Datacyper

  • Facebook
  • Twitter
  • Google Plus
  • Frontend
    • Java Script
      • Angular
  • Backend
    • Python
      • Flask
    • Java
    • PHP
  • Database
    • MySql
    • Database Management System
  • Deployment
  • Web Services
  • Cyber Security
    • Cryptography
  • Digital Marketing
  • Trending
    • Apache POI

Category - Security

  • Cryptography
  • Cyber Security
  • Security

Which is better DES or AES?

8th June 2021
by Drishti Patel
3 min read
2 Comments

DES is an acronym for Data Encryption Standard which is a symmetric key encryption to encrypt digital data. In addition, it is a type of block cipher with block size 64 bit. AES is Advance Encryption Standard which is also a...

Continue reading

  • Cyber Security
  • Database
  • Ethical Hacking
  • Network Security
  • Security

Security Risks and Attacks on Web Applications

7th June 2021
by Drishti Patel
3 min read
2 Comments

In this article, we will learn about the most security risks and threats on web applications. Firstly, security risks refers to the potential damage that an attack on a web application could cause. Also, there must be a risk...

Continue reading

  • Security
  • Technology

How can we utilize technology to tackle Financial crimes?

5th June 2021
by Nikita Shingade
3 min read
1 Comment

Financial crime has been a major issue around the world for decades. Let’s see, how can we utilize technology to tackle financial crimes? We all know, according to the recent study, the cost of global financial crime is...

Continue reading

  • Cloud Computing
  • Cyber Security
  • Security
  • Technology

Role of Intelligent Process Automation

5th June 2021
by Drishti Patel
3 min read
Add Comment

Intelligent Process Automation is an application of artificial intelligence which includes cognitive automation, computer vision and machine learning. As we know artificial intelligence is an emerging branch of computer...

Continue reading

  • Cyber Security
  • Network Security
  • Security

What is Fileless Malware? How does it works?

5th June 2021
by Shruti Goel
2 min read
1 Comment

Fileless malware is a type of malicious activity that uses native, legitimate tools built into a system to execute a cyber attack. Unlike traditional malware, fileless malware does not require an attacker to install any code on a...

Continue reading

  • Cyber Security
  • Ethical Hacking
  • Phishing
  • Security

How can we deal with increasing Cyber Crime?

5th June 2021
by Drishti Patel
3 min read
Add Comment

As we all know, Cyber crime is an illegal and criminal activity that targets a networking device or a computer for violating privacy. Find out security ways to deal with it. This article will help us to know in brief about...

Continue reading

  • Cryptography
  • Cyber Security
  • Database
  • Database Management System
  • Ethical Hacking
  • Network Security
  • Phishing
  • Security

WHY BLOCKCHAIN SECURITY WHY NOT OTHERS..?

4th June 2021
by Pooja Adiveppa Karagi
3 min read
Add Comment

As the word suggest blockchain is nothing but big blocks of data that can’t be hacked easily. or in other terms it is the system of recording the information in way that makes it difficult or impossible to change ,hack or...

Continue reading

  • IoT
  • Security
  • Trending

Security Challenges in IoT (Internet of Things)

4th June 2021
by Shruti Goel
3 min read
1 Comment

Security is the significant challenge that we are facing in this digital era. improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are...

Continue reading

  • Cyber Security
  • Security

Can Artificial Intelligence replace Human Intelligence?

4th June 2021
by Drishti Patel
3 min read
7 Comments

Artificial Intelligence is a major branch of computer science to build system and applications that perform tasks smartly. It depicts intelligence by machines. In other words, we can say that AI uses algorithms and...

Continue reading

  • Cryptography
  • Cyber Security
  • Security

How secure is RSA Algorithm?algortihm

4th June 2021
by Drishti Patel
3 min read
Add Comment

As we know, RSA algorithm is an asymmetric cryptography method because it uses two different keys for encryption and decryption. Public key is available to all and private key is for individual encryption. It is an acronym...

Continue reading

Newer Entries
Older Entries
Copyright © 2025. Created by Digitvilla. Powered by Digitvilla.
  • Frontend
    • Java Script
      • Angular
  • Backend
    • Python
      • Flask
    • Java
    • PHP
  • Database
    • MySql
    • Database Management System
  • Deployment
  • Web Services
  • Cyber Security
    • Cryptography
  • Digital Marketing
  • Trending
    • Apache POI
  • Facebook
  • Twitter
  • Google Plus