Image for post
Image for post

Lets start about fingerprints and its related stuffs. Moreover, we see about how fingerprints are identified.

Introduction to fingerprints

SQL statements: DDL, DQL, DML, DCL, TCL.

Image for post
Image for post
SQL Statements

SQL-Structured Query Language is a standard language for storing, manipulating and retrieving data from databases.

SQL statements are categorized into

  1. DDL (Data Definition Language),
  2. DQL (Data Query Language),
  3. DML (Data Manipulation Language),
  4. DCL (Data Control Language),
  5. TCL (Transaction Control Language),

Sometimes, Select query which we categorized as DQL may be considered in DML.


Data Definition Language is used to define database schema. Also, to create and modify the structure of database(db).

Database schema means a skeleton / structure which represents logical view of the entire database.


To create database or its objects (tables, index, functions, view, triggers, stored procedures). …

How exactly cloud computing emerged?

Image for post
Image for post
Photo by Volodymyr Hryshchenko on Unsplash

Enterprise Architecture(EA) is a conceptual model that defines the structure and operation of an organization. The conceptual model is an abstraction of things that are made of concepts. These concepts help people (stakeholders) to know, understand, and analyze.

Ex: Consider an organization which was started recently and how it will compete against its competitor and withstand the modern market environment.

The organization should adapt the technology upgrade so the organization transforms itself to thrive in the future. Apart from technology changes they should shine against their competitors who may be a startup or a legacy company. …

Grab it ! Gain it !

Image for post
Image for post
Credit: Unsplash


Image for post
Image for post

According to OWASP, it is a nonprofit foundation that works to improve the security of software.

Simply, OWASP provides standard Top 10 security risk documentation which tells about the most critical web application security risks. Using this document, to ensure that the companies adopt and defend from the security risks. Also, if you are reporting any bugs to a company they will consider this document for vulnerability scope.

Top 10 Web Application Security Risks:

  1. Injection,
  2. Broken Authentication,
  3. Sensitive Data Exposure,
  4. XML External Entities (XXE),
  5. Broken Access Control,
  6. Security Misconfiguration,
  7. Cross-Site Scripting XSS,
  8. Insecure Deserialization,
  9. Using Components with Known…

Image for post
Image for post
Image Credit: Google

A computer virus is a type of computer program which contains malicious executable statements that are self -reproducing in nature. It is a harmful activity which infects the host computer by deleting some files, acquisition of hard disk space or CPU time, stealing/corrupting personal data, target one path/file and corrupting it etc.

A computer virus was coined by Fred Cohen in 1984. But this name is given for its nature (self -replicating the program that infect the host computer or corrupt the software without user consent which is similar to biological virus).

Self -replicating means making an exact copy of itself by its own power.

Image for post
Image for post
Bug Bounty Program.

Bug Bounty program — A crowd-sourced platform that connects many organizations globally and encourages the disclosure of in-scope vulnerabilities by independent ethical hackers.

What is meant by crowd-sourced platform ?

According to Google, crowd-source means obtain (information or input into a particular task or project) by enlisting the services of a large number of people, either paid or unpaid, typically via the Internet.

Example: Bugcrowd- Security crowdsourced platform where many organizations tell their undisclosed vulnerabilities and encourages the people who report the in-scope vulnerabilities by giving rewards as bounties or points.

Bug Bounty Platforms: (some only listed)





Image for post
Image for post
Photo by Matthew Henry on Unsplash

When we talk about cybersecurity, we think about the data breaches, attacks, threats, vulnerabilities, phishing, user identity theft, product scam and so.But could you see data is the major key point one among them. These data may get from online or offline.

Simply, Cybersecurity means prevention or detection of vulnerability in the system or network.

How we get data ?

In 1989, Tim Berners Lee invented the World Wide web (www) which facilitates the sharing of information using hypertext. This leads to share, create, manipulate, derive data that may be spurred from more devices connected to the internet.

These data may be structured using databases or unstructured that may be get from big data. Data that entered into the internet can store in any location it depends on that company storage facility. To assure about your data, company will show their data protection process.

Free Udemy Course

Make your leisure to learn something in Udemy. Learning makes you knowledgeable and certificates help your resume valuable.

Keep a glance about the listed 10 domain based free online courses offered by Udemy with no cost.

Image for post
Image for post
Photo Credit: Unsplash
  1. Git

2. Docker

3. Programming

4. Jenkins

5. Deep Learning

6. Kubernetes

7. App Development



| Learner | Engineering Student

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store