Filter interviews by
I applied via Company Website and was interviewed before Sep 2021. There was 1 interview round.
Information security refers to the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information security involves implementing measures to safeguard data and systems from potential threats.
It includes the protection of confidentiality, integrity, and availability of information.
Examples of information security measures include encryption, access cont...
OWASP top 10 2021 is a list of the most critical security risks to web applications.
Injection
Broken Authentication and Session Management
Cross-Site Scripting (XSS)
Security Misconfiguration
Insecure Cryptographic Storage
Insufficient Logging and Monitoring
Insecure Communication
Server-Side Request Forgery (SSRF)
Broken Access Control
Using Components with Known Vulnerabilities
CSRF and XSS are both web security vulnerabilities. CSRF allows attackers to perform unwanted actions on behalf of a user, while XSS allows attackers to inject malicious scripts into web pages.
CSRF (Cross-Site Request Forgery) is an attack that tricks the victim into performing unwanted actions on a website without their knowledge or consent.
XSS (Cross-Site Scripting) is an attack that allows attackers to inject malici...
SQL encryption is used to protect sensitive data stored in a database by converting it into unreadable form.
SQL encryption is used to prevent unauthorized access to sensitive data.
It converts the data into unreadable form using encryption algorithms.
Encrypted data can only be decrypted with the correct encryption key.
SQL encryption can be used to protect data at rest and data in transit.
Examples of SQL encryption techn...
SQL injection is a code injection technique that attackers use to exploit vulnerabilities in a web application's database layer.
SQL injection occurs when an attacker inserts malicious SQL code into a query, allowing them to manipulate the database.
Types of SQL injection include: 1) Classic SQL injection, 2) Blind SQL injection, 3) Time-based blind SQL injection, 4) Union-based SQL injection, 5) Error-based SQL injectio...
NOC Analyst
13
salaries
| ₹6 L/yr - ₹8 L/yr |
Information Technology Recruiter
12
salaries
| ₹1.5 L/yr - ₹3 L/yr |
Security Analyst
11
salaries
| ₹2.4 L/yr - ₹5 L/yr |
Power BI Developer
9
salaries
| ₹3 L/yr - ₹6 L/yr |
Software Engineer
8
salaries
| ₹6.9 L/yr - ₹8 L/yr |
Infosys
TCS
Wipro
HCLTech