×
Home
Jobs
Tools
Coding Ground
Current Affairs
UPSC Notes
Online Tutors
Whiteboard
Tutorix
Login
Categories
Java
JSP
iOS
HTML
Android
Python
C Programming
C++ Programming
C#
PHP
CSS
Javascript
jQuery
SAP
SAP HANA
Data Structure
RDBMS
MySQL
Mathematics
8085 Microprocessor
Operating System
Digital Electronics
Analysis of Algorithms
Mobile Development
Front End
Web Development
Selenium
MongoDB
Computer Network
General Topics
Q/A
Library
eBooks
Courses
Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Selected Reading
UPSC IAS Exams Notes
Developer's Best Practices
Questions and Answers
Effective Resume Writing
HR Interview Questions
Computer Glossary
Who is Who
Ayushi Bhargava
has Published
105
Answers
What is CIA Triad in Information Security?
Cyber Security
Anti Virus
Safe & Security
Ayushi Bhargava
Published on 04-May-2022 14:18:49
The CIA Triad is a concept in information security. It guides an organization's data security operations. The 3 letters in CIA stand for confidentiality, integrity, and availability. They are the three pillars of a security architecture. In fact, applying these concepts to any security program is optimal.When working as a ...
Read More
Why You Should Use an Anonymous Proxy Server?
Cyber Security
Anti Virus
Safe & Security
Ayushi Bhargava
Published on 04-May-2022 14:16:21
It's difficult to talk about internet security without mentioning a proxy server or a virtual private network (VPN). These two programs give you anonymity while you do your daily internet activity. Both technologies work in the same way to keep you anonymous on the Internet. Proxies and VPNs disguise your ...
Read More
What is an IP Flood?
Cyber Security
Anti Virus
Safe & Security
Ayushi Bhargava
Published on 04-May-2022 14:14:12
IP FloodAn IP Flood is a type of malicious assault that can affect a single device or a whole network. This is a Denial of Service (DoS) attack that seeks to prevent a device from performing its usual functions, such as delivering requests or processing data. In an IP flood ...
Read More
What is Information System Resilience?
Cyber Security
Anti Virus
Safe & Security
Ayushi Bhargava
Published on 04-May-2022 14:10:57
The resilience of an Information System is its capacity to function in adverse conditions or under stress, while preserving critical operational capabilities. In general, a system is resilient if it continues to fulfil its objective despite hardship (i.e. if it provides required capabilities despite excessive stress that can cause disruptions).Being ...
Read More
Intellectual Property: Definition, Types, How to Protect
Cyber Security
Anti Virus
Safe & Security
Ayushi Bhargava
Published on 04-May-2022 14:07:52
What is Intellectual Property?Intellectual property refers to a company's or an individual's collection of intangible assets that are legally protected against unauthorized use or use. An intangible asset is a non-physical asset possessed by a company or individual. Intellectual property refers to the concept of protecting some products of human ...
Read More
What is Intrusion Detection in Cyber Security?
Cyber Security
Anti Virus
Safe & Security
Ayushi Bhargava
Published on 04-May-2022 14:05:20
What is Intrusion in Cyber Security?Any illicit behavior on a digital network is known as a network intrusion. Network incursions frequently include the theft of important network resources, which virtually always compromise the network and/or data security. This can take the shape of more dangerous and pervasive threats like ransomware ...
Read More
What is IP Spoofing? (Process and How to Prevent)
Cyber Security
Anti Virus
Safe & Security
Ayushi Bhargava
Published on 04-May-2022 14:03:01
What is IP Spoofing?IP spoofing, also known as "IP address spoofing", is the process of sending Internet Protocol (IP) packets with a fake source IP address in order to mimic another computer system. Cybercriminals can use IP spoofing to carry out harmful acts without being detected. It's possible that someone ...
Read More
What is Kovter Malware?
Cyber Security
Anti Virus
Safe & Security
Ayushi Bhargava
Published on 04-May-2022 13:59:42
Kovter MalwareKovter is a sort of malware that isn't visible and doesn't leave any files on your computer. It's designed to attack Windows computers. It avoids detection by storing its configuration data mostly in the computer's registry, thereby bypassing standard endpoint file inspection. Kovter has also remained robust by morphing ...
Read More
What is Network Sniffing? Types, Working, Usage, Tools
Cyber Security
Anti Virus
Safe & Security
Ayushi Bhargava
Published on 04-May-2022 13:56:18
Sniffing is the technique used to monitor and record all data packets continuously that go through a network. Network/system administrators employ sniffers to monitor and troubleshoot network traffic. Attackers use sniffers to capture data packets carrying sensitive passwords and account information. Sniffers are implemented as hardware or software in the ...
Read More
What are the five pillars of NIST Cybersecurity Framework?
Cyber Security
Anti Virus
Safe & Security
Ayushi Bhargava
Published on 04-May-2022 13:50:38
National Institute of Standards and Technology (NIST)The National Institute of Standards and Technology's cybersecurity framework is a valuable tool for organizing and improving your cybersecurity program. It's a set of standards and best practices aimed at assisting businesses in establishing and improving their cybersecurity posture. The framework includes a series ...
Read More
1
2
3
4
5
6
7
...
11
Next
Advertisements
Print
Add Notes
Bookmark this page
Report Error
Suggestions
Save
Close
Dashboard
Logout