Datacyper

  • Facebook
  • Twitter
  • Google Plus
  • Frontend
    • Java Script
      • Angular
  • Backend
    • Python
      • Flask
    • Java
    • PHP
  • Database
    • MySql
    • Database Management System
  • Deployment
  • Web Services
  • Cyber Security
    • Cryptography
  • Digital Marketing
  • Trending
    • Apache POI

Category - Network Security

  • Cyber Security
  • Network Security
  • Security

Data security in Local Network using Distributed Firewalls

14th June 2021
by Drishti Patel
3 min read
1 Comment

Distributed Firewalls are resident security software applications that can protect enterprise servers against unwant intrusion. Firstly, it will enforce a network domain security policy through policy language. Secondly, it...

Continue reading

  • Cryptography
  • Network Security
  • Security

Substitution Techniques in Cryptography

10th June 2021
by Drishti Patel
3 min read
Add Comment

As we have already learnt about cryptography, let us learn more about substitution technique. Firstly, Substitution Techniques is a way of encrypting the message where characters or symbols replaces the original...

Continue reading

  • Database
  • Machine Learning
  • Network Security
  • Technology

Significance and Role of Hyperautomation

9th June 2021
by Drishti Patel
3 min read
Add Comment

Hyperautomation is a framework of advance technologies that develops a process to scale automation capabilities in an organization. Moreover, it integrates tools and technologies that will amplify the ability to automate...

Continue reading

  • Cryptography
  • Cyber Security
  • Database
  • Network Security

Understanding DOS and DDOS Attack

9th June 2021
by Drishti Patel
4 min read
2 Comments

Firstly, DOS is an acronym for Denial of Service attack which aims to shut down a network or a machine. Secondly, Distributed denial of service attack uses Bots to attack at the same time. Both the attacks make the network...

Continue reading

  • ANDROID
  • internet
  • Network Security
  • Security
  • Server

Managing Security in Mobile Phones

8th June 2021
by Arunshi Srivastava
4 min read
Add Comment

Mobile security or more specifically mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. Of...

Continue reading

  • Cryptography
  • Cyber Security
  • Network Security

Modes of Operation in Block Cipher

8th June 2021
by Drishti Patel
3 min read
Add Comment

Block cipher is a structure which considers block of plaintext as a whole and produces a ciphertext of equal length. Typically, it uses block size of 64 bit or 128 bits. For instance, DES or AES, Triple DES, Feistel Cipher are...

Continue reading

  • Cyber Security
  • Database
  • Ethical Hacking
  • Network Security
  • Security

Security Risks and Attacks on Web Applications

7th June 2021
by Drishti Patel
3 min read
2 Comments

In this article, we will learn about the most security risks and threats on web applications. Firstly, security risks refers to the potential damage that an attack on a web application could cause. Also, there must be a risk...

Continue reading

  • Cyber Security
  • Network Security
  • Security

What is Fileless Malware? How does it works?

5th June 2021
by Shruti Goel
2 min read
1 Comment

Fileless malware is a type of malicious activity that uses native, legitimate tools built into a system to execute a cyber attack. Unlike traditional malware, fileless malware does not require an attacker to install any code on a...

Continue reading

  • Cryptography
  • Cyber Security
  • Database
  • Database Management System
  • Ethical Hacking
  • Network Security
  • Phishing
  • Security

WHY BLOCKCHAIN SECURITY WHY NOT OTHERS..?

4th June 2021
by Pooja Adiveppa Karagi
3 min read
Add Comment

As the word suggest blockchain is nothing but big blocks of data that can’t be hacked easily. or in other terms it is the system of recording the information in way that makes it difficult or impossible to change ,hack or...

Continue reading

  • Cryptography
  • Cyber Security
  • Network Security
  • Security

Importance of Cryptography and Network Security

3rd June 2021
by Drishti Patel
3 min read
Add Comment

Cryptography is the study of methods and algorithms used for encryption of data for converting plain text to cipher text. Network Security deals with the measures that are taken to protect the data against any kind of misuse...

Continue reading

Newer Entries
Older Entries
Copyright © 2025. Created by Digitvilla. Powered by Digitvilla.
  • Frontend
    • Java Script
      • Angular
  • Backend
    • Python
      • Flask
    • Java
    • PHP
  • Database
    • MySql
    • Database Management System
  • Deployment
  • Web Services
  • Cyber Security
    • Cryptography
  • Digital Marketing
  • Trending
    • Apache POI
  • Facebook
  • Twitter
  • Google Plus