Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles on Trending Technologies
Technical articles with clear explanations and examples
What are the Pillars of Information Security?
Information security is a group of practices designed to maintain personal data secure from unauthorized access and alteration during saving or broadcasting from one area to another. There are three pillars of information security such as confidentiality, integrity and availability that are essential to guaranteeing the effective safety of data are as follows −Confidentiality − The first pillar is confidentiality, is associated with guaranteeing that information of a specific classification is not disseminated to persons external the group for which it is defined. It makes clear that only those individuals who have access permissions will be able to examine specific ...
Read MoreC++ program to find array after inserting new elements where any two elements difference is in array
Suppose we have an array A with n distinct elements. An array B is called nice if for any two distinct elements B[i] and B[j], the |B[i] - B[j]| appears in B at least once, and all elements in B will be distinct. We have to check whether we can add several integers in A to make it nice of size at most 300. If possible return the new array, otherwise return -1.So, if the input is like A = [4, 8, 12, 6], then the output will be [8, 12, 6, 2, 4, 10], because |4−2| = |6−4| = ...
Read MoreWhat are the conditions for the Issue of Bonus Shares?
Bonus shares are additional shares that a company issues to its existing shareholders based on their existing holding in the company. Companies normally issue Bonus shares when they are not able to pay a dividend to their shareholders due to shortage of funds. In such cases, companies issue bonus shares to their existing shareholders instead of paying dividend. Investors do not have to pay any tax on receiving the bonus shares.Conditions for Issue of Bonus SharesThere are some conditions that the companies must meet in order to issue bonus shares. The most important conditions are usually legal in nature. In ...
Read MoreWhat are some Information Security Terms?
There are some information security terms which are as follows −Rootkit − A hacker security tool that get passwords and message traffic to and from a computer.Threat − Any situation or event with the possible to unfavorably impact an information system via unauthorized access, elimination, disclosure, alteration of data, and denial of service.Authenticate − It can be authenticate the identity of a user, user device, or several entity, or the integrity of data saved, transmitted, or therefore exposed to unauthorized alteration in an information system, or to law the authority of a transmission.Authentication − Security measure predetermined to start the ...
Read MoreWhat are the aspects of Information Security?
The major technical areas of information security are generally defined by the original CIA including confidentiality, integrity, and authentication or availability. Confidentiality defines that data cannot be created by unauthorized parties.Maintaining access control defines not only that users can create only those resources and services to which they are named, but also that they are not denied resources that they accurately can expect to access.Non-repudiation signify that a person who sends a message cannot deny that sent it and, conversely, that a person who has received a message cannot deny that received it. Moreover these technical elements, the conceptual reach ...
Read MoreC++ program to check whether given string is bad or not
Suppose we have a string S with n characters. S contains lowercase English letters and ')' characters. The string is bad, if the number of characters ')' at the end is strictly greater than the number of remaining characters. We have to check whether S is bad or not.So, if the input is like S = "fega))))))", then the output will be True, because this is bad as there are 4 letters and 6 ')'s.StepsTo solve this, we will follow these steps −ans := 0 n := size of S i := n - 1 while (i >= 0 and ...
Read MoreWhat is the need for Information Security?
Information security is the avoidance and protection of computer assets from unauthorized access, use, modification, degradation, destruction, and multiple threats. There are two main sub-types including physical and logical. Physical information security contains tangible protection devices. Logical information security contains non-physical protection.Information security defines protecting information and information systems from unauthorized access, use, acknowledgment, disruption, alteration or destruction. Governments, military, financial institutions, hospitals, and private businesses amass a big deal of confidential data about their employees, users, products, research and monetary status.Computer systems are vulnerable to several threats that can inflict multiple types of damage resulting in essential losses. This ...
Read MoreWhat are the classifications of threats in information security?
Any type of asset that is not operating optimally and is mission-critical or important to the organization, including data that are not backed-up, is known as vulnerability, while anything imperfect is known as weakness. Any type of counter measure that becomes fairly automated and meets the expectations of upper management is known as control.There are several types of controls in a computer security environment, and threats, are as follows −Malicious Software − Malicious software is also referred to as malware. It is a software that carry harm to a computer system. Malware can be in the structure of worms, viruses, ...
Read MoreWhat are Zombie Computer?
Zombie computer is a computer under grab of a spammer who has infected the computer connected to a network with malware so that it facilitates as a tool of a spammer by sending out hundreds of emails from the owner’s email address. Therefore, an innocent user’s computer sends hundreds of spam messages without the awareness of the user. The spammers arrange zombie computers into small teams known as botnets. These botnets send spam such as phishing attempts, viruses and worms.Computers become element of a zombie network through malicious application (malware) that is unknowingly installed by users or automatically installed through ...
Read MoreWhat are the Password Attacks in Information Security?
A Password attack contains multiple techniques used by hackers to steal passwords. There are some password attacks are as follows −Brute-force − It is method in which a hacker attempt to guess a password by frequently entering in new set of words and phrases compiled from a dictionary to steal the password. It is making complex to guess usernames and passwords can avoid it.Packet sniffers − Packet sniffers are the technique used to capture data streams over a network to acquire sensitive information like usernames, passwords, credit card numbers, etc. Therefore, packet sniffers are also malicious forms of threats to ...
Read More