prashant singhMay 31, 20181 min readDifference between multiple security termsEncoding Maintaining data usability Reversed data by employing same algorithm No secret key Encryption Maintaining data confidentiality...
prashant singhMay 31, 20181 min readSession Hijacking Attack and PreventionSession Hijacking:- It is also known as TCP hijacking or cookie hijacking obtaining a session ID over the network. Once a session has...