Burcu YARAR’s Post

View profile for Burcu YARAR, graphic

Passionate Cyber Security Expert | SRT Member

URL, URI, URN - Do you know the differences? If your answer is "no", I have a great diagram suggestion today❗️🌝 Don't forget to add it to your bookmarks.🤞🏻🌸 Thank you to the ByteByteGo family for this useful diagram.⬇️ Happy learning❗️💃🏻 #cybersecurity #infosec #appsec #applicationsecurity #url #uri #urn #webapplication #webapplicationsecurity #network #networksecurity #difference #pentest #pentesting #pentester #resourcesharing #diagram #larningeveryday

  • No alternative text description for this image
Tim Queen 👋

Cyber Security Professional | GSEC | GFACT | GIAC Advisory Board Member | ISC2 CC | Cyber Advisor | Azure Administrator | CCNA in Progress | Specialist in Tech Marketing | Public Speaker | Content Creator

3w

Burcu YARAR, where do you see the benefits of using URN? For example, Having a SQL DB column URN with a value "urn:isbn:1234567890" VS three columns, UniqueID, IdentifierType="ISBN" and IdentifierValue="1234567890." Sure, you could use URN as a unique ID column, but it wouldn't allow you to create the most efficient indexes, optimize queries, and maximize performance. To me, URN only adds value to a document DB or filesystem.

Tolulope Michael

Founder, Coach & Mentor | Land Multiple Six Figure Cybersecurity Jobs in 90 Days Without IT Degree or Experience | The Ultimate Cybersecurity Program

3w

Great diagram illustrating the differences between URI, URL, and URN! Visual aids really help in understanding these concepts. I always keep in mind the practical applications of each, as it can clarify their unique roles in web technology. Thanks for sharing this informative post!

Confidence Staveley

Multi-Award Winning Cybersecurity Leader | Best Selling Author - API Security for White Hat Hackers | International Speaker (RSA, TEDx, etc) | Gender Inclusion Actionist | Board Member | Top 40 Global Thought Leader

3w

Thank you for sharing this great insight 🤗🤗🤗

Grishma Mehta

Student at University of Winchester

3w

Thanks for sharing

Ashish Anand

Project Manager at Octtek | Cyber Hygiene Practitioner | Cyber Security Enthusiast

3w

Thanks for sharing

Inga G

Information Security Officer| Head of Infosec and Appsec | Seasoned InfoSec Leader | 17+Years in IT Security| Privacy | Governance & Compliance| AI Risk & Management

3w

URLs, URIs, URNs got it! Love the diagram. Good diagram is always helpful. But how about using persistent identifiers (PIDs) for long term access? Burcu YARAR

Daniel J.

Senior Security Engineer at FortifyIT | Leading Security Operations, Handling Threat Intelligence, and Ensuring 24/7 Security Monitoring with Expertise in Various SOAR Integrations for SIEM Solutions.

3w

Well, detail, nice work 👍

Abdikadir Mohamed

Cyber Security Researcher | Red Teaming | Security Analyst | Network Engineer | Digital Forensics | CEH V-12 | CCNP Enterprise Core (350-401 Encore) CCNA 200-301 | Server Administrator | Python | CySA+ | SEIM TOOLS.

3w

Thanks for sharing this useful information 👍 😀

Hudson Taylor Angwu

Cybersecurity Analyst [Trainee] | Mechanical Engineer

3w

Thank you Burcu YARAR for always sharing resources

Michael Tchuindjang

Cyber Security | Instructor | Mentor | I assist people and organizations in staying ahead of cybercriminals | Spiritual Guru

3w

Nice and well explained! Thanks Burcu YARAR, for this insightful share! 🤞🏾🌸🙂

See more comments

To view or add a comment, sign in

Explore topics