What is a Sniffer and How to Protect Against Sniffing

Kanal S Sajan
Updated on 15-Mar-2022 11:58:43

2K+ Views

When you do anything on the internet, you're sending data packets all over the world. Consider how your information is broken down into packets of data and transported to its intended destination when you put in a web address in your browser or submit a new update on your social media platforms.Data is split into tiny packets and routed to data centers hundreds of miles away, whether on a computer, a smartphone, a tablet, or any other device. If you believe that you and the receiving end are the only ones with transparent access to these data packets, think again. ... Read More

What is Public Key Cryptosystem in Information Security

Ginni
Updated on 15-Mar-2022 11:57:24

1K+ Views

A public-key cryptosystem is that the messages is encrypted with one key and can only be decrypted with a second key, etc. A strong public-key system is one in which control of both the algorithm and the one key provides no beneficial information about the other key and thus no indication as to how to decrypt the message.In public key cryptography, it is not applicable to calculate private key using the available public key in the network. Because of this reason public key can be completely available in the network.If a user encrypts a message with the public key of ... Read More

Discrete Logarithmic Problem in Information Security

Ginni
Updated on 15-Mar-2022 11:55:01

4K+ Views

Let G be a finite cyclic set with n elements. It consider that the group is written multiplicatively. Let b be a generator of G and thus each element g of G can be written in the form g = bk for some integer k.Moreover, any two such integers defining g will be congruent modulo n. It can represent a function logb: G → Zn(where Zn indicates the ring of integers modulo n) by creating to g the congruence class of k modulo n. This function is a group isomorphism known as the discrete algorithm to base b.In mathematics, particularly ... Read More

What is a Firewall and Why Do You Need One?

Kanal S Sajan
Updated on 15-Mar-2022 11:53:16

3K+ Views

What is a Firewall?A firewall is a hardware or software device that can be set up to restrict data from specific sites, programs, or ports while allowing relevant and necessary data to come through.Firewalls block unauthorized access to or from networks with varying levels of trust. They prevent hostile actors from accessing private networks connected to the Internet by implementing security policies. A firewall can be set up using hardware, software, or a mix of the two.Zero Trust policies can be used in conjunction with perimeter firewalls to ensure that network access is allowed appropriately and securely at every access ... Read More

Use of Chinese Remainder Theorem in Generating Random Numbers for Information Security

Ginni
Updated on 15-Mar-2022 11:51:11

3K+ Views

Random numbers are the numbers which play an essential role for various network security applications. There are some approaches that are used to generating random numbers including pseudorandom number generator and linear congruent generator also cryptographically generated random numbers etc.The main objective of the Chinese Reminder Theorem is to generating Random numbers. In essence, CRT says it is applicable to reconstruct integers in a certain range from their residues modulo a set of pair wise relatively prime modulo.CRT is one of the main theorems of mathematics. This can be utilized in the area of cryptography. It is a perfect set ... Read More

What is a Distributed Denial of Service (DDoS) Attack?

Kanal S Sajan
Updated on 15-Mar-2022 11:49:11

982 Views

What is a DoS attack?A denial-of-service attack is a type of cyber-attack where the perpetrator tries to make a network resource unavailable to its intended users by stopping the services of a host connected to the Internet for a certain length of time or indefinitely. Denial of service is often accomplished by flooding a targeted computer or resource with unnecessary requests that could cause systems to become overburdened, preventing any or all genuine requests from being fulfilled.In a distributed denial-of-service (DDoS) attack, the incoming traffic flooding the target comes from various places. This renders stopping the attack by just preventing ... Read More

Fermat's Little Theorem in Information Security

Ginni
Updated on 15-Mar-2022 11:45:24

11K+ Views

Fermat's little theorem is a fundamental theorem in elementary number theory, which provides compute powers of integers modulo prime numbers. It is a specific case of Euler's theorem, and is essential in applications of elementary number theory, such as primality testing and public-key cryptography. This is referred to as Fermat’s little theorem.Fermat’s theorem is also called a Fermat’s little theorem defines that is P is prime and ‘a’ is a positive integer not divisible by P then −aP−1 ≡ 1 mod PSecond condition says that if P is a prime and a is an integer then aP ≡ 1 mod ... Read More

What is a Computer Worm?

Kanal S Sajan
Updated on 15-Mar-2022 11:44:39

4K+ Views

Computer WormA worm is a harmful software (virus) that repeats itself as it moves from computer to computer, leaving copies of itself in each computer's memory. A worm finds a computer's vulnerability and spreads like an illness throughout its associated network, constantly looking for new holes. Worms, like viruses, are spread by email attachments from seemingly trustworthy senders. Worms then propagate through a user's email account and address book to contacts.Some worms reproduce and then go dormant, while others inflict harm. The worm's code is referred to as payload in such circumstances.How do they work?Computer worms make use of network ... Read More

Privacy and Security Issues Associated with Chatbots

Kanal S Sajan
Updated on 15-Mar-2022 11:41:15

840 Views

While face-to-face human interaction appears less common, we are more likely to communicate with our technology. Machines are starting to respond, from Siri to Alexa. Now, businesses recognize the value of Chatbot services and implement them into their networks, resulting in a more efficient and user-friendly consumer experience across many platforms. With its rising popularity, so does the concern of chatbot security; let us see more on the threats of using a chatbot is and what precisely a chatbot does.What is a chatbot?A chatbot is a computer with artificial intelligence (AI) that uses critical pre-calculated user phrases and auditory or ... Read More

Advantages of SIEM

Kanal S Sajan
Updated on 15-Mar-2022 11:38:45

749 Views

What Is SIEM (Security Incident and Event Management)?The process of finding, monitoring, recording, and evaluating security events or incidents in a real- time IT environment is known as security incident and event management (SIEM). It delivers a centralized and comprehensive picture of an IT infrastructure's security situation.Security information event management is another term for security incidents and event management.Software, systems, appliances, or a combination of these components are used to deploy SIEM. There are six major characteristics of a SIEM system in general −Retention − Keeping data for a long time so that more full data sets can make judgments.Dashboards − A tool ... Read More

Advertisements