a critical issue to tackle. Learn about general security principles such as authentication, authorization, certificates, and hashing.

  • Security Attacks (17)
  • Cryptography (15)
  • Authentication (11)
  • Malware (11)
  • Hashing (5)
  • HTTP (5)
  • Distributed Systems and Programming (4)
  • Routing (4)
  • Firewalls (4)
  • URL (3)
  • TCP (3)
  • Virtual Private Networks (2)
  • HTTPS (2)

>> Error Detection: Hamming Code

>> Risk Management

>> What Are Impersonation Attacks?

>> Linear vs Differential Cryptanalysis

>> Cross-Site Scripting (XSS) Explained

>> Spam Explained

>> URL Matrix Parameters vs Query Parameters

>> The Different Types of Backups in Computing

>> Security: What Does It Mean to “Burn a Zero-Day”?

>> What is Consistent Hashing?

  • Hashing

>> Oligomorphic vs. Polymorphic vs. Metamorphic Viruses

>> Security: Interruption vs. Interception vs. Modification vs. Fabrication

>> Basics of One-time Passwords

>> What Are Brute Force Attacks?

>> Domains of Protection in OS

>> Mobile Networking: Snooping TCP

>> Understanding Passkeys

>> How MAC Flooding and Cloning Attacks Work?

>> What Is Middleware?

>> How Does Meet-in-the-Middle Attack Work?

>> CORS, CSP, and Their Differences

>> Distributed Systems: The Byzantine Generals Problem

>> Different Types of Firewalls

>> Introducing Backup Policies

>> Wireless Disassociation Attacks

>> What Is the Belady’s Anomaly?

>> What Is Cloud Security?

>> The Difference Between Exploit and Payload

>> What Is Wardriving?

>> Differences Between Network-level and Application-level Information Security

>> Differences Between Disaster Recovery and Backup

>> Introduction to Secure Computation

>> Threat vs. Vulnerability vs. Risk

>> Best Order to Sign, Encrypt and Compress Content

>> Understanding Honeypots

>> What Are Logic Bombs?

>> What Is an Eavesdropping Attack?

>> How Does a Blockchain Work?

  • Blockchain

>> What Are HTTP Flood Attacks?

>> Cryptography: Known-Plaintext Attack vs. Chosen-Plaintext Attack

>> Cryptography: Rail Fence Technique

>> Verification of SSL Certificates

>> Buffer Overflow Attacks

>> How Does 1’s Complement Work in Error Detection?

>> Social Engineering

>> What Is the Difference Between Antivirus and Firewalls

>> What Is Steganography?

>> What Is Adware?

>> Introduction to Cryptography

>> What Is a Keylogger?

>> The Cyber Kill Chain

>> What Is Privilege Escalation?

>> Differences Between Active and Passive Attacks

>> What Is a Backdoor?

>> Phishing Attacks

>> How to Determine the Entropy of a Password?

>> Cryptography: What Is a Trapdoor?

>> Differences Between an IDS and an IPS

>> Vulnerability Assessment and Penetration Testing

>> Port Scanning Explained

>> Security: What Is Formjacking?

>> Hash Code vs. Checksum

  • Hashing

>> What Are File Path Transversal Attacks?

>> Security: Credential Stuffing vs. Password Spraying

>> Hash vs. Message Authentication Code

  • Hashing

>> Firewalls: Stateless vs. Stateful

>> Differences Between Stream Cipher and Block Cipher

>> Does Code Obfuscation Bring Security Benefits?

>> Differences Between Role and Permission-based Access Control

>> Private URLs vs. Password-based Authentication

>> Security: What Is the CIA Triad?

>> What Are Zero-Day Attacks?

>> How to Share a Key in Symmetric Cryptography?

>> Differences Between Key, Initialization Vector and Nonce

>> What Is CAPTCHA and How Does It Work?

>> Public DMZ Network Architecture

>> How Do Antiviruses Really Work?

>> How Does Ransomware Infect Computers?

>> How Does a Zip Bomb Work?

>> Simulating Slow Internet and Network Errors

>> Man in the Middle (MITM) Attacks Explained

>> What Is SQL Injection?

>> How Do DoS and DDoS Attacks Really Work?

>> Are We Still Traceable When Using VPN?

  • Virtual Private Networks

>> Difference Between Self-Signed CA and Self-Signed Certificate

>> Authentication: Multi-Step vs. Multi-Factor

>> Differences Between Viruses, Worms and Trojans

>> How Are DNS Requests Resolved When Using VPN?

  • Virtual Private Networks

>> What Sets the RST Flag?

>> RSA SecurID Tokens

>> How to Find the Minimum Difference Between Elements in an Array

>> Dragonfly Algorithm

>> HTTP: 1.0 vs. 1.1 vs 2.0 vs. 3.0

>> Public/Private Keys Vs. Certificates

>> Difference Between SSL & TLS

>> Hash Collision: Weak and Strong Resistance

  • Hashing

>> Understanding Security by Obscurity

>> Valid Characters of a Hostname

>> DES vs 3DES vs Blowfish vs AES

>> MD5 vs. SHA Algorithms

>> Prime Numbers in Cryptography

>> Simple Hashing vs. Salted Hashing

  • Hashing

>> Rainbow Table Attacks

>> Encoding vs. Signing in Asymmetric Encryption

>> Are HTTPS URLs Encrypted?

>> HTTP: Differences Between PUT and PATCH

>> Introduction to SAML

>> Understanding Routing Table Entry

>> Two-Way Handshake and Three-Way Handshake

>> Protocols Used for PING

>> Socket Binding

>> Algorithms to Generate K-Combinations

>> Difference Between Access Point, Station, Bridge, and Router

>> Routers vs. Switches vs. Access Points

>> API Authentication – Tokens vs Sessions

>> Authentication vs Authorization

>> Understanding Complexity of Cryptographic Algorithms

>> SSL vs. SSH

>> Guide to Single Sign-On (SSO)

>> Brute Force Algorithm in Cybersecurity and String Search

>> What Is a Dmz in Networking?

>> Introduction to Firewalls

>> Introduction to SSH

  • ↑ Back to Top
The Baeldung logo

Categories

  • Algorithms
  • Artificial Intelligence
  • Core Concepts
  • Data Structures
  • Graph Theory
  • Latex
  • Networking
  • Security

Series

About

  • About Baeldung
  • The Full archive
  • Editors
  • Terms of Service
  • Privacy Policy
  • Company Info
  • Contact
The Baeldung Logo