Anything that includes immolation hosted services via the internet is appertained to as cloud computing. InfraStructure as a service (IaaS) platform as a service (PaaS), and software as a service (SaaS) are the three...
Category - Network Security
Firstly, Software Defined Network makes the network open and programmable. Moreover, the requirement of network is as follows: Traffic EngineeringRoutingSwitchingSecurityVirtualizationMonitoring In addition, it enables...
As we know, RSA encryption is an asymmetric cryptography method which uses two different keys for encryption and decryption purpose. Moreover, RSA is an acronym for Rivest, Adi Shamir and Len Adleman. Asymmetric key...
- Blockchain Technology
- Computer Network
- Cryptography
- Cyber Security
- Ethical Hacking
- Network Security
- Phishing
IS BLOCKCHAIN IS THE FUTURE OF THIS GENERATION?
Blockchain is one of the ongoing technology ,which each student like to learn.it is simple to understand but difficult to hack. is blockchain is the future of this generation? is one of the ongoing question in every ones...
Hash functions in cryptography takes a message of arbitary length and creates a message digest of fix length. Moreover, we have already seen about cryptography, let us know about hash functions. Firstly, a hash function H...
Information Security deals with protection of information against unauthorized access and adding various security measures. Moreover, there are various security objectives. Let’s take a look at them. Information...
Mobile Ad Hoc Network also known as wireless ad hoc network is a network design without any formal structure. Moreover, nodes connecting to the network make configuration dynamic without following pre define top down...
Healthcare has changed tremendously in the past few years, and the progress that’s being made seems straight from the pages of a sci-fic novel. Not too long ago, health records were kept in thick manila folders, and now many...
Homomorphic encryption is a form of which allows us to perform computations on encrpyting data. Moreover, it provides confidentiality, enabling useful tasks for accomplishment. In addition, it has hugely valuable...
Cyber warfare is the use of digital attacks and cyber attacks against the nation causing significant harm to warfare. Moreover, it causes damage to vital computer systems. United States DOD states that use of computers to...