What is Wireless Application Protocol (WAP)?

Ayushi Bhargava
Updated on 28-Oct-2021 06:22:05

2K+ Views

WAP is a collection of communication protocols meant to standardise how wireless devices, such as mobile phones and radio transceivers, may access the Internet and its services, such as email and newsgroups. Prior to the advent of WAP, Internet connection was available, but various manufacturers utilised different technologies; WAP promised compatibility across these technologies.WAP was created in 1997 at the WAP Forum by Ericsson, Motorola, Nokia, and Unwired Planet (now Phone.com). The WAP Forum was renamed the Open Mobile Alliance in 2002. (OMA).Operation of the WAPWAP is an acronym for a collection of protocols. WAP hardware, such as WAP-enabled web ... Read More

What is E-Governance?

Ayushi Bhargava
Updated on 28-Oct-2021 06:21:14

3K+ Views

E-governance offers vital opportunities to employ electronic means to push sensible governance. It applies data technology to government processes and functions to attain easy, ethical, accountable, and clear governance. This includes the dissemination of data, and quick and effective communication.With the formation of a lot of comprehensive and multi-stakeholder approaches, e-governance continues to incorporate electronic interactions, particularly interactions from government and non-governmental organizations.Benefits of e-GovernanceFollowing are some of the benefits of applying e-Governance −Reduced corruptionHigh transparencyIncreased convenience Growth of GDPDirect involvement of componentsReduction of total costsParticipating in the scope of the Government of e-overnight, the government plans to increase the ... Read More

WiMAX in Computer Network

Ayushi Bhargava
Updated on 28-Oct-2021 06:19:57

4K+ Views

What is WiMAX?WiMAX stands for "Worldwide Interoperability for Microwave Access, " a telecommunications standard that describes fixed and fully mobile Internet access services. The protocol follows some aspects of the IEEE 802.16 Standard.WiMAX products and services are most likely to be found in "last mile" applications. WiMAX enables ISPs and carriers to deliver Internet access to homes and businesses without the need for physical cabling (copper, cable, etc.) to reach the customer's location.Difference between WiMAX and WiFiWiMAX is sometimes compared to WiFi because both technologies rely on wireless Internet connectivity and are complementary.Following are some of the major differences between ... Read More

What is a Wireless Local Loop (WLL)

Ayushi Bhargava
Updated on 28-Oct-2021 06:18:08

14K+ Views

Wireless Local Loop (WLL) is a generic word for an access system that connects users to the local telephone company's switch via wireless links rather than traditional copper cables. This system, also known as fixed wireless access (FWA) or fixed radio, provides telephone, facsimile, and data services to business and residential subscribers using analog or digital radio technology.WLL systems enable the rapid deployment of basic phone service in areas where geography or telecommunications development makes traditional wireline service prohibitively expensive.WLL systems are easy to integrate with a modified public telephone network (PSTN), and they can usually be installed within a ... Read More

Working and Types of Smart Card

Ayushi Bhargava
Updated on 28-Oct-2021 06:14:45

1K+ Views

What is a Smart Card?A smart card is a compact microprocessor-based device the size of a credit card that stores and processes data. Smart cards have mostly supplanted conventional magnetic cards since they can store more data and perform more functions. Smart cards are now used in various industries, including retail, public transportation, and security.Smart card manufacturers can put small circuits and circuitry on a printed card using modern technologies such as electron beam lithography. As data storage technology progresses, manufacturers will continue to increase the functionality of smart cards by working with nanoscale components of these cards.It is feasible ... Read More

What is Vishing (Voice Phishing)?

Ayushi Bhargava
Updated on 28-Oct-2021 06:13:33

312 Views

The use of telephony (typically Voice over IP telephony) to perform phishing attacks is known as voice phishing or vishing.Landline telephone services are typically reliable because they are terminated at recognized physical locations and are associated with a bill-payer. However, contemporary Voice over IP (VoIP) technologies like caller ID spoofing and automated systems (IVR) are frequently used by vishing criminals to evade detection by law enforcement authorities. Voice phishing is commonly used to acquire credit card numbers or other personal information from individuals for use in identity theft operations.Voice phishing assaults are often carried out via automated text-to-speech systems that ... Read More

Types and Uses of Backbone Networks

Ayushi Bhargava
Updated on 28-Oct-2021 06:10:31

5K+ Views

What is a Backbone Network?A backbone is a component of the computer network infrastructure that connects multiple networks and provides a conduit for data to flow between them. A backbone may connect different local area networks in workplaces, campuses, or buildings. When numerous local area networks (LANs) are linked across a large region, the result is a wide area network (WAN) or metropolitan area network (MAN) if it serves the entire city.A backbone is a series of passageways that other significant networks connect to for long-distance communication on a massive scale. Various networking technologies collaborate as connecting points or nodes. ... Read More

What is Tunnelling in Computer Networks

Ayushi Bhargava
Updated on 28-Oct-2021 06:09:16

21K+ Views

Tunnelling is a protocol for transferring data securely from one network to another. Using a method known as encapsulation, Tunnelling allows private network communications to be sent across a public network, such as the Internet. Encapsulation enables data packets to appear general to a public network when they are private data packets, allowing them to pass unnoticed.Note − Port forwarding is another name for Tunnelling.When data is tunnelled, it is split into smaller parts called packets, as it travels through the tunnel. The packets are encrypted via the tunnel, and another process known as encapsulation takes place. For transmission, private ... Read More

What is Cross-Site Request Forgery (CSRF)?

Ayushi Bhargava
Updated on 28-Oct-2021 06:08:02

616 Views

Cross-Site Request ForgeryCross-Site Request Forgery (CSRF) is an Internet exploit that involves a trusted website user issuing unauthorized commands. In contrast to cross-site scripting, which exploits the user's trust for a website, CSRF leverages a website's trust for a specific user's browser. Session riding or a one-click attack are other terms for the same thing.The "GET" command of a browser is commonly used as the exploit point in a CSRF. To inject commands into a specific website, CSRF employs HTML tags like "IMG." A particular user of the website is then engaged as both a host and an unintentional accomplice. ... Read More

Types of Email Attacks

Ayushi Bhargava
Updated on 28-Oct-2021 06:06:21

2K+ Views

Electronic mail (email) is a digital messaging system that allows users to send and receive messages via the Internet. Email communications are sent and received by email servers, available from all Internet Service Providers (ISP).Emails are sent between two separate server folders: the senders and the recipients. A sender saves, transmits, or forwards email messages, whereas a recipient accesses an email server to view or download emails.Types of Email AttacksIn this article, we will take a look at some methods in which cybercriminals use emails to attack vulnerable users.PhishingPhishing is a type of deception. Cybercriminals utilize email, instant messaging, and ... Read More

Advertisements