The Baeldung logo
  • The Baeldung LogoCS Sublogo
  • Start Here
  • About ▼▲
    • Full Archive

      The high level overview of all the articles on the site.

    • About Baeldung

      About Baeldung.

Security

The security aspects of an application are a critical issue to tackle. Learn about general security principles such as authentication, authorization, certificates, and hashing.

  • HTTP (4)

>> Differences Between Disaster Recovery and Backup

>> Introduction to Secure Computation

>> Threat vs. Vulnerability vs. Risk

>> Best Order to Sign, Encrypt and Compress Content

>> Understanding Honeypots

>> What are Logic Bombs?

>> What Is an Eavesdropping Attack?

>> How Does a Blockchain Work?

>> What are HTTP Flood Attacks?

>> Introduction to Web Proxies

>> Cryptography: Known-plaintext Attack Vs. Chosen-plaintext Attack

>> Cryptography: Rail Fence Technique

>> Verification of SSL Certificates

>> What Are Replay Attacks?

>> Remote Code Execution (RCE) and How to Prevent it?

>> Buffer Overflow Attacks

>> How Does 1’s Complement Work in Error Detection?

>> Social Engineering

>> What Is The Difference Between Antivirus And Firewalls

>> What is Steganography?

>> What Is Adware?

>> Introduction to Cryptography

>> What Is a Keylogger?

>> The Cyber Kill Chain

>> What is Privilege Escalation?

>> Differences Between Active and Passive Attacks

>> What Is a Backdoor?

>> Phishing Attacks

>> How to Determine the Entropy of a Password?

>> Cryptography: What Is a Trapdoor?

>> Differences Between an IDS and an IPS

>> Vulnerability Assessment and Penetration Testing

>> Port Scanning Explained

>> Security: What is Formjacking?

>> Hash Code Vs. Checksum

>> What are File Path Transversal Attacks?

>> Security: Credential Stuffing Vs. Password Spraying

>> Hash vs. Message Authentication Code

>> Firewalls: Stateless Vs. Stateful

>> Differences Between Stream Cipher and Block Cipher

>> Does Code Obfuscation Bring Security Benefits?

>> Differences Between Role and Permission-based Access Control

>> Private URLs vs. Password-based Authentication

>> Security: What is the CIA Triad?

>> What are Zero-day Attacks?

>> How to Share a Key in Symmetric Cryptography?

>> Differences Between Key, Initialization Vector and Nonce

>> What is CAPTCHA and How Does It Work?

>> Public DMZ Network Architecture

>> How Do Antiviruses Really Work?

>> How Does Ransomware Infect Computers?

>> How Does a Zip Bomb Work?

>> Simulating Slow Internet and Network Errors

>> Man In The Middle (MITM) Attacks Explained

>> What is SQL Injection?

>> How Do DoS and DDoS Attacks Really Work?

>> Are We Still Traceable When Using VPN?

>> Difference between self-signed CA and self-signed certificate

>> Authentication: Multi-Step Vs. Multi-Factor

>> Differences Between Viruses, Worms and Trojans

>> How Are DNS Requests Resolved When Using VPN?

>> What Sets the RST Flag?

>> RSA SecurID Tokens

>> How to Find the Minimum Difference Between Elements in an Array

>> Dragonfly Algorithm

>> HTTP: 1.0 vs. 1.1 vs 2.0 vs. 3.0

>> Public/Private Keys Vs. Certificates

>> Difference between SSL & TLS

>> Hash Collision: Weak and Strong Resistance

>> Understanding Security by Obscurity

>> Valid Characters of a Hostname

>> DES vs 3DES vs Blowfish vs AES

>> MD5 vs. SHA Algorithms

>> Prime Numbers in Cryptography

>> Simple Hashing vs. Salted Hashing

>> Rainbow Table Attacks

>> Encoding vs. Signing in Asymmetric Encryption

>> Are HTTPS URLs Encrypted?

>> HTTP: Differences Between PUT and PATCH

>> Introduction to SAML

>> Understanding Routing Table Entry

>> Two-Way Handshake and Three-Way Handshake

>> Protocols used for PING

>> Socket Binding

>> Whale Optimization Algorithm

>> Algorithms to Generate k-Combinations

>> When Will the Worst Case of Merge Sort Occur?

>> Difference Between Access Point, Station, Bridge, and Router

>> Routers vs. Switches vs. Access Points

>> API Authentication – Tokens vs Sessions

>> Authentication vs Authorization

>> Understanding Complexity of Cryptographic Algorithms

>> SSL vs. SSH

>> Guide to Single Sign-On (SSO)

>> Brute Force Algorithm in Cybersecurity and String Search

>> What is a DMZ in Networking?

>> Introduction to Firewalls

>> Introduction to SSH

  • ↑ Back to Top
The Baeldung logo

Categories

  • Algorithms
  • Artificial Intelligence
  • Core Concepts
  • Data Structures
  • Graph Theory
  • Latex
  • Networking
  • Security

Series

About

  • About Baeldung
  • The Full archive
  • Editors
  • Terms of Service
  • Privacy Policy
  • Company Info
  • Contact
The Baeldung Logo