Distributed Firewalls are resident security software applications that can protect enterprise servers against unwant intrusion. Firstly, it will enforce a network domain security policy through policy language. Secondly, it...
Category - Network Security
As we have already learnt about cryptography, let us learn more about substitution technique. Firstly, Substitution Techniques is a way of encrypting the message where characters or symbols replaces the original...
Hyperautomation is a framework of advance technologies that develops a process to scale automation capabilities in an organization. Moreover, it integrates tools and technologies that will amplify the ability to automate...
Firstly, DOS is an acronym for Denial of Service attack which aims to shut down a network or a machine. Secondly, Distributed denial of service attack uses Bots to attack at the same time. Both the attacks make the network...
Mobile security or more specifically mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. Of...
Block cipher is a structure which considers block of plaintext as a whole and produces a ciphertext of equal length. Typically, it uses block size of 64 bit or 128 bits. For instance, DES or AES, Triple DES, Feistel Cipher are...
In this article, we will learn about the most security risks and threats on web applications. Firstly, security risks refers to the potential damage that an attack on a web application could cause. Also, there must be a risk...
Fileless malware is a type of malicious activity that uses native, legitimate tools built into a system to execute a cyber attack. Unlike traditional malware, fileless malware does not require an attacker to install any code on a...
- Cryptography
- Cyber Security
- Database
- Database Management System
- Ethical Hacking
- Network Security
- Phishing
- Security
WHY BLOCKCHAIN SECURITY WHY NOT OTHERS..?
As the word suggest blockchain is nothing but big blocks of data that can’t be hacked easily. or in other terms it is the system of recording the information in way that makes it difficult or impossible to change ,hack or...
Cryptography is the study of methods and algorithms used for encryption of data for converting plain text to cipher text. Network Security deals with the measures that are taken to protect the data against any kind of misuse...