by Alexander | 14 February 2025
Encryption, also known as cryptography in everyday language although this term is inappropriate, is a technique which consists of transforming understandable data, known as plaintext data, into an unreadable and incomprehensible format, known as encrypted data, using mathematical algorithms and one or more encryption keys.
This transformation ensures that only people with the decryption key (or the corresponding keys in the case of two-key systems) can read and understand the original content.
The aim is to protect the confidentiality, integrity and sometimes authenticity of information, by preventing it from being consulted or modified by unauthorised persons.
The aim is to protect the confidentiality, integrity and sometimes authenticity of information, by preventing it from being consulted or modified by unauthorised persons.
by Alexander | 28 October 2024
Cookies are small text files stored on a user's device when they visit a website.
They contain information about the user's preferences, browsing history and other data enabling the online experience to be personalised.
by Alexander | 31 October 2024
In cybersecurity, CSP (Content Security Policy) is a technique for improving website security.
This is a web security mechanism that allows website administrators to specify which content sources are allowed to be loaded by the browser. It aims to prevent a wide range of attacks, including cross-site scripting (XSS), data injection and malicious script execution.
by Alexander | 23 January 2025
CVSS, an acronym for Common Vulnerability Scoring System, is a standardised system for assessing the seriousness of computer vulnerabilities.
It assigns a numerical score between 0 and 10, reflecting the criticality of a vulnerability and enabling corrective action to be prioritised. This system is maintained by FIRST (Forum of Incident Response and Security Teams).
by Alexander | 13 February 2025
A cyber attack, also known as a computer attack or cyber attack, is a malicious action carried out via computer networks (mainly the Internet) with the aim of compromising the security, confidentiality, integrity or availability of a system, network or data.
These attacks can target individuals, businesses and critical infrastructures.