by Alexander | 14 February 2025
Encryption, also known as cryptography in everyday language although this term is inappropriate, is a technique which consists of transforming understandable data, known as plaintext data, into an unreadable and incomprehensible format, known as encrypted data, using mathematical algorithms and one or more encryption keys.
This transformation ensures that only people with the decryption key (or the corresponding keys in the case of two-key systems) can read and understand the original content.
The aim is to protect the confidentiality, integrity and sometimes authenticity of information, by preventing it from being consulted or modified by unauthorised persons.
The aim is to protect the confidentiality, integrity and sometimes authenticity of information, by preventing it from being consulted or modified by unauthorised persons.
by Alexander | 3 March 2025
CISA (Cybersecurity and Infrastructure Security Agency) is a US government agency attached to the Department of Homeland Security (DHS).
Created in 2018, its main mission is to protect the United States' critical infrastructures and strengthen national cybersecurity in the face of cyber and physical threats.
by Alexander | 28 October 2024
Cookies are small text files stored on a user's device when they visit a website.
They contain information about the user's preferences, browsing history and other data enabling the online experience to be personalised.
by Alexander | 28 February 2025
Cryptojacking, also known as cryptographic hacking, is an insidious and increasingly widespread form of cyberattack. It involves cybercriminals secretly exploiting the computer resources (CPU, GPU graphics card, RAM, bandwidth, and consequently electrical energy) of victims, without their consent or knowledge, to generate cryptocurrencies (such as Bitcoin, Monero, Ethereum, or other digital currencies).
by Alexander | 31 October 2024
In cybersecurity, CSP (Content Security Policy) is a technique for improving website security.
This is a web security mechanism that allows website administrators to specify which content sources are allowed to be loaded by the browser. It aims to prevent a wide range of attacks, including cross-site scripting (XSS), data injection and malicious script execution.