Skip to content
Divya Aradhya
  • About
  • Posts
  • Papers & Presentations
  • Categories
    • Application Security
    • Capture The Flag
    • Cloud Computing Security
    • Cybersecurity Compliance
    • Cybersecurity Strategic Planning
    • Database Security
    • Information Security
    • Management of Information Security
    • Network Security
    • Penetration Testing and Ethical Hacking
    • Web Security Management
  • Contact

Divya Aradhya

Information Security

  • About
  • Posts
  • Papers & Presentations
  • Categories
    • Application Security
    • Capture The Flag
    • Cloud Computing Security
    • Cybersecurity Compliance
    • Cybersecurity Strategic Planning
    • Database Security
    • Information Security
    • Management of Information Security
    • Network Security
    • Penetration Testing and Ethical Hacking
    • Web Security Management
  • Contact
X
  • About
  • Posts
  • Papers & Presentations
  • Categories
    • Application Security
    • Capture The Flag
    • Cloud Computing Security
    • Cybersecurity Compliance
    • Cybersecurity Strategic Planning
    • Database Security
    • Information Security
    • Management of Information Security
    • Network Security
    • Penetration Testing and Ethical Hacking
    • Web Security Management
  • Contact

Papers & Presentations

  • Comparison of IAS Cloud Providers – A Case Study
  • CSRF – Cross Site Request Forgery – Causes and Mitigation
  • Distributed Denial of Service (DDoS) Attacks – An Analysis
  • Password Policy for Database Users
  • Puppet – State of DevOps Report 2021
  • Python – NullCipher.py
  • Python – SubstitutionCipher.py
  • Python – Vignere Cipher.py
  • Reaction – the Myth of Cybersecurity
  • Reaction: Trump’s Executive Order: Strengthening Cybersecurity of Federal Networks and Critical Infrastructure
  • Sony Pictures Breach (2014) – A Security Analysis
  • SQL Injections – Causes and Mitigation
  • The Digital Millennium Copyright Act – A Security and Privacy Analysis
  • The Digital Millennium Copyright Act – A Security and Privacy Analysis – PPT
  • Top Ten Exploits
  • Vulnerabilities in SQL Server Could Allow Remote Code Execution
  • Recent Posts

    • CVSS Demystified: Part 2: Base Metrics
    • CVSS Demystified: Part 1
    • Ukraine: DDoS attacks on government and bank websites
    • Expectations from Authority
    • Why is it important to train personnel in security if it is not part of their job routine?

    Categories

    • Application Security
    • Capture The Flag
    • Cloud Computing Security
    • Cybersecurity Compliance
    • Cybersecurity Strategic Planning
    • Database Security
    • Information Security
    • Leadership
    • Management of Information Security
    • Network Security
    • News
    • Penetration Testing and Ethical Hacking
    • Web Security Management

    Archives

    • June 2022
    • May 2022
    • February 2022
    • April 2021
    • March 2019
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • May 2014
    ©2023 Divya Aradhya